Onekit Internet S,L - 11% Detection Rate *

Did you just find a download or a file on your computer that is digitally signed by Onekit Internet S,L? Some of the security products refers to the detected files as Onekit Installer (fs) and W32.HfsAdware.1563. The detection rate for the Onekit Internet S,L files collected here is 11%. Please read on for more details.

You will probably notice Onekit Internet S,L when double-clicking to run the file. The publisher name shows up as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where Onekit Internet S,L appears as the verified publisher in the UAC dialog

You can also view the Onekit Internet S,L certificate with the following steps:

  1. Open up Windows Explorer and locate the Onekit Internet S,L file
  2. Right-click the file and select Properties
  3. Click the Digital Signatures tab
  4. Click on the View Certificate button

Here is a screengrab of a file signed by Onekit Internet S,L:

Screenshot of the Onekit Internet S,L certificate

As you can see in the screencap above, Windows reports that "This digital signature is OK". This implies that the file has been published by Onekit Internet S,L and that the file has not been tampered with.

If you click the View Certificate button shown in the screencap above, you can examine all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also see the address for Onekit Internet S,L, such as the street name, city and country.

GlobalSign CodeSigning CA - G2 has issued the Onekit Internet S,L certificates. You can also see the details of the issuer by clicking the View Certificate button shown in the screenshot above.

Onekit Internet S,L Files

These are the Onekit Internet S,L files I have gathered, thanks to the FreeFixer users.

Detection RatioFile Name
7/53eMuleTV.exe
8/55228818-674249-arrange-your-desktop.exe
11/56229783-674155-ares-mod.exe
19/68AresPlus_TC.exe
15/671FreeAntiSpyware.exe
9/6983894-674166-eazel.exe

Scanner and Detection Names

Here is the detection names for the Onekit Internet S,L files. I have grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
AVGAdInstaller.Onekit, Skodna.Bundle.bb4
AVwareOnekit Installer (fs)
Baidu-InternationalAdware.Win32.InstallCore.onei
BkavW32.HfsAdware.1563
CAT-QuickHealTrojan.InstallCore
ClamAVWin.Trojan.Banker-14020
CylanceUnsafe
CyrenW32/GenPua.12235A0D!Olympus
DrWebTrojan.Vittalia.140, Trojan.Vittalia.57
ESET-NOD32Win32/Adware.Lollipop.D
EmsisoftApplication.AdOffer (A)
Endgamemalicious (moderate confidence)
IkarusPUA.OneKit
K7AntiVirusUnwanted-Program ( 004a9db01 )
K7GWUnwanted-Program ( 004a9db01 )
Kasperskynot-a-virus:HEUR:AdWare.NSIS.DealPly.gen
MAXmalware (ai score=99)
MalwarebytesPUP.Optional.OneKit
McAfeeArtemis!7C975C67153D, Artemis!0E74A760BBD8, Artemis!D9A8627F81F6
McAfee-GW-EditionArtemis, Artemis!PUP
MicrosoftPUA:Win32/Creprote, PUA:Win32/InstallCore
NANO-AntivirusTrojan.Win32.Downware.dwtfrj, Trojan.Nsis.Onekit.dftmgm, Trojan.Win32.Adw.dwtfrj
RisingPE:Trojan.Win32.Generic.135D0B5B!324864859, PUA.Creprote!8.F617 (CLOUD)
SophosLollipop (PUA)
SymantecWS.Reputation.1
TrendMicro-HouseCallSuspicious_GEN.F47V0613
VBA32suspected of Trojan.Downloader.gen.h, Trojan.Vittalia
VIPREOnekit Installer (fs)
WebrootPua.Onekit
ZillyaTrojan.VittaliaCRTD.Win32.1585, Trojan.VittaliaCRTD.Win32.371
ZoneAlarmnot-a-virus:HEUR:AdWare.NSIS.DealPly.gen

* How the Detection Percentage is Calculated

The detection percentage is based on the fact that I have gathered 640 scan results for the Onekit Internet S,L files. 69 of these scan results came up with some sort of detection. If you like, you can review the full details of the scan reports by examining the files listed above.

Analysis Details

The analysis is based on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply