wormixhacker.zip.exe

VUDGOFF LLC

This is a bundle installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application wormixhacker.zip.exe by VUDGOFF has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the ProfitServis Downloader installer. The file has been seen being downloaded from newconfiglinker.net.
Publisher:
VUDGOFF LLC  (signed and verified)

Version:
1.0.0.0

MD5:
61397a421d7ab517c549708c138ab359

SHA-1:
5aa9c319c4d03842a07e1902e074a4c4633d9608

SHA-256:
db47ab3318ee8009e565ff05bc1cae2d755b3e3a55f13b15fd64935eeb99b863

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/6/2024 1:39:27 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.ProfitServis (M)
17.3.14.4

File size:
3.4 MB (3,614,528 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Bundler/Installer:
ProfitServis Downloader

Common path:
C:\users\{user}\downloads\wormixhacker.zip.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
10/7/2014 8:00:00 AM

Valid to:
10/8/2015 7:59:59 AM

Subject:
CN=VUDGOFF LLC, O=VUDGOFF LLC, L=Kalush, S=Ukraine, C=UA

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
2C5685C673E02F32A4282BB21A8D2D11

File PE Metadata
Compilation timestamp:
6/20/1992 6:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0xA4CBD0

Entry point:
60, BE, 00, D0, B9, 00, 8D, BE, 00, 40, 86, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA

Code size:
2.7 MB (2,818,048 bytes)

The file wormixhacker.zip.exe has been seen being distributed by the following URL.

http://newconfiglinker.net/archive.php?name=WormixHacker&site=ckvn

Remove wormixhacker.zip.exe - Powered by Reason Core Security