raidcall.exe

raidcall

KORAM GAMES LIMITED

The application raidcall.exe by KORAM GAMES LIMITED has been detected as a potentially unwanted program by 2 anti-malware scanners. While running, it connects to the Internet address 25.8c.5177.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
RAIDCALL.COM  (signed by KORAM GAMES LIMITED)

Product:
raidcall

Version:
1.0.10761.313

MD5:
039309bcb539b84bc9cec11d98212228

SHA-1:
242cf7af1a564a74ba3cda96339c4e6276279bdd

SHA-256:
911363dbebead7ee687ff55b9111d5abb354d4a9676de9cf66622447e7e031ff

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 5:01:14 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Optional.KORAMGAMESLIMITED.I
14.2.22.8

Rising Antivirus
PE:Malware.XPACK/RDM!5.1
23.00.65.14120

File size:
5.1 MB (5,308,088 bytes)

Product version:
8.0.4

Copyright:
Copyright (C) 2009-2010 RAIDCALL.COM, All rights reserved

Original file name:
raidcall.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\rc語音\raidcall.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/8/2012 8:00:00 AM

Valid to:
1/8/2014 7:59:59 AM

Subject:
CN=KORAM GAMES LIMITED, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=KORAM GAMES LIMITED, L=HongKong, S=HongKong, C=HK

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6DE680510AEC828B17AC57B14D7A0CE3

File PE Metadata
Compilation timestamp:
10/17/2013 3:01:33 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

CTPH (ssdeep):
98304:+G0V8D7WO+iXuUrwge2LBiBK8WAaX0gGAmf+NCl6TzQg2aNqnEj:zaQuaX0dAmfQr2K

Entry address:
0x2CBB46

Entry point:
6A, 74, 68, C0, 2F, 84, 00, E8, D6, F9, FF, FF, 33, FF, 89, 7D, E0, 57, 8B, 1D, E4, 71, 80, 00, FF, D3, 66, 81, 38, 4D, 5A, 75, 1F, 8B, 48, 3C, 03, C8, 81, 39, 50, 45, 00, 00, 75, 12, 0F, B7, 41, 18, 3D, 0B, 01, 00, 00, 74, 1F, 3D, 0B, 02, 00, 00, 74, 05, 89, 7D, E4, EB, 27, 83, B9, 84, 00, 00, 00, 0E, 76, F2, 33, C0, 39, B9, F8, 00, 00, 00, EB, 0E, 83, 79, 74, 0E, 76, E2, 33, C0, 39, B9, E8, 00, 00, 00, 0F, 95, C0, 89, 45, E4, 89, 7D, FC, 6A, 02, FF, 15, A4, 78, 80, 00, 59, 83, 0D, 44, 57, 93, 00, FF, 83...
 
[+]

Entropy:
6.5210

Developed / compiled with:
Microsoft Visual C++ v7.1

Code size:
4 MB (4,218,880 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 25.8c.5177.ip4.static.sl-reverse.com  (119.81.140.37:80)

TCP (HTTP):
Connects to f9.d3.5177.ip4.static.sl-reverse.com  (119.81.211.249:80)

Remove raidcall.exe - Powered by Reason Core Security