× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2b2914a2b326d23c572d353917e96b5b80d06df4d180b12bdd6aba9b8a0aef21
File name: 6ea97ca1e77235d37956d7eb55e8af57.virus
Detection ratio: 35 / 57
Analysis date: 2016-09-21 16:36:52 UTC ( 2 years, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Graftor.301558 20160921
AhnLab-V3 Malware/Win32.Generic.N2097170871 20160921
ALYac Gen:Variant.Graftor.301558 20160921
Arcabit Trojan.Graftor.D499F6 20160921
Avast Win32:Trojan-gen 20160921
AVG Crypt5.CMZF 20160921
Avira (no cloud) TR/Crypt.ZPACK.seopi 20160921
AVware Trojan.Win32.Generic!BT 20160921
Baidu Win32.Trojan.WisdomEyes.151026.9950.9999 20160921
BitDefender Gen:Variant.Graftor.301558 20160921
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20160725
Cyren W32/Trojan.IMVC-8058 20160921
DrWeb Trojan.Siggen6.58358 20160921
Emsisoft Gen:Variant.Graftor.301558 (B) 20160921
ESET-NOD32 Win32/TrojanDownloader.Agent.CFH 20160921
F-Secure Gen:Variant.Graftor.301558 20160921
Fortinet W32/Agent.CFH!tr.dldr 20160921
GData Gen:Variant.Graftor.301558 20160921
Ikarus Trojan-Downloader.Win32.Agent 20160921
Sophos ML generic.a 20160917
Kaspersky UDS:DangerousObject.Multi.Generic 20160921
Malwarebytes Trojan.ServStart 20160921
McAfee Artemis!6EA97CA1E772 20160921
McAfee-GW-Edition BehavesLike.Win32.Backdoor.nc 20160921
Microsoft Trojan:Win32/Dynamer!ac 20160921
eScan Gen:Variant.Graftor.301558 20160921
Panda Trj/GdSda.A 20160921
Qihoo-360 HEUR/QVM20.1.98B9.Malware.Gen 20160921
Rising Malware.Generic!15ypzEOXsJN@2 (thunder) 20160921
Sophos AV Mal/Generic-S 20160921
Symantec Trojan.Gen 20160921
Tencent Win32.Trojan-downloader.Agent.Wsuj 20160921
TrendMicro TROJ_GEN.R011C0EIA16 20160921
TrendMicro-HouseCall TROJ_GEN.R011C0EIA16 20160921
VIPRE Trojan.Win32.Generic!BT 20160921
AegisLab 20160921
Alibaba 20160921
Antiy-AVL 20160921
Bkav 20160921
CAT-QuickHeal 20160921
ClamAV 20160921
CMC 20160921
Comodo 20160921
F-Prot 20160921
Jiangmin 20160921
K7AntiVirus 20160921
K7GW 20160921
Kingsoft 20160921
NANO-Antivirus 20160921
nProtect 20160921
SUPERAntiSpyware 20160920
TheHacker 20160920
VBA32 20160921
ViRobot 20160921
Yandex 20160920
Zillya 20160921
Zoner 20160921
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Ste@lth PE 1.01 -> BGCorp
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-07-14 10:54:05
Entry Point 0x00001F20
Number of sections 3
PE sections
PE imports
GetComputerNameExA
OpenMutexA
GetCurrentProcess
GetWindowsDirectoryA
GetCPInfo
GetSystemDirectoryW
GetModuleHandleA
lstrcatA
WaitForSingleObject
CreateEventA
GetOEMCP
GetLogicalDriveStringsW
IsDebuggerPresent
GetTickCount
GetExpandedNameW
DeleteFileW
GetACP
GetDiskFreeSpaceA
GetStringTypeW
GetProcAddress
GetCurrentThread
SE_ProcessDying
SE_DllLoaded
SE_InstallAfterInit
Chkdsk
FormatEx
Recover
Extend
InsertMenuA
wsprintfA
LoadCursorA
LoadIconA
IsDialogMessageW
GetMessageW
DialogBoxParamA
PostMessageW
IsCharLowerW
CharToOemA
Number of PE resources by type
RT_RCDATA 1
Number of PE resources by language
NEUTRAL 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:07:14 11:54:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
94720

LinkerVersion
7.0

EntryPoint
0x1f20

InitializedDataSize
5120

SubsystemVersion
4.0

ImageVersion
5.1

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 6ea97ca1e77235d37956d7eb55e8af57
SHA1 d0120c28fa5fba6de9add98935faef15d8369e97
SHA256 2b2914a2b326d23c572d353917e96b5b80d06df4d180b12bdd6aba9b8a0aef21
ssdeep
1536:pXJ2YpXRj29pKLbRDkf+RyoAWj35dDBjX3wlMp77oXznf27cU9i2yJv/BC9XMd8:pXkYKtGRHvTBzw6Rp7cDh4K

authentihash 4f67ecf921cbd86174551742322a16d0d6c8c3056a79b06c8471cf903e9578ae
imphash a588a9ddec93afe5db8e266917264090
File size 98.5 KB ( 100864 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
stealth peexe

VirusTotal metadata
First submission 2016-09-21 16:36:52 UTC ( 2 years, 5 months ago )
Last submission 2016-09-21 16:36:52 UTC ( 2 years, 5 months ago )
File names 6ea97ca1e77235d37956d7eb55e8af57.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications