whatsapp.exe

XLIV-II desidero mando

FIRSERIA, S.L.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application whatsapp.exe, “terror tendo proventus” by FIRSERIA, S.L has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. The installer uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
proficio sive  (signed by FIRSERIA, S.L.)

Product:
XLIV-II desidero mando

Description:
terror tendo proventus

Version:
7.38.11.67

MD5:
f69e910e4c2bf09bfce543723a2ef89c

SHA-1:
e9204719404e6461aa2e707c31d7f13081f6ff7a

SHA-256:
7e8f161604d86712df5a44395cd6799849b5851ed76de8b796fedb079e5bf9d4

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
12/25/2024 11:35:08 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba (M)
16.7.31.20

File size:
538.2 KB (551,104 bytes)

Product version:
58.53.88.80

Copyright:
2014 exitium improbus

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\whatsapp.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
7/25/2014 5:30:00 AM

Valid to:
7/24/2016 5:29:59 AM

Subject:
CN="FIRSERIA, S.L.", O="FIRSERIA, S.L.", L=Badalona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
7658ACC15B33D93ABD5A967181DEF901

File PE Metadata
Compilation timestamp:
10/21/2014 4:29:41 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:YmwDie98eTIQW6vkqw+ecC8rIXtM9likmmW0rf7QDZVF:YmwDSeTH7w+ecpId5AEFVF

Entry address:
0xDEFC

Entry point:
E8, AE, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 18, 70, 42, 00, E8, FE, 15, 00, 00, E8, 7F, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 41, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 0A, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7026  (probably packed)

Code size:
113.5 KB (116,224 bytes)

The file whatsapp.exe has been seen being distributed by the following URL.

Remove whatsapp.exe - Powered by Reason Core Security