stomate - papautai (loop busters version).mp3.exe

VKontakte DJ

The application stomate - papautai (loop busters version).mp3.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a self-extracting archive and installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from musicloader.fr.
Product:
VKontakte DJ

Description:
VKDJ, Setup

Version:
1.4.21.0

MD5:
c42fb59c170e9722a43dd8b377e09e71

SHA-1:
5d30da1f9fecd9f1f9ed982e9ee85744fb754497

SHA-256:
78a8c314f3f4ddd0db52098310e8258eae83b012fc5093e2b994a9a933959b42

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/5/2024 5:37:24 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.RECORD.Installer
16.7.4.20

File size:
2.9 MB (3,005,038 bytes)

Product version:
1.4

Copyright:
Copyright (C) 2008. All rights reserved.

Original file name:
VKontakte-DJ.exe

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
6/20/1992 1:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:5J/oFJFq/phz0ICZ2uXlxAModKzpfMSeWjDfcsOG4HfAu2qTh78:LoWz3IVxAMqKzdMSrfcZG4Yuq

Entry address:
0xAF54C

Entry point:
55, 8B, EC, 83, C4, F0, B8, BC, F0, 4A, 00, E8, 48, 76, F5, FF, A1, 98, 32, 4B, 00, 8B, 00, E8, D8, FA, FA, FF, 8B, 0D, AC, 2E, 4B, 00, A1, 98, 32, 4B, 00, 8B, 00, 8B, 15, 5C, BB, 4A, 00, E8, D8, FA, FA, FF, A1, 98, 32, 4B, 00, 8B, 00, E8, 4C, FB, FA, FF, E8, 2F, 4F, F5, FF, 8D, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
697.5 KB (714,240 bytes)

The file stomate - papautai (loop busters version).mp3.exe has been seen being distributed by the following URL.