raidcall.exe

raidcall

KORAM GAMES LIMITED

The application raidcall.exe by KORAM GAMES LIMITED has been detected as a potentially unwanted program by 2 anti-malware scanners. While running, it connects to the Internet address edge-star-shv-01-tpe1.facebook.com on port 443.
Publisher:
RAIDCALL.COM  (signed by KORAM GAMES LIMITED)

Product:
raidcall

Version:
1.0.8487.561

MD5:
cc07716825ad85d59721b142a78e5ae5

SHA-1:
3edce2580ed8797221c5695e18fc9498a3d84106

SHA-256:
296c90111820ebf498da3a93af98c4942c2f182ef2c5aaa37f9f739480c53e42

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 5:23:23 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.KORAMGAMESLIMITED.I
13.12.24.10

Rising Antivirus
PE:Malware.XPACK/RDM!5.1
23.00.65.14206

File size:
3.9 MB (4,132,536 bytes)

Product version:
1.0.8487.561

Copyright:
Copyright (C) 2009-2010 RAIDCALL.COM, All rights reserved

Original file name:
raidcall.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\rc語音\raidcall.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/8/2012 8:00:00 AM

Valid to:
1/8/2014 7:59:59 AM

Subject:
CN=KORAM GAMES LIMITED, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=KORAM GAMES LIMITED, L=HongKong, S=HongKong, C=HK

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6DE680510AEC828B17AC57B14D7A0CE3

File PE Metadata
Compilation timestamp:
7/4/2013 7:41:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

CTPH (ssdeep):
98304:+p0IZSCEBELbe1L1Zdv5Cbf+6luna6p1NP8NaolwBJHwW1guSpDwbi5DXw3fcITh:n645JbUW1g3pLiD

Entry address:
0x1D9560

Entry point:
6A, 74, 68, 08, A2, 72, 00, E8, 98, FB, FF, FF, 33, FF, 89, 7D, E0, 57, 8B, 1D, F4, E1, 6E, 00, FF, D3, 66, 81, 38, 4D, 5A, 75, 1F, 8B, 48, 3C, 03, C8, 81, 39, 50, 45, 00, 00, 75, 12, 0F, B7, 41, 18, 3D, 0B, 01, 00, 00, 74, 1F, 3D, 0B, 02, 00, 00, 74, 05, 89, 7D, E4, EB, 27, 83, B9, 84, 00, 00, 00, 0E, 76, F2, 33, C0, 39, B9, F8, 00, 00, 00, EB, 0E, 83, 79, 74, 0E, 76, E2, 33, C0, 39, B9, E8, 00, 00, 00, 0F, 95, C0, 89, 45, E4, 89, 7D, FC, 6A, 02, FF, 15, 8C, E7, 6E, 00, 59, 83, 0D, 04, 79, 81, 00, FF, 83...
 
[+]

Entropy:
6.5510

Developed / compiled with:
Microsoft Visual C++ v7.1

Code size:
2.9 MB (3,067,904 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to f9.d3.5177.ip4.static.sl-reverse.com  (119.81.211.249:80)

TCP (HTTP SSL):
Connects to edge-star-shv-01-tpe1.facebook.com  (31.13.87.1:443)

TCP (HTTP):
Connects to ed.3a.5177.ip4.static.sl-reverse.com  (119.81.58.237:80)

TCP (HTTP):
Connects to 25.8c.5177.ip4.static.sl-reverse.com  (119.81.140.37:80)

Remove raidcall.exe - Powered by Reason Core Security