timati_ft_grigoriy_leps_-_rekviem_po_lyubvi.exe

LLC Mail.Ru

The executable timati_ft_grigoriy_leps_-_rekviem_po_lyubvi.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from dls1.mailru.su.
Publisher:
LLC Mail.Ru  (signed and verified)

MD5:
cdd4d0e82e809e3e9c30910e19cb23b2

SHA-1:
1b057fd837b3a15a95f471ad6a6e455838cdcd35

SHA-256:
f0c537420ab345593a1725059a2d14f9d00d25bd7643ba59eb8382273122224e

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/18/2024 3:02:42 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Win32.Generic
16.7.5.6

File size:
157.9 KB (161,688 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\timati_ft_grigoriy_leps_-_rekviem_po_lyubvi.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
12/9/2011 4:00:00 AM

Valid to:
2/7/2014 3:59:59 AM

Subject:
CN=LLC Mail.Ru, O=LLC Mail.Ru, L=Moscow, S=Moscow, C=RU

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
1C09DBBC732D4B58F7A88EBACF323417

File PE Metadata
Compilation timestamp:
5/10/2013 1:21:42 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
3072:qYniHqUhgjBP5Y4gCPkObN/cLtnT2KxaCUggEs:qYnXOgp/P3x/cRnioBUggEs

Entry address:
0x1140

Entry point:
55, 89, E5, 83, EC, 18, C7, 04, 24, 02, 00, 00, 00, FF, 15, F8, 41, 42, 00, E8, C8, FE, FF, FF, 90, 8D, B4, 26, 00, 00, 00, 00, 55, 89, E5, 83, EC, 18, C7, 04, 24, 01, 00, 00, 00, FF, 15, F8, 41, 42, 00, E8, A8, FE, FF, FF, 90, 8D, B4, 26, 00, 00, 00, 00, 55, 89, E5, 53, 83, EC, 14, 8B, 45, 08, 8B, 00, 8B, 00, 3D, 91, 00, 00, C0, 77, 3B, 3D, 8D, 00, 00, C0, 72, 4B, BB, 01, 00, 00, 00, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 08, 00, 00, 00, E8, 7F, 61, 00, 00, 83, F8, 01, 0F, 84, F1, 00, 00, 00, 85, C0...
 
[+]

Code size:
35 KB (35,840 bytes)

The file timati_ft_grigoriy_leps_-_rekviem_po_lyubvi.exe has been seen being distributed by the following URL.