android_root.exe

Kingo ROOT

ZJMedia Digital Technology Ltd.

The program is a setup application that uses the Inno Setup installer. The file has been seen being downloaded from cs13.userfiles.me and multiple other hosts.
Publisher:
Kingosoft Technology Ltd.   (signed by ZJMedia Digital Technology Ltd.)

Product:
Kingo ROOT

Description:
Kingo ROOT Setup

Version:
1.3.4.2252

MD5:
dc58eb71a8e9f4b1020ad73fe133fd4c

SHA-1:
3939c0e1c4f9ac50dfbc20653c45f8f4616881b7

SHA-256:
cca6c1a944b2f9c42ad5f217a1eb4dc34cb5112a06ef5ad8f667e1b203a3fa6a

Scanner detections:
4 / 68

Status:
Clean  (4 probable false positive detections)

Explanation:
These detections are probably false positives (erroneous), the file is probably malware free.

Analysis date:
11/23/2024 2:29:18 PM UTC  (today)

Scan engine
Detection
Engine version

F-Prot
W32/MalwareHiderPatched-based!M
v6.4.7.1.166

Norman
Kryptik.CCQY
11.20150304

Quick Heal
(Suspicious) - DNAScan
3.15.14.00

Trend Micro House Call
Suspicious_GEN.F47V1212
7.2.63

File size:
17.6 MB (18,459,176 bytes)

Product version:
1.3.4.2252

Copyright:
Copyright (c) 2001-2015 Kingosoft Technology Ltd.

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\android_root.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/27/2012 7:00:00 AM

Valid to:
3/27/2015 6:59:59 AM

Subject:
CN=ZJMedia Digital Technology Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=ZJMedia Digital Technology Ltd., L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
56D66525B91E3CF6EBB314404CE3B071

File PE Metadata
Compilation timestamp:
12/20/2011 9:16:50 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
393216:ibyrmR4etk7aHRUq83YyW4mcHxeEJl82AAb1rUNEmXBa3:udR4etuimq8oyW4mUxeEj8WtULxa3

Entry address:
0x16478

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, B0, 52, 41, 00, E8, AC, 03, FF, FF, 33, C0, 55, 68, 45, 6B, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 01, 6B, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, AB, 41, 00, E8, 4E, EC, FF, FF, E8, F5, E7, FF, FF, 8D, 55, EC, 33, C0, E8, 7F, 84, FF, FF, 8B, 55, EC, B8, AC, D6, 41, 00, E8, E2, E9, FE, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, AC, D6, 41, 00, B2, 01...
 
[+]

Entropy:
7.9993

Developed / compiled with:
Microsoft Visual C++

Code size:
84 KB (86,016 bytes)

The file android_root.exe has been seen being distributed by the following 5 URLs.

http://cs13.userfiles.me/f/0/1482858941/55555488/0/.../Kingo_Android_Root_1.3.4.2252-spaces.ru.exe

Scan android_root.exe - Powered by Reason Core Security