kingo-android-root_1.1.7.exe

Kingo Android Root

Innovative Systems LLC

The application kingo-android-root_1.1.7.exe by Innovative Systems has been detected as adware by 19 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from kingo-android-root.joydownload.com.
Publisher:
Innovative Systems LLC  (signed and verified)

Product:
Kingo Android Root

Version:
1.0.0.0

MD5:
e2c95686ce6ba07528a311516b9ed8c2

SHA-1:
f8ce04ba736946a1c926f1cf18f2943b1cfbe613

SHA-256:
830aef76f7242295dabc2af764abe12cf1de7607faeea5a2b74f71433165b418

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
5/4/2024 12:47:12 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.OpenCandy
2014.11.30

Avira AntiVirus
APPL/Downloader.Gen
7.11.190.32

avast!
Adware-gen [Adw]
2014.9-160122

AVG
Adware AdLoad.OpenCandy
2017.0.2857

Baidu Antivirus
Adware.Win32.JoyDownloader
4.0.3.16122

Clam AntiVirus
Win.Trojan.Agent-803351
0.98/20139

Dr.Web
Adware.Downware.6712
9.0.1.022

ESET NOD32
Win32/JoyDownloader.D potentially unwanted application
10.7.0.302.0

G Data
Win32.Adware.OpenCandy
16.1.24

K7 AntiVirus
Unwanted-Program
13.186.14225

Malwarebytes
PUP.Optional.OpenCandy
v2016.01.22.03

McAfee
Trojan.Artemis!C5E8D0BFF605
5600.6513

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.InnovativeSystems.Installer (M)
16.1.22.3

Sophos
Generic PUA IK
4.98

Trend Micro House Call
ADW_JOYLOAD
7.2.22

Trend Micro
ADW_JOYLOAD
10.465.22

VIPRE Antivirus
Threat.4791855
35224

File size:
546.5 KB (559,632 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\kingo-android-root_1.1.7.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/19/2014 8:00:00 AM

Valid to:
5/20/2015 7:59:59 AM

Subject:
CN=Innovative Systems LLC, O=Innovative Systems LLC, L=Dnepropetrovsk, S=Dnepropetrovska oblast, C=UA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
450EACFE8D673E82864CE46BC1A92FCA

File PE Metadata
Compilation timestamp:
5/20/2013 7:53:11 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:QKcyOktqQQTid8MWE/TJE+IqAt3sgLAdMaCcsJ0ibgLbUKrGxtjW:QyOksQiq8MNG48s1ucgZQXrGxta

Entry address:
0x333E

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, 30, A2, 40, 00, 89, 6C, 24, 14, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, BC, 80, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 08, A3, 78, 4F, 43, 00, E8, A8, 2E, 00, 00, A3, C4, 4E, 43, 00, 55, 8D, 44, 24, 34, 68, B4, 02, 00, 00, 50, 55, 68, F0, B1, 42, 00, FF, 15, 7C, 81, 40, 00, 68, 7C, A3, 40, 00, 68, C0, 3E, 43, 00, E8, 13, 2B, 00, 00, FF, 15, 34, 81, 40, 00, BB, 00, F0, 43, 00, 50, 53, E8, 01, 2B, 00, 00...
 
[+]

Entropy:
7.9030

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file kingo-android-root_1.1.7.exe has been seen being distributed by the following URL.

Remove kingo-android-root_1.1.7.exe - Powered by Reason Core Security