{blocked}.exe

CORLEON GROUP LTD

The application {blocked}.exe by CORLEON GROUP has been detected as adware by 8 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from getfile.eu and multiple other hosts.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
4838e530fa831ec5f0aea9c8e5cc2773

SHA-1:
7eb954c13d3ea3ad1e8ad986caa18c9e9ff8b52b

SHA-256:
667bd5f48013397030ed5e6bf20d091026e227376ca340106ae52d4770f77dce

Scanner detections:
8 / 68

Status:
Adware

Analysis date:
4/26/2024 11:03:19 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
APPL/InstallMonst.QA
8.3.1.6

avast!
InstallMonstr-DY [PUP]
2014.9-150517

Dr.Web
Trojan.InstallMonster.51
9.0.1.0137

ESET NOD32
Win32/InstallMonstr.CG potentially unwanted application
9.7.0.302.0

Norman
InstallMonster.B
11.20150517

Reason Heuristics
PUP.CORLEONGROUP.?
14.8.7.1

Sophos
PUA 'Install Monster'
5.14

VIPRE Antivirus
Threat.4845009
39676

File size:
3 MB (3,186,184 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\topbass-v-mashinu-track-8-vkfreshsound2013-toljko-samye-luchshie-sv.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2014 2:00:00 AM

Valid to:
1/17/2015 1:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Mahe, S=Maine, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
05D1EDA621A201F36C3E158FEB2D4DC2

File PE Metadata
Compilation timestamp:
2/14/2014 11:44:03 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:jubawFFBG2y+QFZwhIjmN8eLGVWV+OSJ97yFFACEGpXBCS1iPTrR9F5:yblIP+lpRw97bC1pRCph5

Entry address:
0x6BCB30

Entry point:
60, BE, 00, 10, 7F, 00, 8D, BE, 00, 00, C1, FF, C7, 87, 18, 6C, 47, 00, C7, 14, 3F, C1, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB...
 
[+]

Entropy:
7.8346

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
2.8 MB (2,932,736 bytes)

The file {blocked}.exe has been seen being distributed by the following 2 URLs.

Remove {blocked}.exe - Powered by Reason Core Security