raidcall_v7.3.6.exe

Raidcall

Innovative Systems LLC

The application raidcall_v7.3.6.exe by Innovative Systems has been detected as adware by 21 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. The file has been seen being downloaded from raidcall.joydownload.com.
Publisher:
Innovative Systems LLC  (signed and verified)

Product:
Raidcall

Version:
1.0.0.0

MD5:
4f11c9d0527acd66beea1f1245d1de4d

SHA-1:
5b97d965e7f3bd7db8dcd7d7e66256847f90ce8f

SHA-256:
6fa3bc379584c712cf418de119c299bb6c2fd865d535caf7549a80bd2f53a59b

Scanner detections:
21 / 68

Status:
Adware

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
5/3/2024 10:54:58 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.OpenCandy
2015.04.12

Avira AntiVirus
APPL/Downloader.Gen
7.11.182.18

avast!
Win32:Malware-gen
2014.9-150919

AVG
Generic
2016.0.2981

Baidu Antivirus
Adware.Win32.OpenCandy
4.0.3.15919

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Agent-803351
0.98/21511

Dr.Web
Threat.Undefined
9.0.1.0262

ESET NOD32
Win32/JoyDownloader
9.10141

G Data
Win32.Adware.OpenCandy
15.9.25

K7 AntiVirus
Trojan
13.202.15563

Malwarebytes
PUP.Optional.OpenCandy
v2015.09.19.05

McAfee
Artemis!4F11C9D0527A
5600.6637

NANO AntiVirus
Riskware.Win32.Downware.dejknq
0.28.6.62995

Qihoo 360 Security
Win32/RootKit.Rootkit.7e5
1.0.0.1015

Reason Heuristics
PUP.InnovativeSystems.Installer (M)
15.9.19.17

Sophos
Generic PUA FL
4.98

Trend Micro House Call
Suspicious_GEN.F47V0716
7.2.262

Trend Micro
ADW_JOYLOAD
10.465.19

VIPRE Antivirus
Opencandy
31528

File size:
489.6 KB (501,392 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\raidcall_v7.3.6.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/19/2014 3:00:00 AM

Valid to:
5/20/2015 2:59:59 AM

Subject:
CN=Innovative Systems LLC, O=Innovative Systems LLC, L=Dnepropetrovsk, S=Dnepropetrovska oblast, C=UA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
450EACFE8D673E82864CE46BC1A92FCA

File PE Metadata
Compilation timestamp:
5/20/2013 2:53:11 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:jKc+UUchnsb4x2PQpEcDA0zVdo8mIYTfsHSnFlJheMZ:1+bkscx2QphrzHobgynFkG

Entry address:
0x333E

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, 30, A2, 40, 00, 89, 6C, 24, 14, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, BC, 80, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 08, A3, 78, 4F, 43, 00, E8, A8, 2E, 00, 00, A3, C4, 4E, 43, 00, 55, 8D, 44, 24, 34, 68, B4, 02, 00, 00, 50, 55, 68, F0, B1, 42, 00, FF, 15, 7C, 81, 40, 00, 68, 7C, A3, 40, 00, 68, C0, 3E, 43, 00, E8, 13, 2B, 00, 00, FF, 15, 34, 81, 40, 00, BB, 00, F0, 43, 00, 50, 53, E8, 01, 2B, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file raidcall_v7.3.6.exe has been seen being distributed by the following URL.

Remove raidcall_v7.3.6.exe - Powered by Reason Core Security