Security Insights

New PPI Campaign

New PPI Campaign

PPI being pay-per-install ...

This morning I saw some interesting transactions to:

where ### are numbers, for example, "519".

MD5: 1568edcd29629f577207d7396646b741

VirusTotal results 8/43 (report), detected as (among other names):

Turns out this is being spread through spammers, SEOers, etc. being financed in a PPI model, something that I have discussed before in the past. This time I have a screenshot to share related directly to the finance aspect of this particular PPI:

This post was created today. We can see from the PPI ad that those engaging in this particular campaign stand to make between $500 and $800 per 1000 installs (< $1 per install). The numbers in the executable, like "519" correspond to the account for the spammer/SEOer that is monetizing this. Domain: Whois billing contact shows likely Russian affiliation: Here is the actual Affiliate Network setup by this guy:

Domain: (private/masked Whois)
(note the RU nameservers)
Source of the page actual reveals that the Affiliate website is loaded from
No surprise that the contact details are bogus, but the email address is legit, here's a past domain registered with these email credentials:
Robtex shows these other domains (all likely other PPI sites) on (Sagade Ltd. <- not a surprise for some) in Latvia, hosting

Get the latest Zscaler blog updates in your inbox

Subscription confirmed. More of the latest from Zscaler, coming your way soon!

By submitting the form, you are agreeing to our privacy policy.