bum_bum_bum_-_s_barabanom_hodit_yozhik_(iplayer.fm).exe

CORLEON GROUP LTD

The application bum_bum_bum_-_s_barabanom_hodit_yozhik_(iplayer.fm).exe by CORLEON GROUP has been detected as adware by 21 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from data.iplayer.fm.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
d09bacc45d170ac5a08e9bb2d3ef2494

SHA-1:
f915a954dba8d1ce84784c421d0763e0f57ffe39

SHA-256:
c638446da9523648cdfe5ab0c7a0c795a5b8c5768eede57787b155070fc8f41a

Scanner detections:
21 / 68

Status:
Adware

Analysis date:
5/9/2024 5:41:50 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.12247586
794

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.InstallMonster
2014.12.03

Avira AntiVirus
APPL/InstallMonst.QA
7.11.190.4

avast!
Win32:InstallMonstr-DY [PUP]
141130-1

Bitdefender
Trojan.Generic.12247586
1.0.20.1685

Dr.Web
Trojan.InstallMonster.242
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Generic.12247586
9.0.0.4668

ESET NOD32
Win32/InstallMonstr.EO potentially unwanted application
7.0.302.0

F-Secure
Trojan.Generic.12247586
11.2014-03-12_4

G Data
Trojan.Generic.12247586
14.12.24

K7 AntiVirus
Unwanted-Program
13.186.14210

McAfee
GenericR-ASS!04485AEE8D75
5600.6928

MicroWorld eScan
Trojan.Generic.12247586
15.0.0.1011

NANO AntiVirus
Trojan.Win32.InstallMonster.dbipfy
0.28.6.63850

nProtect
Trojan.Generic.12247586
14.12.02.01

Panda Antivirus
PUP/InstallMonstr
14.12.03.03

Reason Heuristics
PUP.CORLEONGROUP.s
14.12.3.3

Sophos
Install Monster
4.98

Vba32 AntiVirus
Signed-Downware.InstallMonstr
3.12.26.3

VIPRE Antivirus
Threat.4845009
35224

File size:
2.4 MB (2,542,264 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\bum_bum_bum_-_s_barabanom_hodit_yozhik_(iplayer.fm).exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2014 4:00:00 AM

Valid to:
1/17/2015 3:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Mahe, S=Maine, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
05D1EDA621A201F36C3E158FEB2D4DC2

File PE Metadata
Compilation timestamp:
7/4/2014 12:57:00 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:tPP0u+vxqaRNkNnIZkXMaANw6iU0gyLDzsKpT5UgIqRaCy7LA:h+vwaLSnwkX4w6BGLfl9FRXy7s

Entry address:
0x5E39A0

Entry point:
60, BE, 00, 50, 7F, 00, 8D, BE, 00, C0, C0, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA

Code size:
1.9 MB (2,027,520 bytes)

The file bum_bum_bum_-_s_barabanom_hodit_yozhik_(iplayer.fm).exe has been seen being distributed by the following URL.