fermamod.exe

CORLEON GROUP LTD

The application fermamod.exe by CORLEON GROUP has been detected as adware by 27 anti-malware scanners.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
49f94d331a79d37cd5c51b994e6e5644

SHA-1:
7d810e0e3db9d03efecde18bb7bf0d59505fedde

SHA-256:
b8b6550386548efeebe2618b5e6ea7154de2adbb2a177414f7f41e4170110166

Scanner detections:
27 / 68

Status:
Adware

Analysis date:
4/19/2024 9:41:01 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Symmi.40276
887

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
Trojan/Win32.Badur
2014.09.01

Avira AntiVirus
ADWARE/Adware.Gen
7.11.30.172

avast!
Win32:InstallMonstr-DL [PUP]
140813-1

AVG
Trojan horse Generic35.MEK
2014.0.4015

Bitdefender
Gen:Variant.Adware.Symmi.40276
1.0.20.1220

Clam AntiVirus
Win.Trojan.Agent-761036
0.98/19317

Comodo Security
Application.Win32.InstallMonstr.A
19383

Dr.Web
Trojan.InstallMonster.28
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Symmi.40276
8.14.09.01.01

ESET NOD32
Win32/InstallMonstr.U potentially unwanted application
7.0.302.0

F-Prot
W32/A-b90d6ba1
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Symmi.40276
11.2014-01-09_2

G Data
Gen:Variant.Adware.Symmi.40276
14.9.24

Kaspersky
not-a-virus:Downloader.Win32.Agent
15.0.0.463

MicroWorld eScan
Gen:Variant.Adware.Symmi.40276
15.0.0.732

NANO AntiVirus
Trojan.Win32.Monstruos.cufiqh
0.28.2.61861

Norman
InstallMonstr.END
11.20140901

nProtect
Trojan/W32.Badur.2565256
14.08.31.01

Panda Antivirus
PUP/InstallMonstr
14.09.01.01

Qihoo 360 Security
Malware.QVM11.Gen
1.0.0.1015

Reason Heuristics
PUP.CORLEONGROUP.I
14.9.1.1

Sophos
Install Monster
4.98

Vba32 AntiVirus
Downware.InstallMonstr
3.12.26.3

VIPRE Antivirus
Threat.4845009
32210

Zillya! Antivirus
Adware.Agent.Win32.8650
2.0.0.1907

File size:
2.4 MB (2,565,256 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\fermamod.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/26/2013 4:00:00 AM

Valid to:
7/27/2014 3:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3892391FD98598A279CE03AF7330DCFB

File PE Metadata
Compilation timestamp:
8/23/2013 5:46:16 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:MnkBdGmA4yEeB0kBxuvlgaPfABuebBrGoOFAD4Rr3Xeb:MkBd11yEk0pAnbB7vD4h+b

Entry address:
0x4BDB80

Entry point:
60, BE, 00, E0, 71, 00, 8D, BE, 00, 30, CE, FF, C7, 87, 18, 3C, 3A, 00, 76, 13, 8B, C6, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
1.6 MB (1,703,936 bytes)

Remove fermamod.exe - Powered by Reason Core Security