install_flashplayer11x32_mssa_aaa_aih.exe

CORLEON GROUP LTD

The application install_flashplayer11x32_mssa_aaa_aih.exe by CORLEON GROUP has been detected as adware by 23 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from kusojob.com.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
f02f33eb41c9f80d83a8d266ba353030

SHA-1:
1c55e11550ee24aeeba798144fa067b55acd63f8

SHA-256:
c2e39a295920a4decdf811bae2ef308a5a6e3da575c4ac74bdf4a5b9dc704570

Scanner detections:
23 / 68

Status:
Adware

Analysis date:
4/20/2024 2:19:04 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.SMSHoax.AM
793

Avira AntiVirus
TR/Symmi.iqvbruep
7.11.164.56

avast!
InstallMonstr-DY [PUP]
2014.9-141203

Bitdefender
Trojan.SMSHoax.AM
1.0.20.1685

Clam AntiVirus
Win.Trojan.Smshoax-283
0.98/19185

Dr.Web
Trojan.InstallMonster.242
9.0.1.0337

Emsisoft Anti-Malware
Trojan.SMSHoax.AM
8.14.12.03.04

ESET NOD32
Win32/InstallMonstr.BS potentially unwanted application
8.7.0.302.0

F-Prot
W32/A-ef16bb21
v6.4.7.1.166

F-Secure
Trojan.SMSHoax.AM
11.2014-03-12_4

G Data
Trojan.SMSHoax.AM
14.12.24

IKARUS anti.virus
Trojan.SMSHoax
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.InstallMonster
v2014.12.03.04

MicroWorld eScan
Trojan.SMSHoax.AM
15.0.0.1011

NANO AntiVirus
Trojan.Win32.InstallMonster.dbipfy
0.28.2.60990

Norman
InstallMonster.B
11.20141203

nProtect
Trojan.SMSHoax.AM
14.07.27.01

Panda Antivirus
PUP/InstallMonstr
14.12.03.04

Reason Heuristics
PUP.CORLEONGROUP.f
14.8.7.1

Rising Antivirus
PE:Trojan.Symmi!6.1465
23.00.65.141201

Sophos
Install Monster
4.98

Vba32 AntiVirus
Signed-Downware.InstallMonstr
3.12.26.3

VIPRE Antivirus
Threat.4845009
31208

File size:
2.8 MB (2,975,704 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\install_flashplayer11x32_mssa_aaa_aih.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2014 4:00:00 AM

Valid to:
1/17/2015 3:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Mahe, S=Maine, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
05D1EDA621A201F36C3E158FEB2D4DC2

File PE Metadata
Compilation timestamp:
1/23/2014 8:51:19 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:WLXn6KtTn7Cppm+I0RVyv5LsSNISc2ASafeZW2iVVQ/kEwvVCFjDeYwRT4LDR1n:Whtb7mXzo5E2l02iVVDbCdDmknR1n

Entry address:
0x5EBEA0

Entry point:
60, BE, 00, 00, 7A, 00, 8D, BE, 00, 10, C6, FF, C7, 87, 18, CC, 4F, 00, F5, FE, 99, ED, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
2.3 MB (2,412,544 bytes)

The file install_flashplayer11x32_mssa_aaa_aih.exe has been seen being distributed by the following URL.

Remove install_flashplayer11x32_mssa_aaa_aih.exe - Powered by Reason Core Security