Comodo AV Labs Warns of Free for Sale Scam

May 8, 2014 | By Editor
1 Star2 Stars3 Stars4 Stars5 Stars

Most of the malware created these days is designed to generate income to the malware authors. That’s not a surprise, but it is amazing how creative these digital criminals can be. At Comodo AV Labs we observe and analyze the many schemes, tricks and methods they use to acquire their ill-gotten gain, including:


  • Direct creation of currency


  • Indirect money making methods
      • information is stolen and further sold for real money, financial credentials stolen and used to steal funds, traffic generated on specific websites with advertisements, thus generating income


  • Direct payment methods, such as ransomware
    • Malware writers code vicious applications which force or trick affected users into making direct payments to them as ransom.
    •  E.g. Cryptolocker malware, Rogue antiviruses or the newly discovered “pay for a freeware application” method.

Free for Sale Scam

Recently, we have observed the rise of a new direct payment scheme where victims are tricked into paying to download freeware software. This is a very attractive approach for cyber criminals. The author does not need to spend the time and money to create a complex application which the user actually needs. They don’t even have to write a fake program that looks real.

After the application is paid for and installed, the user may never suspect anything because the application works as expected. Even if the victim figures out they paid for something they could have gotten for free, the fraudster is not connected to the software and will be almost impossible to trace.

The malware author can launch his scheme with three simple steps. First, a payment method for use in the process is established. This varies, but includes online payment, bank transfer and surcharge SMS services.

Second, they create a custom “pay-to-install” installer that implements the previous set payment service and either wraps the setup of the original software or downloads the legitimate application from a custom location when the payment is made.

Third, they “promote” the application to potential victims. This can be achieved via search engine optimization black hat tricks,  methods widely used by the malware authors, via advertisements, spam and more.

Analysis of Real Life Example

We have encountered this type of trickery among  some malicious applications we have analyzed.  The following information should help users understand the threat and offers some basic rules to avoid getting scammed this way.

Freeware-img0Upon execution, the application displays a welcome message and states it is an installer for “Mozilla Firefox 26.0”, the well-known, legitimate and free web-browser.

Freeware - img01The next step of the installation brings the user to a screen which states that in order for the application to be installed, a payment has to be made via a surcharge SMS to the number 81126. It promises the user that an installation code will be delivered and the process can continue. If the code is not written in the edit box, installation does not continue.

Freeware - img02freeware - img03Extracting the configuration file from the installer reveals some more interesting, and alarming details about the steps it’s taking and also the codes used in the process.

Let’s consider a scenario where the user sends a SMS message to retrieve the installation code.

When this code is written into the edit box, it is verified against the one in the configuration and a message box is displayed, stating that “The first code is valid.

In the next step, input the second of the three required codes. Send a SMS with the text X10 to 81126 and you will receive a message with your installation code.”

In conclusion, it was not one, but three surcharge text message that were needed to be sent in order to retrieve an “installation code”. The first:

freeware - img04
Then the second “code”:

Freeware - img05
freeware - img06
After each code input, a report is sent via an http call to record the usage of a valid code. The domain used for this is The website associated with this domain does not have any contact information, company details or who is behind it.

freeware - img07
It has all the clues that it’s a set-up meant to give users a shade of trust by using the name of a known company from telecommunication business area.

After user inputs the third code as well, installer proceeds to download the legitimate application installer from uploads/ program_file/file_url/167/ a680381d-79b3-4aa1-b0b0-8d748a09a486/ Firefox%20Setup%2026.0.exe and runs it.

freeware-img10As seen in the snapshot, the digital signature confirms indeed that downloaded application is valid and can be safely installed.
After setup is finished, initial installer exists, leaving the user with a newly installed application which was, in fact freeware, but he paid for it.


To avoid such situations, users should always download applications from the vendor’s website or a reputable download site such as Beware of links promoted via emails, advertisements or website pop-ups.

Also, make a point to check if the application you need is freeware or indeed you need to pay for it. Many paid applications have a trial version which can be tested before buying them, with payment methods described their documentation.

Importantly, beware of software applications that request payment via phone or SMS surcharge numbers upon installation.

But most of all, the best way to be protected from such malware is by installing an efficient antivirus on your system.

Sample details:
SHA1: 95606b25cb0f39e27e9cdb30cb4647e2baf4d7fe
MD5: 255f8ec6eccdb85806cb4a9cad136439
Comodo Internet Security detection: TrojWare.Win32.ArchSMS.AB

Be Sociable, Share!



    tttt May 9, 2014 at 7:08 am

    One question, how do they find your cell phone number to send the code?

    Anon June 3, 2014 at 10:02 am

    DNStools dot com does give data for Here is part:

    Domain Name: VOX-TELECOM.COM
    Registry Domain ID: 1829651903_DOMAIN_COM-VRSN
    Registrar WHOIS Server:
    Registrar URL:
    Updated Date: 2014-03-14T23:42:05+01:00
    Creation Date: 2013-10-02T16:43:02+02:00
    Registrar Expiration Date: 2014-10-02T16:43:02+02:00
    Registrar: DonDominio (SCIP)
    Registrar IANA ID: 1383
    Registrar Abuse Contact Email:
    Registrar Abuse Contact Phone: +34.871-98-66-00
    Domain Status: Active
    Domain Status: clientTransferProhibited
    Domain Status: clientUpdateProhibited
    Registry Registrant ID:
    Registrant Name: Whois Privacy Service Protects this domain
    Registrant Organization: Only contact by email, all postal mail will be rejected
    Registrant Street: Ronda Institut, 24
    Registrant City: Manacor
    Registrant State/Province: Illes Balears
    Registrant Postal Code: 07500
    Registrant Country: ES
    Registrant Phone: +34.871987733
    Registrant Phone Ext:
    Registrant Fax: +34.871986601

    It resolves to

    Amazon Technologies Inc. AMAZON-2011L (NET-54-240-0-0-1) –, Inc. AMAZO-ZDUB1 (NET-54-247-0-0-1) –

    So if this site is running the scam (and the registration date preceds your report by msny months – why is it still up???

    @tttt: they don’t have it until you send the text. Premium SMS messages include the sender’s number and, IIRC, some device-specific information.


    Add new comment

    Your name

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


    What Hidden Threats LurkOn Your Endpoints?

    Get complete security from known and unknown threats from Comodo Endpoint Protection

    free threat scan