× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0d5bb83c6efffa341ed148d771fce4738fb006736f670c376ed26a2324c4efd2
File name: output.114704571.txt
Detection ratio: 53 / 69
Analysis date: 2018-12-16 07:42:58 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Generic.Delph.PWS.E06EBA9A 20181216
AegisLab Trojan.Win32.Delf.moev 20181214
AhnLab-V3 Malware/Win32.Generic.C2622462 20181216
ALYac Generic.Delph.PWS.E06EBA9A 20181216
Antiy-AVL Trojan[Ransom]/Win32.Blocker 20181216
Arcabit Generic.Delph.PWS.E06EBA9A 20181216
Avast Win32:Malware-gen 20181216
AVG Win32:Malware-gen 20181216
Avira (no cloud) TR/AD.MoksSteal.elw 20181216
BitDefender Generic.Delph.PWS.E06EBA9A 20181216
CAT-QuickHeal Trojan.Sigmal.S3989901 20181215
ClamAV Win.Ransomware.Delf-6651871-0 20181216
Comodo Malware@#12q0lbxefug3q 20181216
CrowdStrike Falcon (ML) malicious_confidence_80% (W) 20181022
Cylance Unsafe 20181216
Cyren W32/PWS.stealer.A.gen!Eldorado 20181216
DrWeb Trojan.PWS.Stealer.24300 20181216
Emsisoft Generic.Delph.PWS.E06EBA9A (B) 20181216
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/PSW.Delf.OSF 20181216
F-Prot W32/PWS.stealer.A.gen!Eldorado 20181216
F-Secure Generic.Delph.PWS.E06EBA9A 20181216
Fortinet W32/Delf.OSF!tr 20181216
GData Generic.Delph.PWS.E06EBA9A 20181216
Ikarus Trojan-PSW.Delf 20181216
Sophos ML heuristic 20181128
Jiangmin Trojan.PSW.Coins.buh 20181216
K7AntiVirus Password-Stealer ( 0052f96e1 ) 20181215
K7GW Password-Stealer ( 0052f96e1 ) 20181215
Kaspersky Trojan-Ransom.Win32.Blocker.lckf 20181216
Malwarebytes Trojan.AzorUlt 20181216
MAX malware (ai score=100) 20181216
McAfee GenericRXGI-KI!8CD2F046B436 20181216
McAfee-GW-Edition GenericRXGI-KI!8CD2F046B436 20181215
Microsoft PWS:Win32/Stimilina.E!bit 20181215
eScan Generic.Delph.PWS.E06EBA9A 20181216
NANO-Antivirus Trojan.Win32.Stealer.fflqpr 20181216
Palo Alto Networks (Known Signatures) generic.ml 20181216
Panda Trj/Genetic.gen 20181215
Qihoo-360 Win32/Trojan.31e 20181216
Rising Ransom.Blocker!8.12A (CLOUD) 20181216
Sophos AV Troj/PWS-CJJ 20181216
SUPERAntiSpyware Trojan.Agent/Gen-Crypt 20181212
Symantec Trojan.Coinstealer 20181215
Trapmine malicious.high.ml.score 20181205
TrendMicro TrojanSpy.Win32.CLIPBANKER.SMMR 20181216
TrendMicro-HouseCall TrojanSpy.Win32.CLIPBANKER.SMMR 20181216
VBA32 BScope.TrojanRansom.Blocker 20181214
VIPRE Trojan.Win32.Generic!BT 20181216
Webroot W32.Trojan.Gen 20181216
Yandex Trojan.Blocker!m3aQMhOteaA 20181214
Zillya Trojan.Blocker.Win32.40079 20181215
ZoneAlarm by Check Point Trojan-Ransom.Win32.Blocker.lckf 20181216
Alibaba 20180921
Avast-Mobile 20181215
Babable 20180918
Baidu 20181207
Bkav 20181214
CMC 20181216
Cybereason 20180225
Kingsoft 20181216
SentinelOne (Static ML) 20181011
Symantec Mobile Insight 20181215
TACHYON 20181214
Tencent 20181216
TheHacker 20181213
TotalDefense 20181215
Trustlook 20181216
ViRobot 20181215
Zoner 20181216
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0001A1F8
Number of sections 5
PE sections
PE imports
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
FreeSid
DeleteDC
SelectObject
BitBlt
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
EnterCriticalSection
GetSystemInfo
FreeLibrary
QueryPerformanceCounter
ExitProcess
GetThreadLocale
GlobalUnlock
GetModuleFileNameA
RtlUnwind
LoadLibraryA
CopyFileW
DeleteCriticalSection
GetStartupInfoA
GetLocaleInfoA
LocalAlloc
FindClose
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateDirectoryW
GetCommandLineA
GlobalLock
RaiseException
WideCharToMultiByte
GetModuleHandleA
FindNextFileW
WriteFile
GetCurrentProcess
DeleteFileW
FindFirstFileW
GetCurrentThreadId
LocalFree
InitializeCriticalSection
VirtualFree
GetFileAttributesW
Sleep
GetTickCount
GetVersion
GetProcAddress
VirtualAlloc
GetCurrentProcessId
LeaveCriticalSection
CoCreateInstance
OleInitialize
SysReAllocStringLen
SysFreeString
SysAllocStringLen
ReleaseDC
GetSystemMetrics
CharToOemBuffA
CharNextA
MessageBoxA
GetKeyboardType
GetDC
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:20 00:22:17+02:00

FileType
Win32 EXE

PEType
PE32

CodeSize
103424

LinkerVersion
2.25

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0x1a1f8

InitializedDataSize
10752

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 8cd2f046b4364d3c3d9bf8fb0dd58dff
SHA1 b9f4d1059c8fbc6670349c6032949ec3995676fb
SHA256 0d5bb83c6efffa341ed148d771fce4738fb006736f670c376ed26a2324c4efd2
ssdeep
3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/Exg/:Zzx7ZApszolIo7lf/ipT/E

authentihash f3267fe0a633880263d5d2b61f3ca5fbe27177837e889b86643cb27d01e73a37
imphash 6d1f2b41411eacafcf447fc002d8cb00
File size 112.5 KB ( 115200 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (40.5%)
Win32 Dynamic Link Library (generic) (20.3%)
Win32 Executable (generic) (13.9%)
Win16/32 Executable Delphi generic (6.4%)
OS/2 Executable (generic) (6.2%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2018-11-24 19:26:42 UTC ( 3 months, 3 weeks ago )
Last submission 2019-03-14 11:49:25 UTC ( 6 days, 3 hours ago )
File names output.114704571.txt
bin.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
DNS requests
UDP communications