× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2b971a6152e18b2cc7f8dc4748fe9d9c2b8042ddc56efc5136e3232337402712
File name: 9ca6e468b891e81c24ddba35b4589265.virus
Detection ratio: 28 / 57
Analysis date: 2016-09-24 20:55:04 UTC ( 2 years, 4 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Graftor.304178 20160924
ALYac Gen:Variant.Graftor.304178 20160924
Arcabit Trojan.Graftor.D4A432 20160924
Avira (no cloud) TR/Crypt.ZPACK.ujowb 20160924
AVware Trojan.Win32.Generic!BT 20160924
Baidu Win32.Trojan.WisdomEyes.151026.9950.9999 20160924
BitDefender Gen:Variant.Graftor.304178 20160924
Bkav HW32.Packed.176F 20160924
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20160725
Cyren W32/Trojan.EBZY-5377 20160924
Emsisoft Gen:Variant.Graftor.304178 (B) 20160924
ESET-NOD32 a variant of Win32/Kryptik.FGLG 20160924
F-Secure Gen:Variant.Graftor.304178 20160924
GData Gen:Variant.Graftor.304178 20160924
Sophos ML virus.win32.sality.at 20160917
K7AntiVirus Trojan ( 004f91f01 ) 20160924
K7GW Trojan ( 004f91f01 ) 20160924
Kaspersky Trojan-Banker.Win32.Tuhkit.cx 20160924
Malwarebytes Trojan.Boaxxe 20160924
Microsoft Trojan:Win32/Dynamer!ac 20160924
eScan Gen:Variant.Graftor.304178 20160924
Panda Trj/GdSda.A 20160924
Qihoo-360 HEUR/QVM20.1.0000.Malware.Gen 20160924
Rising Malware.Generic!2za3JfybtEK@2 (thunder) 20160924
Sophos AV Mal/Generic-S 20160924
Symantec Heur.AdvML.C 20160924
TrendMicro-HouseCall TROJ_GEN.R011H09IO16 20160924
VIPRE Trojan.Win32.Generic!BT 20160924
AegisLab 20160924
AhnLab-V3 20160924
Alibaba 20160923
Antiy-AVL 20160924
Avast 20160924
AVG 20160924
CAT-QuickHeal 20160924
ClamAV 20160924
CMC 20160921
Comodo 20160924
DrWeb 20160924
F-Prot 20160924
Fortinet 20160924
Ikarus 20160924
Jiangmin 20160924
Kingsoft 20160924
McAfee 20160923
McAfee-GW-Edition 20160924
NANO-Antivirus 20160924
nProtect 20160924
SUPERAntiSpyware 20160924
Tencent 20160924
TheHacker 20160922
TrendMicro 20160924
VBA32 20160923
ViRobot 20160924
Yandex 20160924
Zillya 20160924
Zoner 20160924
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Ste@lth PE 1.01 -> BGCorp
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-07-14 10:54:05
Entry Point 0x00003930
Number of sections 3
PE sections
PE imports
FindResourceA
CreateMutexA
GetStartupInfoA
GlobalAddAtomW
lstrcat
MapViewOfFile
GetCurrentProcessId
GetProcAddress
GetFileTime
WaitForSingleObject
LoadLibraryA
GetOEMCP
RemoveDirectoryA
CreateMailslotA
CreateFileA
GetCompressedFileSizeA
GetCurrentThreadId
OpenEventA
GetStringTypeW
lstrcpyn
drvGetDefaultCommConfigA
CountryRunOnce
InvokeControlPanel
drvSetDefaultCommConfigA
drvCommConfigDialogA
PathCompactPathW
UrlHashW
UrlIsA
UrlGetLocationW
UrlGetPartW
UrlCombineW
UrlIsNoHistoryA
PathCommonPrefixA
PathAppendW
UrlCreateFromPathW
PathIsRootW
GetThemeRect
GetThemePosition
GetCurrentThemeName
SetThemeAppProperties
GetThemeTextExtent
EnableThemeDialogTexture
OpenThemeData
GetThemeSysFont
GetThemePartSize
GetThemeTextMetrics
Number of PE resources by type
GHAR 1
RT_DIALOG 1
Number of PE resources by language
NEUTRAL 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:07:14 11:54:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
130560

LinkerVersion
7.1

FileTypeExtension
exe

InitializedDataSize
8192

SubsystemVersion
4.0

EntryPoint
0x3930

OSVersion
5.1

ImageVersion
5.1

UninitializedDataSize
0

File identification
MD5 9ca6e468b891e81c24ddba35b4589265
SHA1 9fa7ffe32a9b4558637ef9ff3c367bb419eb3581
SHA256 2b971a6152e18b2cc7f8dc4748fe9d9c2b8042ddc56efc5136e3232337402712
ssdeep
3072:innnn1dVSmihp+STeVyDjG1hBA9nYNIk1LT97B4vQ:innnn1a3hUSfjoBACN5fj4

authentihash 4142d223503b4c0435e06d07a95a534d17c9e4da2b8fbaae8e689c86572646d7
imphash b0f9bf7faa1f60db4ba31ea86e70f75e
File size 136.5 KB ( 139776 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe stealth

VirusTotal metadata
First submission 2016-09-24 20:55:04 UTC ( 2 years, 4 months ago )
Last submission 2016-09-24 20:55:04 UTC ( 2 years, 4 months ago )
File names 9ca6e468b891e81c24ddba35b4589265.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications