ko-king.exe

Duck Play, LLC.

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application ko-king.exe by Duck Play has been detected as adware by 18 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from installerlaunch-mm1.com.
Publisher:
Duck Play, LLC.  (signed and verified)

MD5:
65fae3eb5f6ee2c7192f153e14311e11

SHA-1:
a54463f84c2bca09ab7cd6218fb968aa141ec53b

SHA-256:
0e78d45eea078197dfd68c1aeb96fff8afbf1cf90fde54dd3b78b2ef9f5a2380

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 7:54:44 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
8.3.1.6

avast!
Win32:Malware-gen
2014.9-150515

AVG
InstallC
2016.0.3108

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.InstallCore.EAK
22127

Dr.Web
Trojan.InstallCore.37
9.0.1.05190

ESET NOD32
Win32/InstallCore.BY potentially unwanted application
9.7.0.302.0

herdProtect (fuzzy)
2015.8.12.15

K7 AntiVirus
Unwanted-Program
13.203.15929

Malwarebytes
v2015.05.15.06

NANO AntiVirus
Riskware.Win32.InstallCore.dmfofu
0.30.24.1357

Reason Heuristics
Threat.Installer.DuckPlay
15.5.15.14

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.15513

Total Defense
Win32/InstallCore.A!generic
37.1.62.1

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4835495
32210

File size:
755.5 KB (773,592 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\downloads\ko-king.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/6/2012 7:00:00 PM

Valid to:
1/6/2015 6:59:59 PM

Subject:
CN="Duck Play, LLC.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Duck Play, LLC.", L=Plantation, S=Florida, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
61BB10A02680B1BE9CBF105FD54BEAAA

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:nyMJfsG/kRkbi0Fap0b4+A6AMj01tJEIJ3zVrByPeU/81MHNO56yLIeaj2DSLxm3:nyMJfsuf4T6AnXj5hF7U/8y06yLIeKLb

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Entropy:
7.8626

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The file ko-king.exe has been seen being distributed by the following URL.

Remove ko-king.exe - Powered by Reason Core Security