dlya_zanyatij_v_trenazhernom_zale_kachalka_trenazhernyj_zal_-_dlya_uznanie_nazvanie_treka_nazhmite_n

CORLEON GROUP LTD

The file dlya_zanyatij_v_trenazhernom_zale_kachalka_trenazhernyj_zal_-_dlya_uznanie_nazvanie_treka_nazhmite_n by CORLEON GROUP has been detected as adware by 24 anti-malware scanners. The file has been seen being downloaded from 4a6ccbmgweohb6s.akyoab.ru.
Publisher:
CORLEON GROUP LTD  (signed and verified)

Version:
1.0.0.0

MD5:
fd94f0339873887285c64ebb1709aa34

SHA-1:
e22f48cb22801627cf4894e45eb3cd83d0da3003

SHA-256:
d24b75db0633adfe277e87978bb1280e094cb667f44627b8085098db30af86db

Scanner detections:
24 / 68

Status:
Adware

Analysis date:
6/23/2025 4:44:29 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.12449342
6736976

Agnitum Outpost
Trojan.InstallMonster
7.1.1

Avira AntiVirus
APPL/InstallMonst.QA
7.11.197.100

avast!
Win32:InstallMonstr-DY [PUP]
2014.9-150309

Bitdefender
Trojan.Generic.12449342
1.0.20.340

Dr.Web
Trojan.InstallMonster.242
9.0.1.068

Emsisoft Anti-Malware
Trojan.Generic.12449342
9.0.0.4799

ESET NOD32
Win32/InstallMonstr.EU potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.1816028
3/9/2015

F-Prot
W32/InstallMonster.AD.gen
v6.4.7.1.166

F-Secure
Trojan.Generic.12449342
5.13.68

G Data
Win32.Application.Installmonstr
15.3.24

K7 AntiVirus
Trojan
13.188.14410

MicroWorld eScan
Trojan.Generic.12449342
16.0.0.204

NANO AntiVirus
Trojan.Win32.InstallMonster.dbipfy
0.28.6.64267

Norman
Trojan.Generic.12449342
02.01.2015 13:58:24

nProtect
Trojan.Generic.12449342
15.03.09.01

Panda Antivirus
PUP/InstallMonstr
15.03.09.07

Reason Heuristics
PUP.CORLEONGROUP
15.3.9.7

Rising Antivirus
PE:Adware.SMSHoax!6.12FE
23.00.65.15307

Sophos
PUA 'Install Monster'
59

Vba32 AntiVirus
Signed-Downware.InstallMonstr
3.12.26.3

VIPRE Antivirus
Threat.4845009
35418

File size:
3.8 MB (4,008,872 bytes)

Product version:
1.0.0.0

Common path:
C:\documents and settings\loner\??? ?????????\downloads\dlya_zanyatij_v_trenazhernom_zale_kachalka_trenazhernyj_zal_-_dlya_uznanie_nazvanie_treka_nazhmite_na_te_(get-tune.net).exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2014 2:00:00 AM

Valid to:
1/17/2015 1:59:59 AM

Subject:
CN=CORLEON GROUP LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CORLEON GROUP LTD, L=Mahe, S=Maine, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
05D1EDA621A201F36C3E158FEB2D4DC2

File PE Metadata
Compilation timestamp:
6/16/2014 4:37:39 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:1H3Q3JhNA6GHrQRpxvJRelmalGTSooneGs0Fu5UP7vESe413e2GR9FruAbWnLkZN:K3Jn+H0RpxvzelmaqSsG1rXtgFanoZN

Entry address:
0x952200

Entry point:
60, BE, 00, F0, 9F, 00, 8D, BE, 00, 20, A0, FF, C7, 87, 18, 9C, 6B, 00, E0, 62, 7F, E8, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
3.3 MB (3,489,792 bytes)

The file dlya_zanyatij_v_trenazhernom_zale_kachalka_trenazhernyj_zal_-_dlya_uznanie_nazvanie_treka_nazhmite_n has been seen being distributed by the following URL.