s.t.a.l.k.e.r._-_call_of_pripyat.isz.exe

CORLEON GROUP LTD

The application s.t.a.l.k.e.r._-_call_of_pripyat.isz.exe by CORLEON GROUP has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. The file has been seen being downloaded from roosettahenderso.were.me.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
669422617451f88d97dd3928dd21396c

SHA-1:
777e09461b76ed5b6dc2158206c056c8536a1287

SHA-256:
03e78c5b5a70e208c91238ac96ec22b6360daad6d70341d8ba6ab5ebcb9dfbd3

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/23/2024 10:39:43 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallMonster
17.2.24.11

File size:
3.2 MB (3,304,576 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/26/2013 3:00:00 AM

Valid to:
7/27/2014 2:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3892391FD98598A279CE03AF7330DCFB

File PE Metadata
Compilation timestamp:
12/9/2013 6:48:11 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0xAEFB10

Entry point:
60, BE, 00, 90, C4, 00, 8D, BE, 00, 80, 7B, FF, C7, 87, 28, 7C, 8C, 00, 4B, 16, 6C, DD, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
2.7 MB (2,781,184 bytes)

The file s.t.a.l.k.e.r._-_call_of_pripyat.isz.exe has been seen being distributed by the following URL.

http://roosettahenderso.were.me/.../?j=c2lkPTM3MjQmdXJsPWh0dHAlM0ElMkYlMkZudWxsZ2FtZS5ydSUyRmVuZ2luZSUyRmRvd25sb2FkLnBocCUzRmlkJTNEMTAxNSZuYW1lPVMuVC5BLkwuSy5FLlIuXy1fQ2FsbF9vZl9QcmlweWF0Lmlzei50b3JyZW50JnR5cGU9dG9ycmVudCZzaXplPTE1ODI0

Remove s.t.a.l.k.e.r._-_call_of_pripyat.isz.exe - Powered by Reason Core Security