whatsapp.exe

mugio XXVII-I inolesco

Eilio Developments s.l.

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application whatsapp.exe by Eilio Developments s.l has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
consuo Malbodiensis pullulo  (signed by Eilio Developments s.l.)

Product:
mugio XXVII-I inolesco

Description:
huic nepos

Version:
97.67.72.67

MD5:
820161fce0479d8c5fb47036463480b0

SHA-1:
9a3a97dd7f917633366358ecb48faf3306365940

SHA-256:
dfc01501ca57b8e5f584849a6cd1c176ffcfbc49af900722b4b2ecc9949d5aa0

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 7:09:44 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba (M)
16.7.22.6

File size:
538.9 KB (551,840 bytes)

Product version:
67.92.46.26

Copyright:
Copyright denuo Gandavum dulcedo

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\whatsapp.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/8/2014 3:00:00 AM

Valid to:
8/8/2017 2:59:59 AM

Subject:
CN=Eilio Developments s.l., O=Eilio Developments s.l., STREET="c. Diputació 279, 1o. 7a.", L=Barcelona, S=Barcelona, PostalCode=08007, C=ES

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7DD84643FC74F48B7E8898A3C4FC7590

File PE Metadata
Compilation timestamp:
10/2/2014 4:28:13 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:AS3GN74HkbibF+FTwJGOEvkITqPB9vPPDZ20CZ67VPBxzbyk+:AS3GN74HkbVFThtclZRPF2tePTCk+

Entry address:
0xDFDC

Entry point:
E8, AC, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 28, 6E, 42, 00, E8, FE, 15, 00, 00, E8, 7D, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 3F, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 08, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
114 KB (116,736 bytes)

The file whatsapp.exe has been seen being distributed by the following URL.

Remove whatsapp.exe - Powered by Reason Core Security