raidcall_v8.1.4.exe

RAIDCALL LIMITED.

This is a setup program which is used to install the application. The file has been seen being downloaded from 210.6.198.19 and multiple other hosts.
Publisher:
RAIDCALL LIMITED.  (signed and verified)

MD5:
ab6e08f5c065538eabb4956ee8c173ab

SHA-1:
2080719c9c7dc401db500f0fcb8a71f970e229cf

SHA-256:
9e612b3397b4c01f27bdbb05ebe71c1e69ab4c74b016ac565709f181e066a6df

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 7:26:10 AM UTC  (today)

File size:
5.1 MB (5,301,776 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\raidcall_v8.1.4.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/22/2014 8:00:00 AM

Valid to:
1/23/2015 7:59:59 AM

Subject:
CN=RAIDCALL LIMITED., OU=TECH DEPT., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=RAIDCALL LIMITED., L=BEIJING, S=BEIJING, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
69EF9F7D27C07142D9046D9C43F00324

File PE Metadata
Compilation timestamp:
3/22/2010 8:59:12 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:Eq4+88IqzF0wu1jOB4Ae198UChgtgdAYuZabH0FSc4UK+v+Qyo:EqZ8dRee1mUSg+dAYuZIH6uo

Entry address:
0x114F

Entry point:
E9, EC, 56, 00, 00, E9, 27, 96, 00, 00, E9, 72, 9A, 00, 00, E9, CD, 95, 00, 00, E9, E8, AA, 00, 00, E9, C3, BA, 00, 00, E9, 5E, 9B, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC...
 
[+]

Entropy:
7.9958

Packer / compiler:
Xtreme-Protector v1.05

Code size:
57.5 KB (58,880 bytes)

The file raidcall_v8.1.4.exe has been seen being distributed by the following 2 URLs.

http://210.6.198.19/.../raidcall_v8.1.4.exe

Scan raidcall_v8.1.4.exe - Powered by Reason Core Security