sbornik - vesenniy shanson v dorogu.[tfile.ru].exe

CORLEON GROUP LTD

The application sbornik - vesenniy shanson v dorogu.[tfile.ru].exe by CORLEON GROUP has been detected as adware by 12 anti-malware scanners.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
4b6d22c286c81be765fac75529972bdf

SHA-1:
215761aaeac773708d861d60b0152d1fa12844db

SHA-256:
881770cbc7381d05b16f694a7e14f0ecb787435d0a3efba6cbc17b33beb17ef5

Scanner detections:
12 / 68

Status:
Adware

Analysis date:
11/24/2024 7:24:14 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
APPL/InstallMonster.Gen
7.11.182.180

avast!
Win32:InstallMonstr-DY [PUP]
141025-0

Dr.Web
Trojan.InstallMonster.51
9.0.1.05190

ESET NOD32
Win32/InstallMonstr.DB potentially unwanted application
7.0.302.0

G Data
Win32.Application.Installmonstr
14.11.24

K7 AntiVirus
Unwanted-Program
13.185.13866

NANO AntiVirus
Trojan.Win32.InstallMonster.dbipfy
0.28.6.62995

Reason Heuristics
PUP.CORLEONGROUP.n
14.11.1.11

Sophos
Install Monster
4.98

Vba32 AntiVirus
BScope.Trojan-Dropper.Injector
3.12.26.3

VIPRE Antivirus
Threat.4845009
34232

File size:
2.4 MB (2,468,416 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\sbornik - vesenniy shanson v dorogu.[tfile.ru].exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2014 12:00:00 AM

Valid to:
1/16/2015 11:59:59 PM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Mahe, S=Maine, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
05D1EDA621A201F36C3E158FEB2D4DC2

File PE Metadata
Compilation timestamp:
3/12/2014 7:38:11 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:nFa/VpGKUv/S3wdrKRf4ANjvdKBfoRVyEBxiE2iJuO1vul7:n8NpGXu6K+ANjUgXyqEJiv27

Entry address:
0x6B56F0

Entry point:
60, BE, 00, 20, 8B, 00, 8D, BE, 00, F0, B4, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.9490

Packer / compiler:
UPX 2.90LZMA

Code size:
2 MB (2,113,536 bytes)