× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 11fc012ccebfd56188c513969da07b9af000a0fa3a6826ed3e8a9ef3c889e128
File name: ac15ae783f6029b0adc27a9546c15843.virus
Detection ratio: 22 / 70
Analysis date: 2019-02-04 17:21:05 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Antiy-AVL Trojan[Banker]/Win32.IcedID 20190204
Avast Win32:Malware-gen 20190204
AVG Win32:Malware-gen 20190204
Avira (no cloud) TR/AD.IcedId.ttghg 20190204
DrWeb Trojan.Inject3.12546 20190204
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GPGV 20190204
K7AntiVirus Riskware ( 0040eff71 ) 20190204
K7GW Riskware ( 0040eff71 ) 20190204
Kaspersky Trojan-Banker.Win32.IcedID.tozz 20190204
McAfee GenericR-ORV!AC15AE783F60 20190204
McAfee-GW-Edition GenericR-ORV!AC15AE783F60 20190204
Microsoft Program:Win32/Unwaders.C!ml 20190204
NANO-Antivirus Trojan.Win32.Inject3.fmpcqn 20190204
Panda Generic Malware 20190204
Rising Trojan.GenKryptik!8.AA55 (RDM+:cmRtazrv+ckZJHRwRCgl22V6YBfL) 20190204
Symantec ML.Attribute.HighConfidence 20190204
TACHYON Banker/W32.IcedID.185344 20190204
Tencent Win32.Trojan-banker.Icedid.Lmkj 20190204
TrendMicro-HouseCall TROJ_GEN.R055H0CB419 20190204
Webroot W32.Adware.Gen 20190204
ZoneAlarm by Check Point Trojan-Banker.Win32.IcedID.tozz 20190204
Acronis 20190130
Ad-Aware 20190204
AegisLab 20190204
AhnLab-V3 20190204
Alibaba 20180921
ALYac 20190204
Arcabit 20190204
Avast-Mobile 20190204
Babable 20180918
Baidu 20190202
BitDefender 20190204
Bkav 20190201
CAT-QuickHeal 20190204
ClamAV 20190204
CMC 20190204
Comodo 20190204
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190204
Cyren 20190204
eGambit 20190204
Emsisoft 20190204
F-Prot 20190204
F-Secure 20190204
Fortinet 20190201
GData 20190204
Ikarus 20190204
Sophos ML 20181128
Jiangmin 20190204
Kingsoft 20190204
Malwarebytes 20190204
MAX 20190204
eScan 20190204
Palo Alto Networks (Known Signatures) 20190204
Qihoo-360 20190204
SentinelOne (Static ML) 20190203
Sophos AV 20190204
SUPERAntiSpyware 20190130
TheHacker 20190203
TotalDefense 20190204
Trapmine 20190123
TrendMicro 20190204
Trustlook 20190204
VBA32 20190204
ViRobot 20190203
Yandex 20190204
Zillya 20190201
Zoner 20190204
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2003-2012, Entrance Software past finalgreat

Product Cottonwash
Original name Supplytrack.exe
Internal name Cottonwash
Description Cottonwash
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-01-31 10:03:43
Entry Point 0x00009C68
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
OpenServiceA
RegQueryValueExA
RegCreateKeyExA
DeleteService
RegOpenKeyA
OpenProcessToken
QueryServiceStatus
RegEnumKeyA
GetTokenInformation
OpenThreadToken
RegOpenKeyExA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
SetEntriesInAclA
OpenSCManagerA
GetCharWidthA
CreateBitmap
SetTextColor
GetClipBox
AreFileApisANSI
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
GetModuleFileNameW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
GetStdHandle
DeleteCriticalSection
GetCurrentProcess
GetVolumeInformationA
GetStartupInfoW
GetFileType
GetConsoleMode
DecodePointer
GetCurrentProcessId
UnhandledExceptionFilter
WideCharToMultiByte
ExitProcess
LoadLibraryExW
MultiByteToWideChar
HeapSize
SetFilePointerEx
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
VirtualProtectEx
GetProcessHeap
SetStdHandle
RaiseException
GetCPInfo
TlsFree
SetSystemPowerState
GetCurrentThreadId
SetUnhandledExceptionFilter
WriteFile
ReadFile
GetSystemTimeAsFileTime
SetEndOfFile
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
TerminateProcess
GetModuleHandleExW
IsValidCodePage
OutputDebugStringW
SetLastError
CreateFileW
CreateEventA
TlsGetValue
Sleep
FormatMessageA
ReadConsoleW
TlsSetValue
CloseHandle
EncodePointer
GetVersion
WriteConsoleW
LeaveCriticalSection
SetFocus
GetCursorPos
BeginDeferWindowPos
CreateMenu
AppendMenuA
UnregisterHotKey
RegisterWindowMessageA
GetWindowTextLengthA
DeferWindowPos
CallWindowProcA
GetClassInfoExA
GetFocus
TranslateMessage
GetShellWindow
GetPropA
RegisterClassExA
waveInOpen
timeEndPeriod
waveInClose
waveInUnprepareHeader
waveInStart
timeBeginPeriod
WTSCloseServer
WTSOpenServerA
WTSLogoffSession
Number of PE resources by type
RT_ICON 3
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 6
PE resources
Debug information
ExifTool file metadata
CodeSize
95744

SubsystemVersion
6.0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
15.6.82.69

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Cottonwash

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
165376

EntryPoint
0x9c68

OriginalFileName
Supplytrack.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2003-2012, Entrance Software past finalgreat

TimeStamp
2015:01:31 02:03:43-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
Cottonwash

ProductVersion
15.6.82.69

UninitializedDataSize
0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Entrance Software

LegalTrademarks
Cottonwash drinkplain well

ProductName
Cottonwash

ProductVersionNumber
15.6.82.69

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ac15ae783f6029b0adc27a9546c15843
SHA1 419c3548d4099cb35de64ac8db7df202366d5e5b
SHA256 11fc012ccebfd56188c513969da07b9af000a0fa3a6826ed3e8a9ef3c889e128
ssdeep
3072:K7HEjQR1WDqHEQ+6+3O9L8p3ZkifwqmcmqR+S843p4Qo94:04nSIp3Oww/cmK5GD94

authentihash a2c5a0141be63046a8675792cdbd33f6c7cddb86c7ac149bc7029dc0331dfe8e
imphash 5e121ac105b08f160ebcaed8a2fe12f8
File size 181.0 KB ( 185344 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-04 17:21:05 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-04 17:21:05 UTC ( 1 month, 2 weeks ago )
File names ac15ae783f6029b0adc27a9546c15843.virus
Supplytrack.exe
Cottonwash
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!