tfile.org.216525.exe

CORLEON GROUP LTD

The application tfile.org.216525.exe by CORLEON GROUP has been detected as adware by 26 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from dlrundnl.ru.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
fc4ea886ab507e396c909f6237ebfaf7

SHA-1:
da7907228dcb8507c0f66605794775f559ed8532

SHA-256:
56b90e2ea5b6de33e6c0f96d977d0fe9a0b29c55c5de73dc01e4f8fac893a51e

Scanner detections:
26 / 68

Status:
Adware

Analysis date:
4/19/2024 12:25:16 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.10205702
850

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.InstallMonster
2014.10.04

Avira AntiVirus
APPL/InstallMonster.Gen
7.11.176.116

avast!
Win32:InstallMonstr-DL [PUP]
2014.9-141008

AVG
InstallMonster
2015.0.3328

Bitdefender
Trojan.Generic.10205702
1.0.20.1405

Dr.Web
Trojan.InstallMonster.38
9.0.1.0281

Emsisoft Anti-Malware
Trojan.Generic.10205702
8.14.10.08.10

ESET NOD32
Win32/InstallMonstr.AJ potentially unwanted application
8.7.0.302.0

F-Secure
Trojan.Generic.10205702
11.2014-08-10_4

G Data
Trojan.Generic.10205702
14.10.24

K7 AntiVirus
Trojan
13.183.13550

Kaspersky
not-a-virus:HEUR:Downloader.Win32.Monstruos
14.0.0.3133

MicroWorld eScan
Trojan.Generic.10205702
15.0.0.843

NANO AntiVirus
Trojan.Win32.InstallMonster.dbipfy
0.28.2.62440

Norman
InstallMonstr.END
11.20141008

nProtect
Trojan.Generic.10205702
14.10.02.01

Panda Antivirus
PUP/InstallMonstr
14.10.08.10

Reason Heuristics
PUP.CORLEONGROUP.O
14.8.7.1

Sophos
Install Monster
4.98

Trend Micro House Call
TROJ_MONSTRUOS_DD30049C.UVPA
7.2.281

Trend Micro
TROJ_MONSTRUOS_DD30049C.UVPA
10.465.08

Vba32 AntiVirus
Signed-Downware.InstallMonstr
3.12.26.3

VIPRE Antivirus
Threat.4845009
33520

Zillya! Antivirus
Tool.ArchSMS.Win32.20015
2.0.0.1941

File size:
3.2 MB (3,304,576 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\tfile.org.216525.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/26/2013 4:00:00 AM

Valid to:
7/27/2014 3:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3892391FD98598A279CE03AF7330DCFB

File PE Metadata
Compilation timestamp:
12/9/2013 8:48:11 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:5QcSdrvOVCzLhRyzxuLuRZ/V3S7/A/jB6KYHK2r74mNn9hCeFtt4FfNsFQj7MOCd:+cyRozxuLeZF3j8rZNtPofWuUxoen

Entry address:
0xAEFB10

Entry point:
60, BE, 00, 90, C4, 00, 8D, BE, 00, 80, 7B, FF, C7, 87, 28, 7C, 8C, 00, 4B, 16, 6C, DD, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
2.7 MB (2,781,184 bytes)

The file tfile.org.216525.exe has been seen being distributed by the following URL.

Remove tfile.org.216525.exe - Powered by Reason Core Security