raidcall.exe

installer.exe

PortalProgramas

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application raidcall.exe by PortalProgramas has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
Firseria sl  (signed by PortalProgramas)

Product:
installer.exe

Description:
setup_manager

Version:
3.1.12.10

MD5:
0ff1788f69ab18e6c3f785ebf2d937a4

SHA-1:
5ea78f0290e74389570fc541b3fa869dfb3ea3e0

SHA-256:
6629dcbf316353ca360ca0aa10c8cf5b20c6163c482c1eeb43e8100263080837

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 1:17:50 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba (M)
16.8.6.3

File size:
499.4 KB (511,392 bytes)

Product version:
3.1.17

Copyright:
copyright © 2014

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\raidcall.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/2/2014 9:00:00 PM

Valid to:
1/3/2015 8:59:59 PM

Subject:
CN=PortalProgramas, OU=Tech, O=PortalProgramas, STREET="Balmes 1, primera planta", L=Terrassa, S=Barcelona, PostalCode=08225, C=ES

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00FD1E07CCAABD98839CDBE058C9F8B3E9

File PE Metadata
Compilation timestamp:
6/10/2014 12:58:30 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:eJYcsNPHn39nFhCdGsuxBir2gr1xLKQKqYU4N:eJYcsN/3NFheGBP6/Q

Entry address:
0xE61A

Entry point:
E8, 7C, 79, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 10, E4, 41, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, BC, E0, 41, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 60, 54, 42, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 64...
 
[+]

Code size:
115 KB (117,760 bytes)

The file raidcall.exe has been seen being distributed by the following URL.

Remove raidcall.exe - Powered by Reason Core Security