× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0610dae1ee563513ec9bab3ae13b0eb2ee509a791f79b6b8bbf91fd46aaca2c4
File name: 0610dae1ee563513ec9bab3ae13b0eb2ee509a791f79b6b8bbf91fd46aaca2c4
Detection ratio: 57 / 68
Analysis date: 2018-06-07 13:50:18 UTC ( 1 month, 2 weeks ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.12530567 20180607
AegisLab Uds.Dangerousobject.Multi!c 20180607
AhnLab-V3 Trojan/Win32.Locky.R211977 20180607
ALYac Trojan.Ransom.LockyCrypt 20180607
Antiy-AVL Trojan/Win32.TSGeneric 20180607
Arcabit Trojan.Generic 20180607
Avast Win32:Malware-gen 20180607
AVG Win32:Malware-gen 20180607
Avira (no cloud) TR/Crypt.Xpack.rgviq 20180607
AVware Trojan.Win32.Generic!BT 20180607
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180607
BitDefender Trojan.GenericKD.12530567 20180607
Bkav HW32.Packed.1D5C 20180607
CAT-QuickHeal Udsdangerousobject.Multi 20180607
ClamAV Win.Trojan.Agent-6364056-0 20180607
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cybereason malicious.dfc7ee 20180225
Cylance Unsafe 20180607
Cyren W32/Locky.HL.gen!Eldorado 20180607
DrWeb Trojan.Encoder.14922 20180607
Emsisoft Trojan-Ransom.Locky (A) 20180607
Endgame malicious (high confidence) 20180507
ESET-NOD32 Win32/Filecoder.Locky.M 20180607
F-Prot W32/Locky.HL.gen!Eldorado 20180607
F-Secure Trojan.GenericKD.12530567 20180607
Fortinet W32/Kryptik.FYKM!tr.ransom 20180607
GData Win32.Trojan-Ransom.Locky.V90CG9 20180607
Ikarus Trojan.Crypt 20180607
Sophos ML heuristic 20180601
Jiangmin Trojan.Ransom.Locky.a 20180607
K7AntiVirus Trojan ( 00517c701 ) 20180607
K7GW Trojan ( 00517c701 ) 20180607
Kaspersky Trojan.Win32.Agentb.ivun 20180607
Malwarebytes Trojan.MalPack.Generic 20180607
MAX malware (ai score=100) 20180607
McAfee Generic.adu 20180607
McAfee-GW-Edition BehavesLike.Win32.Ramnit.jc 20180607
Microsoft Ransom:Win32/Locky.A 20180607
eScan Trojan.GenericKD.12530567 20180607
NANO-Antivirus Trojan.Win32.Encoder.ewtcur 20180607
Palo Alto Networks (Known Signatures) generic.ml 20180607
Panda Trj/RansomCrypt.E 20180607
Qihoo-360 Win32/Trojan.Multi.daf 20180607
Rising Ransom.Locky!8.1CD4 (KTSE) 20180607
Sophos AV Troj/Ransom-ERN 20180607
Symantec Ransom.TeslaCrypt 20180607
Tencent Win32.Trojan.Filecoder.Ednk 20180607
TrendMicro Ransom_LOCKY.DLDTAUI 20180607
TrendMicro-HouseCall Ransom_LOCKY.DLDTAUI 20180607
VBA32 Trojan.FakeAV.01657 20180607
VIPRE Trojan.Win32.Generic!BT 20180607
ViRobot Trojan.Win32.Z.Locky.614400.L 20180607
Webroot W32.Dropper.Gen 20180607
Yandex Trojan.Locky! 20180529
Zillya Trojan.Locky.Win32.3238 20180606
ZoneAlarm by Check Point Trojan.Win32.Agentb.ivun 20180607
Zoner Trojan.Locky 20180606
Alibaba 20180607
Avast-Mobile 20180607
Babable 20180406
CMC 20180607
Comodo 20180607
eGambit 20180607
Kingsoft 20180607
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180607
Symantec Mobile Insight 20180605
TACHYON 20180607
TheHacker 20180606
TotalDefense 20180607
Trustlook 20180607
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-06-11 07:05:41
Entry Point 0x0000EA13
Number of sections 4
PE sections
PE imports
CmMalloc
CmRealloc
CmAtolA
CertDeleteCRLFromStore
CertAlgIdToOID
CertGetNameStringA
CertDuplicateCRLContext
CertCompareCertificate
CertCloseStore
CertFindExtension
CertControlStore
CryptEnumOIDInfo
CertFindChainInStore
CertFindAttribute
CertSaveStore
CryptFindOIDInfo
CertNameToStrA
EnterCriticalSection
LoadLibraryW
lstrcmp
WaitForSingleObjectEx
GetFileSize
lstrcatA
SetFileTime
GetStartupInfoW
GetCommandLineA
GetProcAddress
ReadConsoleA
CreateSemaphoreA
GetStringTypeA
GetModuleHandleA
CreateFileMappingA
FindNextFileA
GetSystemDirectoryA
GetVersion
IsBadStringPtrW
SearchPathW
FindClose
MoveFileW
GetCurrentThreadId
DeleteFileW
GetExpandedNameA
SE_IsShimDll
SE_InstallBeforeInit
wsprintfA
CreateWindowExA
LoadCursorA
PeekMessageA
GetClassLongW
PostMessageA
LoadBitmapW
DrawStateA
LoadMenuW
LoadStringW
LoadImageA
LoadIconW
DialogBoxParamA
MessageBoxW
IsCharLowerW
GetPropA
CreateDesktopW
LoadIconA
Number of PE resources by type
DCXA 2
Number of PE resources by language
NEUTRAL 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2015:06:11 08:05:41+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
599552

LinkerVersion
10.0

EntryPoint
0xea13

InitializedDataSize
13824

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

Compressed bundles
File identification
MD5 fd18bebdfc7ee86b2dc299ff3b53bb30
SHA1 7cc63d85fabe99c64f94c6c8089575f566519fc1
SHA256 0610dae1ee563513ec9bab3ae13b0eb2ee509a791f79b6b8bbf91fd46aaca2c4
ssdeep
12288:NyK3FAyt2y5esclHdwCVJEJHGMWxfLoFB5nVRZ6mOkJuij0:NyoFVes8HCCVJEZGMWBUNVP6mNjj

authentihash 934ddc08d4cedb90acc3adbcc142b2cab1c2a7fc329a6fbfb50a405bcfa028bc
imphash 96c766b3e774d8e412189713e40b75ea
File size 600.0 KB ( 614400 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (40.5%)
Win32 Dynamic Link Library (generic) (20.3%)
Win32 Executable (generic) (13.9%)
Win16/32 Executable Delphi generic (6.4%)
OS/2 Executable (generic) (6.2%)
Tags
peexe

VirusTotal metadata
First submission 2017-11-02 13:01:15 UTC ( 8 months, 3 weeks ago )
Last submission 2018-05-19 16:03:09 UTC ( 2 months ago )
File names fd18bebdfc7ee86b2dc299ff3b53bb30.exe
VirusShare_fd18bebdfc7ee86b2dc299ff3b53bb30
fd18bebdfc7ee86b2dc299ff3b53bb30.virobj
locky1
O77enbdGF5.exe
fd18bebdfc7ee86b2dc299ff3b53bb30.exe
envbit32.exe
O77enbdGF5
output.112405441.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Opened mutexes
Opened service managers
Opened services
Runtime DLLs