guf_-_gorod_dorog.exe

CORLEON GROUP LTD

The application guf_-_gorod_dorog.exe by CORLEON GROUP has been detected as adware by 31 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from turbobit.net.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
739ad293cbbd3acf4fe3c5f62650b433

SHA-1:
0005b34b67a0cbee34698cf89f4bffcd5ecd219f

SHA-256:
d561d668fd6db11f14d39a8d9df17a65078328e4271d8b51c67929c897699302

Scanner detections:
31 / 68

Status:
Adware

Analysis date:
4/19/2024 6:50:51 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Generic.1076626
5566587

Agnitum Outpost
Trojan.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.InstallMonster
2015.05.28

Avira AntiVirus
APPL/InstallMonst.QA
8.3.1.6

avast!
Win32:InstallMonstr-DY [PUP]
150525-2

AVG
Adware Generic5.BAIO
2014.0.4311

Bitdefender
Adware.Generic.1076626
1.0.20.735

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Installmonster-1
0.98/20510

Dr.Web
Trojan.InstallMonster.242
9.0.1.05190

Emsisoft Anti-Malware
Adware.Generic.1076626
10.0.0.5366

ESET NOD32
Win32/InstallMonstr.FB potentially unwanted application
7.0.302.0

Fortinet FortiGate
W32/Generic.AC.75070
5/27/2015

F-Prot
W32/A-781aa230
v6.4.7.1.166

F-Secure
Adware.Generic.1076626
5.14.151

G Data
Adware.Generic.1076626
15.5.25

IKARUS anti.virus
not-a-virus:AdWare.InstallMonster
t3scan.1.9.2.0

K7 AntiVirus
Trojan
13.204.16051

Kaspersky
not-a-virus:AdWare.Win32.InstallMonster
15.0.0.543

MicroWorld eScan
Adware.Generic.1076626
16.0.0.441

NANO AntiVirus
Riskware.Win32.InstallMonster.dmkxih
0.30.24.1636

nProtect
Trojan-Clicker/W32.InstallMonster.3847904
15.05.27.01

Panda Antivirus
PUP/InstallMonstr
15.05.27.09

Quick Heal
PUA.CorleonGroup.Gen10
5.15.14.00

Reason Heuristics
PUP.CORLEONGROUP
15.5.27.21

Sophos
PUA 'Install Monster'
5.14

SUPERAntiSpyware
PUP
9849

Total Defense
Win32/InstallMonster.RbUKPPC
37.1.62.1

Vba32 AntiVirus
AdWare.InstallMonster
3.12.26.4

VIPRE Antivirus
Threat.4845009
40552

Zillya! Antivirus
Adware.InstallMonster.Win32.6
2.0.0.2192

File size:
3.7 MB (3,847,904 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\guf_-_gorod_dorog.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2014 3:00:00 AM

Valid to:
1/17/2015 2:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Mahe, S=Maine, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
05D1EDA621A201F36C3E158FEB2D4DC2

File PE Metadata
Compilation timestamp:
7/9/2014 2:10:48 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:vqc+gZ6oU3ITwD2PWXewKVpUurvrpuSn26GMtmRzAVW90kdfdGhMwiegCF/mv3C9:6gsoU4UDMUu5HtmlAi0kLegy8S72e5

Entry address:
0x2A30940

Entry point:
60, BE, 00, 50, B4, 02, 8D, BE, 00, C0, 8B, FD, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA

Code size:
2.9 MB (3,063,808 bytes)

The file guf_-_gorod_dorog.exe has been seen being distributed by the following URL.

Remove guf_-_gorod_dorog.exe - Powered by Reason Core Security