t23448.exe

CORLEON GROUP LTD

The application t23448.exe by CORLEON GROUP has been detected as adware by 23 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from solutionsitex.com.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
11706433817103711ec3fc59c63f5e42

SHA-1:
e31e3572735eb290b596e810742fe171afd4bc08

SHA-256:
291b3cab198546034bedcd67bfa560cb6f08ff053d13ea68928e0365651dda5e

Scanner detections:
23 / 68

Status:
Adware

Analysis date:
11/5/2024 10:17:45 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.InstallMonster.E
879

Agnitum Outpost
Riskware.Agent
7.1.1

avast!
Win32:InstallMonstr-DY [PUP]
140813-1

AVG
Adware Generic5.AYMU
2014.0.4015

Bitdefender
Application.InstallMonster.E
1.0.20.1255

Clam AntiVirus
Win.Trojan.Installmonster-3
0.98/19343

Dr.Web
Trojan.InstallMonster.242
9.0.1.05190

Emsisoft Anti-Malware
Application.InstallMonster
9.0.0.4453

ESET NOD32
Win32/InstallMonstr.EV potentially unwanted application
7.0.302.0

F-Prot
W32/A-a3e903e6
v6.4.7.1.166

F-Secure
Application.InstallMonster.E
11.2014-08-09_2

G Data
Application.InstallMonster
14.9.24

IKARUS anti.virus
PUA.Installmonstr
t3scan.1.7.5.0

K7 AntiVirus
Trojan
13.183.13305

MicroWorld eScan
Application.InstallMonster.E
15.0.0.753

NANO AntiVirus
Trojan.Win32.InstallMonster.dbipfy
0.28.2.61942

nProtect
Trojan-Clicker/W32.InstallMonster.4258536
14.09.07.01

Panda Antivirus
PUP/InstallMonstr
14.09.08.01

Reason Heuristics
PUP.CORLEONGROUP.G
14.8.7.1

Sophos
Install Monster
4.98

Vba32 AntiVirus
BScope.Downware.InstallMonstr
3.12.26.3

VIPRE Antivirus
Threat.4845009
32210

Zillya! Antivirus
Trojan.Black.Win32.16885
2.0.0.1915

File size:
4.1 MB (4,258,536 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\t23448.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2014 4:00:00 AM

Valid to:
1/17/2015 3:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Mahe, S=Maine, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
05D1EDA621A201F36C3E158FEB2D4DC2

File PE Metadata
Compilation timestamp:
6/28/2014 10:34:29 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:wy7fQGv1muI/LT/rHU9GNhvMLbrTay0nVIj7lrFVRka:PEGv1+f/5KnYIjxrN

Entry address:
0xFFF4B0

Entry point:
60, BE, 00, 90, 0B, 01, 8D, BE, 00, 80, 34, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA]

Code size:
3.3 MB (3,436,544 bytes)

The file t23448.exe has been seen being distributed by the following URL.

Remove t23448.exe - Powered by Reason Core Security