× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0b7b8b1e151740977ef16c1557491547fe5fba4835c5817296327e2d54e5bf0e
File name: kkbread.jpg
Detection ratio: 57 / 69
Analysis date: 2019-01-10 08:31:26 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.PWS.ZKD 20190110
AegisLab Trojan.Win32.naKocTb.tnB5 20190110
AhnLab-V3 Trojan/Win32.naKocTb.C1575888 20190109
ALYac Trojan.PWS.ZKD 20190110
Antiy-AVL Trojan/Win32.SGeneric 20190110
Arcabit Trojan.PWS.ZKD 20190110
Avast Win32:LokiBot-A [Trj] 20190110
AVG Win32:LokiBot-A [Trj] 20190110
Avira (no cloud) TR/Crypt.XPACK.Gen 20190110
BitDefender Trojan.PWS.ZKD 20190110
Bkav W32.TasumisCAK.Trojan 20190108
CAT-QuickHeal Trojan.Mauvaise.SL1 20190109
ClamAV Win.Trojan.naKocTb-6331389-1 20190110
Comodo TrojWare.Win32.Fareit.LB@7pzcfo 20190110
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.ed56b0 20190109
Cylance Unsafe 20190110
Cyren W32/Trojan.LAPN-1109 20190110
DrWeb Trojan.PWS.Stealer.23680 20190110
Emsisoft Trojan-PSW.Fareit (A) 20190110
Endgame malicious (high confidence) 20181108
ESET-NOD32 Win32/PSW.Fareit.L 20190110
F-Prot W32/Trojan2.PBTA 20190110
F-Secure Trojan.PWS.ZKD 20190110
Fortinet W32/Generic.AC.359BF1!tr 20190110
GData Trojan.PWS.ZKD 20190110
Ikarus Trojan-Spy.Primarypass 20190110
Sophos ML heuristic 20181128
Jiangmin Trojan.naKocTb.l 20190109
K7AntiVirus Password-Stealer ( 004d88671 ) 20190109
K7GW Password-Stealer ( 004d88671 ) 20190109
Kaspersky Trojan.Win32.Agentb.bvrg 20190110
Malwarebytes Spyware.LokiBot 20190110
MAX malware (ai score=89) 20190110
McAfee GenericRXCL-KZ!4A88B71ED56B 20190110
McAfee-GW-Edition BehavesLike.Win32.Generic.ch 20190110
Microsoft PWS:Win32/Primarypass.A 20190109
eScan Trojan.PWS.ZKD 20190110
NANO-Antivirus Trojan.Win32.Stealer.eshrhl 20190110
Palo Alto Networks (Known Signatures) generic.ml 20190110
Panda Trj/GdSda.A 20190109
Qihoo-360 HEUR/QVM20.1.72E5.Malware.Gen 20190110
Rising Trojan.Fareit!1.B343 (RDM+:cmRtazq8jIdyDMIvrIri9G6kaWnZ) 20190110
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Troj/Fareit-CHG 20190109
Symantec Infostealer!im 20190110
TACHYON Trojan/W32.naKocTb.106496 20190110
TheHacker Trojan/Fareit.l 20190106
Trapmine malicious.high.ml.score 20190103
TrendMicro TSPY_LOKI.SMA 20190110
TrendMicro-HouseCall TSPY_LOKI.SMA 20190110
VBA32 Trojan.naKocTb 20190109
ViRobot Trojan.Win32.Agent.106496.HD 20190110
Webroot W32.Trojan.Gen 20190110
Zillya Trojan.naKocTb.Win32.12 20190109
ZoneAlarm by Check Point Trojan.Win32.Agentb.bvrg 20190110
Zoner Trojan.Nakoctb 20190110
Acronis 20190110
Alibaba 20180921
Avast-Mobile 20190110
Babable 20180918
Baidu 20190110
CMC 20190110
eGambit 20190110
Kingsoft 20190110
SUPERAntiSpyware 20190109
Tencent 20190110
Trustlook 20190110
Yandex 20181229
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-06-23 16:04:21
Entry Point 0x000139DE
Number of sections 4
PE sections
PE imports
HeapAlloc
GetLastError
HeapFree
SetLastError
GetProcessHeap
SysFreeString
VariantInit
SysAllocString
getaddrinfo
socket
recv
send
WSAStartup
freeaddrinfo
connect
closesocket
CoUninitialize
CoCreateInstance
CoInitialize
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:06:23 16:04:21+00:00

FileType
Win32 EXE

PEType
PE32

CodeSize
79872

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x139de

InitializedDataSize
565760

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

Compressed bundles
File identification
MD5 4a88b71ed56b0e0f5a878dde0c6f493a
SHA1 dc83ffb3ee75c165d090956a94a8811766d092e1
SHA256 0b7b8b1e151740977ef16c1557491547fe5fba4835c5817296327e2d54e5bf0e
ssdeep
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmdq:nSHIG6mQwGmfOQd8YhY0/EqUGq

authentihash 907bd5087fdfbbb73d5319b787fd8446cf78951ad82670ef3253c3ea7591c9cc
imphash 0239fd611af3d0e9b0c46c5837c80e09
File size 104.0 KB ( 106496 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-10 06:52:01 UTC ( 2 months, 1 week ago )
Last submission 2019-03-08 08:25:18 UTC ( 2 weeks, 1 day ago )
File names virus.exe
1.bin
01EF51.exe
kkbread.jpg
kkbread.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Created mutexes
Runtime DLLs
HTTP requests
DNS requests
TCP connections