whatsapp.exe

XXXVI-II evito

Popeler System, s.l.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application whatsapp.exe, “parum atavus ullus erepo” by Popeler System, s.l has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
proprius habeo  (signed by Popeler System, s.l.)

Product:
XXXVI-II evito

Description:
parum atavus ullus erepo

Version:
53.69.18.45

MD5:
5e0f5b7e5dba55b8be35f0c145aaee90

SHA-1:
d82910cbb8dcd4f2e83dc12f7d9bfebba5092f64

SHA-256:
94d1f0bf9fa0a4dacf183de3c052dee372699503f4f9c84f29cec8a19bd226c4

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/28/2024 10:20:14 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba.PopelerS (M)
16.5.26.7

File size:
538.8 KB (551,680 bytes)

Product version:
83.17.46.49

Copyright:
Copyright procella audacia privatus olim

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\whatsapp.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/24/2014 7:00:00 PM

Valid to:
9/22/2017 6:59:59 PM

Subject:
CN="Popeler System, s.l.", O="Popeler System, s.l.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
31167DADB03384BDCA4981DE407B4CB5

File PE Metadata
Compilation timestamp:
10/9/2014 9:12:34 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:98bT2Yo4ncbn14e/TaHvNhn1fwBlY5hJShr1UNgMfutGJ3gn9NEi:98bqYo4ncbL/TA1fwbQmhJUN083M5

Entry address:
0xDE9C

Entry point:
E8, A5, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 28, 6E, 42, 00, E8, FE, 15, 00, 00, E8, 76, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 38, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 01, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7095

Packer / compiler:
PEQuake V0.06

Code size:
113.5 KB (116,224 bytes)

The file whatsapp.exe has been seen being distributed by the following URL.

Remove whatsapp.exe - Powered by Reason Core Security