patch_3_4_nodotnet.exe

CORLEON GROUP LTD

The application patch_3_4_nodotnet.exe by CORLEON GROUP has been detected as adware by 27 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from getfile.eu and multiple other hosts.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
68ce4d6a1f66036a9a8acb2540ecf8a1

SHA-1:
4184cff34685d4662a8dd3c0b3a26478682c0e8a

SHA-256:
62fe9e7c6753bafa9e4d5bf378c4e7fffb09dc418e56afa026a881f8bafcf045

Scanner detections:
27 / 68

Status:
Adware

Analysis date:
4/25/2024 3:12:05 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Adware.SMSHoax.7
887

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.InstallMonster
2014.09.02

Avira AntiVirus
APPL/InstallMonster.Gen
7.11.170.84

avast!
Win32:InstallMonstr-DK [PUP]
140813-1

AVG
Trojan horse FakeAV.ASLA
2014.0.4015

Bitdefender
Gen:Adware.SMSHoax.7
1.0.20.1220

Clam AntiVirus
Win.Adware.Smshoax-75
0.98/19317

Dr.Web
Trojan.InstallMonster.89
9.0.1.05190

Emsisoft Anti-Malware
Gen:Adware.SMSHoax
8.14.09.01.08

ESET NOD32
Win32/InstallMonstr.AC potentially unwanted application
7.0.302.0

F-Prot
W32/A-412606dd
v6.4.7.1.166

F-Secure
Gen:Adware.SMSHoax.7
11.2014-01-09_2

G Data
Gen:Adware.SMSHoax
14.9.24

IKARUS anti.virus
Hoax.Win32.ArchSMS
t3scan.1.7.5.0

Kaspersky
Hoax.Win32.ArchSMS
15.0.0.494

Malwarebytes
PUP.Optional.InstallMonster
v2014.09.01.08

MicroWorld eScan
Gen:Adware.SMSHoax.7
15.0.0.732

NANO AntiVirus
Trojan.Win32.Monstruos.cukizd
0.28.2.61861

Norman
InstallMonstr.END
11.20140901

Panda Antivirus
PUP/InstallMonstr
14.09.01.08

Reason Heuristics
PUP.CORLEONGROUP.S
14.9.1.7

Rising Antivirus
PE:Adware.SMSHoax!6.1370
23.00.65.14830

Sophos
Install Monster
4.98

Vba32 AntiVirus
BScope.Downware.InstallMonstr
3.12.26.3

VIPRE Antivirus
Threat.4845009
32210

Zillya! Antivirus
Tool.ArchSMS.Win32.18310
2.0.0.1907

File size:
5 MB (5,282,232 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/26/2013 4:00:00 AM

Valid to:
7/27/2014 3:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3892391FD98598A279CE03AF7330DCFB

File PE Metadata
Compilation timestamp:
10/30/2013 10:47:22 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:TsCINjP0dcIJ3qFk7ryN4Wo97WP1MMMMMMMMMMMMMMMMMMp2MMMMMMMMMMMMMMMN:TCjPoDN6HJ7R

Entry address:
0x3A27E4

Entry point:
55, 8B, EC, 83, C4, F0, B8, 0C, 4B, 79, 00, E8, 7C, D4, C6, FF, A1, 58, F5, 7A, 00, 8B, 00, E8, 88, 85, E3, FF, A1, 58, F5, 7A, 00, 8B, 00, B2, 01, E8, BE, A2, E3, FF, 8B, 0D, 98, EE, 7A, 00, A1, 58, F5, 7A, 00, 8B, 00, 8B, 15, 54, 74, 78, 00, E8, 7A, 85, E3, FF, A1, 58, F5, 7A, 00, 8B, 00, E8, D2, 86, E3, FF, E8, 7D, 7D, C6, FF, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
3.6 MB (3,807,232 bytes)

The file patch_3_4_nodotnet.exe has been seen being distributed by the following 2 URLs.

Remove patch_3_4_nodotnet.exe - Powered by Reason Core Security