wolfenstein.the.new.order.repack-r.g.mechanics.exe

Installer

TAIMED LLC

The application wolfenstein.the.new.order.repack-r.g.mechanics.exe by TAIMED has been detected as adware by 21 anti-malware scanners. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
TAIMED LLC  (signed and verified)

Product:
Installer

Description:
Taimed

Version:
1.1.0.0

MD5:
a05682d900d937fb653c067ca3b1aa88

SHA-1:
e2e23e899f45d4ed5513dbd92ad4ec7813a345f5

SHA-256:
77cba9768cd21efd8319f148d7b8bd74e34852eb35ba23eec1ddcd8c4a5a5aa7

Scanner detections:
21 / 68

Status:
Adware

Analysis date:
4/27/2024 3:15:41 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.13098102
675

Agnitum Outpost
Riskware.Hoax
7.1.1

AhnLab V3 Security
PUP/Win32.Techsnab
2015.04.01

Avira AntiVirus
TR/Agent.213264
3.6.1.96

avast!
Win32:Malware-gen
2014.9-150401

AVG
Generic
2016.0.3153

Bitdefender
Trojan.Generic.13098102
1.0.20.455

Clam AntiVirus
Win.Trojan.13098102
0.98/20289

Dr.Web
Trojan.DownLoader12.52514
9.0.1.091

Emsisoft Anti-Malware
Trojan.Generic.13098102
8.15.04.01.12

F-Prot
W32/S-6fce85de
v6.4.7.1.166

F-Secure
Trojan.Generic.13098102
11.2015-01-04_4

G Data
Trojan.Generic.13098102
15.4.25

K7 AntiVirus
Riskware
13.202.15502

MicroWorld eScan
Trojan.Generic.13098102
16.0.0.273

nProtect
Trojan.Generic.13098102
15.04.06.02

Panda Antivirus
Trj/Agent.JJW
15.04.09.03

Reason Heuristics
Threat.Installer.TAIMED
15.4.11.23

VIPRE Antivirus
Threat.4150696
38950

Zillya! Antivirus
Tool.FakeInstaller.Win32.147
2.0.0.2128

File size:
208.3 KB (213,264 bytes)

Product version:
1.1.0.0

Copyright:
Copyright 2015 TAIMED, All rights reserved.

Original file name:
instj.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\wolfenstein.the.new.order.repack-r.g.mechanics.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
6/10/2014 8:00:00 PM

Valid to:
6/10/2017 7:59:59 PM

Subject:
CN=TAIMED LLC, O=TAIMED LLC, STREET=Kirova st. 20A office 422, L=Moscow district, S=Lubertsy, PostalCode=140005, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00DC809665388D66359464C754C696D5C6

File PE Metadata
Compilation timestamp:
3/27/2015 9:32:30 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
3072:KrZMAwAgLcGEu1sl7DZrgL0guxOIiVCqqlQ+GV7M9ijrt3kDdrphvXrMB2VYWH:KrZMIgYhD1gogu8TxMYJ3WDLYWH

Entry address:
0xE664

Entry point:
E8, 43, 78, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 90, 55, 42, 00, E8, A6, 48, 00, 00, E8, 17, 7A, 00, 00, 0F, B7, F0, 6A, 02, E8, D6, 77, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 4D, 44, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
120 KB (122,880 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)