mariposa traicionera al estilo de mana karaoke version.mp4.exe

On That

The To

The executable mariposa traicionera al estilo de mana karaoke version.mp4.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from liversal.net.
Publisher:
The To

Product:
On That

Description:
Sealed Not

Version:
3.7.1.6

MD5:
54b830ef92fb8ddf5d455a0222a1ba73

SHA-1:
b948b6ab409990445b0484a274528e42df6807a2

SHA-256:
6abf4e62dd25722f683912696323e3ed54fd6b1483444f9620bc8c7830ced447

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
1/13/2025 6:17:55 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation.IMP
16.7.19.15

File size:
832 KB (851,968 bytes)

Product version:
7.8.6.5

Copyright:
All rights reserved for The To LTD.

Original file name:
Mariposa Traicionera al estilo de Mana K.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\mariposa traicionera al estilo de mana karaoke version.mp4.exe

File PE Metadata
Compilation timestamp:
6/29/2012 6:01:56 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:ic8mGY52OkeWTNPLatl7rSx+hKWnOE1Cl:ic8mGTN0lXm+hRkl

Entry address:
0x19B42

Entry point:
E8, 88, 48, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 10, E4, 43, 00, E8, E8, 0D, 00, 00, E8, 55, 4A, 00, 00, 0F, B7, F0, 6A, 02, E8, 1B, 48, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, D5, 06, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
135.5 KB (138,752 bytes)

The file mariposa traicionera al estilo de mana karaoke version.mp4.exe has been seen being distributed by the following URL.