raggatone5pl_6715.exe

The application raggatone5pl_6715.exe has been detected as a potentially unwanted program by 16 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The installer uses the InstallMonetizer platform which will donwload and install adware toolbars and other potentially unwanted software offers during setup. The file has been seen being downloaded from cdn.shyapotato.us.
MD5:
75cf6b3e47b35355c071ee681abcde75

SHA-1:
a62aabcfd1d5e41d5fbe5163ddfdd2c79dbd0bd5

SHA-256:
2bb6c1514dc2ec782ae8dde948b20c3893c7bc721d8577e67b3377c6e24e8d68

Scanner detections:
16 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallMonetizer distribution platform to bundle adware.

Analysis date:
4/25/2024 6:03:42 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
NSIS:Adware-JM [PUP]
2014.9-130828

AVG
MultiBundle.D
2014.0.3542

Bitdefender
DeepScan:Generic.Mitglied
1.0.20.1200

Dr.Web
Trojan.MulDrop4.22250
9.0.1.0240

Emsisoft Anti-Malware
DeepScan:Generic.Mitglied
8.13.08.28.01

F-Prot
W32/AdAgent.AI.gen
v6.4.7.1.166

F-Secure
DeepScan:Generic.Mitglied
11.2013-28-08_4

G Data
DeepScan:Generic.Mitglied
13.8.22

K7 AntiVirus
Adware
13.170.9059

McAfee
Artemis!75CF6B3E47B3
5600.7180

MicroWorld eScan
DeepScan:Generic.Mitglied
14.0.0.1062

Panda Antivirus
Suspicious file
13.08.28.01

SUPERAntiSpyware
Heur.Agent/Gen-WhiteBox
10705

Trend Micro House Call
TROJ_GEN
7.2.240

Trend Micro
TROJ_GEN
10.465.28

VIPRE Antivirus
InstallMonetizer
19732

File size:
1.4 MB (1,440,926 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\raggatone5pl_6715.exe

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:iHus872umRguuUmCr9uejsx6+G+8HXbJd5A8z3rGdKN2mwx8w8OSQ:iTYrmRguSC1jsMX+ybSVEM8w8OSQ

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9780

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file raggatone5pl_6715.exe has been seen being distributed by the following URL.

Remove raggatone5pl_6715.exe - Powered by Reason Core Security