barbie the pearl princess 2014 brrip x264 ac3 titan.mkv__3515_i620125474_il10991689.exe

The executable barbie the pearl princess 2014 brrip x264 ac3 titan.mkv__3515_i620125474_il10991689.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from download.getlinksinaseconds.com and multiple other hosts.
Version:
1.1.5.90

MD5:
835a8fd4b9e3d9ed51857f7b189a344a

SHA-1:
c7cb758de6a8a40aa8bdbd5bd28bdb1769d188d4

SHA-256:
808fe7dedf4cc6f59be0d10234fdc75c66f94ee7f9158f051f543f71d9872963

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/23/2024 2:33:57 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation.IMP
16.2.18.2

File size:
332 KB (339,968 bytes)

Product version:
1.1.5.90

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\barbie the pearl princess 2014 brrip x264 ac3 titan.mkv__3515_i620125474_il10991689.exe

File PE Metadata
Compilation timestamp:
5/1/2014 3:02:03 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:PEn+grGEGy8tsPo/orNHcBm2idZVrey7B1KJlVDmJNRpqHYlU31e22X:PEn+gCxyGsPeorNHUm2U7XKJHmTRQH82

Entry address:
0x282F1

Entry point:
E8, AB, 9F, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F...
 
[+]

Code size:
237 KB (242,688 bytes)

The file barbie the pearl princess 2014 brrip x264 ac3 titan.mkv__3515_i620125474_il10991689.exe has been seen being distributed by the following 2 URLs.