bigman-yulofi.exe

ZSG

Fengling Network Co., Ltd.

The application bigman-yulofi.exe, “ZSG Setup ” by Fengling Network Co. has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Inno Setup installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from behavior.dldl.gamehot.com.
Publisher:
Fengling Network   (signed by Fengling Network Co., Ltd.)

Product:
ZSG

Description:
ZSG Setup

Version:
1.0.10.18

MD5:
67c6441248fe66d11104a2019ad87997

SHA-1:
401df191c801d7ecd76f280647ece00465c8497d

SHA-256:
241d713c5dda3b4b8a15a193e1fb2e6d75910cb0f58dfe2b83ce865e410f90b5

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
11/25/2024 10:34:49 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.CSH (L)
17.1.19.8

File size:
3.6 MB (3,817,368 bytes)

Product version:
1.0.10.18

Copyright:
Fengling Network Copyright

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\bigman-yulofi.exe

Digital Signature
Authority:
WoSign CA Limited

Valid from:
9/6/2016 4:35:53 PM

Valid to:
11/6/2017 4:35:53 PM

Subject:
CN="Fengling Network Co., Ltd.", O="Fengling Network Co., Ltd.", L=Ili Kazak Autonomous Prefecture, S=Xinjiang Uygur Autonomous Region, C=CN

Issuer:
CN=WoSign Class 3 Code Signing CA, O=WoSign CA Limited, C=CN

Serial number:
6645A14DA0C8F60025DE81738F5A0B4E

File PE Metadata
Compilation timestamp:
6/20/1992 7:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Entropy:
7.9797

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file bigman-yulofi.exe has been seen being distributed by the following URL.

http://behavior.dldl.gamehot.com/autoclient/.../al.ashx?uid=426286&pid=5001&sid=s1&s=?uid=426286&platform=naver&gkey=dldl&skey=s1&time=1484998035&is_adult=1&exts=&back_url=http://bigman.gamehot.com&type=web&sign=CC00C5E1D9BEA09C856F63D34FBA79C3&pid=5001

Remove bigman-yulofi.exe - Powered by Reason Core Security