whatsapp extractor.exe

XXXVI-II evito

Popeler System, s.l.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application whatsapp extractor.exe, “parum atavus ullus erepo” by Popeler System, s.l has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
proprius habeo  (signed by Popeler System, s.l.)

Product:
XXXVI-II evito

Description:
parum atavus ullus erepo

Version:
53.69.18.45

MD5:
f56dfe2ebe20e41d6393d7ceebb04a0c

SHA-1:
f85ea429cc202d1e93c81496604c19220fa5bf57

SHA-256:
8b77546f220d816231700982fb8a9886fcc25a19d1d9e7d523d44563db4d1f40

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/24/2024 11:47:45 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba.PopelerS (M)
16.7.6.15

File size:
538.8 KB (551,680 bytes)

Product version:
83.17.46.49

Copyright:
Copyright procella audacia privatus olim

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\whatsapp extractor.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/24/2014 9:00:00 PM

Valid to:
9/22/2017 8:59:59 PM

Subject:
CN="Popeler System, s.l.", O="Popeler System, s.l.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
31167DADB03384BDCA4981DE407B4CB5

File PE Metadata
Compilation timestamp:
10/9/2014 11:12:34 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:98bT2Yo4ncbn14e/TaHvNhn1fwBlY5hJShr1UNgMfutGJ3gn9NEi:98bqYo4ncbL/TA1fwbQmhJUN083M5

Entry address:
0xDE9C

Entry point:
E8, A5, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 28, 6E, 42, 00, E8, FE, 15, 00, 00, E8, 76, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 38, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 01, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Packer / compiler:
PEQuake V0.06

Code size:
113.5 KB (116,224 bytes)

The file whatsapp extractor.exe has been seen being distributed by the following URL.

Remove whatsapp extractor.exe - Powered by Reason Core Security