× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 03933955105da6f2e446768096eba81079ebea51411083a88348a1e8ea466857
File name: 2018-09-11-Hancitor-malware-binary.exe
Detection ratio: 24 / 67
Analysis date: 2018-09-11 18:50:02 UTC ( 7 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.390015 20180911
ALYac Gen:Variant.Razy.390015 20180911
Arcabit Trojan.Razy.D5F37F 20180911
Avast FileRepMalware 20180911
AVG FileRepMalware 20180911
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9975 20180910
BitDefender Gen:Variant.Razy.390015 20180911
Bkav HW32.Packed. 20180911
CrowdStrike Falcon (ML) malicious_confidence_70% (D) 20180723
Cylance Unsafe 20180911
Emsisoft Gen:Variant.Razy.390015 (B) 20180911
Endgame malicious (high confidence) 20180730
F-Secure Gen:Variant.Razy.390015 20180911
GData Gen:Variant.Razy.390015 20180911
Sophos ML heuristic 20180717
MAX malware (ai score=84) 20180911
McAfee Artemis!A1AC08123D98 20180911
Microsoft Trojan:Win32/Fuerboos.A!cl 20180911
eScan Gen:Variant.Razy.390015 20180911
Palo Alto Networks (Known Signatures) generic.ml 20180911
Qihoo-360 HEUR/QVM20.1.CC48.Malware.Gen 20180911
TrendMicro Mal_HPHancitor-1 20180911
TrendMicro-HouseCall Mal_HPHancitor-1 20180911
Webroot W32.Trojan.Gen 20180911
AegisLab 20180911
AhnLab-V3 20180911
Alibaba 20180713
Antiy-AVL 20180911
Avast-Mobile 20180911
Avira (no cloud) 20180911
AVware 20180911
Babable 20180907
CAT-QuickHeal 20180909
ClamAV 20180911
CMC 20180911
Comodo 20180911
Cybereason 20180225
Cyren 20180911
DrWeb 20180911
eGambit 20180911
ESET-NOD32 20180911
F-Prot 20180911
Fortinet 20180911
Ikarus 20180911
Jiangmin 20180911
K7AntiVirus 20180911
K7GW 20180911
Kaspersky 20180911
Kingsoft 20180911
Malwarebytes 20180911
NANO-Antivirus 20180911
Panda 20180911
Rising 20180911
SentinelOne (Static ML) 20180830
Sophos AV 20180911
SUPERAntiSpyware 20180907
Symantec 20180911
Symantec Mobile Insight 20180911
TACHYON 20180911
Tencent 20180911
TheHacker 20180907
TotalDefense 20180911
Trustlook 20180911
VBA32 20180911
VIPRE 20180911
ViRobot 20180911
Yandex 20180910
Zillya 20180911
ZoneAlarm by Check Point 20180911
Zoner 20180910
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Benjamin Pasero

Product RSSOwl
File version 2.2.0
Description RSSOwl
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-17 09:20:10
Entry Point 0x00002A4F
Number of sections 4
PE sections
PE imports
GetStdHandle
GetFileAttributesA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetConsoleMode
GetLocaleInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
HeapReAlloc
GetStringTypeW
ConnectNamedPipe
FreeLibrary
MoveFileA
GetThreadPriority
GetEnvironmentVariableA
LoadResource
TlsGetValue
SetLastError
GetSystemTime
ExitThread
ReadConsoleInputA
ExitProcess
EnumSystemLocalesA
GetSystemDefaultLCID
MultiByteToWideChar
GetModuleHandleA
GlobalAddAtomW
CreateThread
SetUnhandledExceptionFilter
MulDiv
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
SetEndOfFile
GetCurrentThreadId
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
DeleteVolumeMountPointA
GetStartupInfoA
CreateDirectoryA
GetWindowsDirectoryA
GetUserDefaultLCID
CompareStringW
CompareStringA
IsValidLocale
GetProcAddress
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
InitializeCriticalSection
LCMapStringW
HeapCreate
GetSystemInfo
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentProcessId
LockResource
HeapSize
GetCommandLineA
InterlockedCompareExchange
CancelIo
GetSystemDefaultLangID
RaiseException
SetFilePointer
CloseHandle
GetACP
GetVersion
SizeofResource
IsValidCodePage
SetConsoleMode
VirtualFree
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
Number of PE resources by type
RT_DIALOG 30
RT_ICON 6
TEXT 1
RT_STRING 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 39
NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.2.0.0

LanguageCode
Neutral

FileFlagsMask
0x0000

FileDescription
RSSOwl

ImageFileCharacteristics
Executable, Large address aware, 32-bit, System file

CharacterSet
Windows, Latin1

InitializedDataSize
40960

EntryPoint
0x2a4f

MIMEType
application/octet-stream

LegalCopyright
Benjamin Pasero

FileVersion
2.2.0

TimeStamp
2018:06:17 10:20:10+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
RSSOwl Team

CodeSize
49664

ProductName
RSSOwl

ProductVersionNumber
2.2.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 a1ac08123d98990c905e2608ce25d5e6
SHA1 74188eaac4305ccbe62616fc75e8b676da262a80
SHA256 03933955105da6f2e446768096eba81079ebea51411083a88348a1e8ea466857
ssdeep
1536:xuYoZfYlmED/wSTX+7eeuigERoexB0vTTrFXr/Lq4OZZZLlCDRDUibapdpPO6Nj:toZfYA4rTXAeuue30vTlr186RDBb1Qj

authentihash 961735b8eea28a02961f725f8d4c8e8315212b2b5d78c51acec71bfcaacd18bd
imphash 2782dd356b93a9dff2527915c08caf06
File size 89.0 KB ( 91136 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Win32 Executable (generic) (35.9%)
OS/2 Executable (generic) (16.1%)
Clipper DOS Executable (16.0%)
Generic Win/DOS Executable (15.9%)
DOS Executable Generic (15.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-11 18:50:02 UTC ( 7 months, 1 week ago )
Last submission 2018-09-11 18:50:02 UTC ( 7 months, 1 week ago )
File names 2018-09-11-Hancitor-malware-binary.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Terminated processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications