× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2c4eab037c37b55780cce28e48d930faa60879045208ae4b64631bb7a2f4cb2a
File name: f24384228fb49f9271762253b0733123.vir
Detection ratio: 52 / 71
Analysis date: 2019-02-21 00:53:33 UTC ( 2 months ago )
Antivirus Result Update
Ad-Aware Generic.Trojan.TrickBot.41B29EF0 20190220
AhnLab-V3 Trojan/Win32.Trickbot.R189250 20190220
ALYac Backdoor.Agent.Trickbot 20190220
Antiy-AVL Trojan/Win32.TSGeneric 20190220
Arcabit Generic.Trojan.TrickBot.41B29EF0 20190220
Avast Win32:TrickBot-B [Trj] 20190220
AVG Win32:TrickBot-B [Trj] 20190220
Avira (no cloud) TR/ATRAPS.Gen 20190220
BitDefender Generic.Trojan.TrickBot.41B29EF0 20190220
CAT-QuickHeal Trojan.IGENERIC 20190220
Comodo TrojWare.Win32.TrickBot.A@6levgk 20190220
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190211
Cybereason malicious.28fb49 20190109
Cylance Unsafe 20190220
Cyren W32/Trojan.XPUE-9136 20190220
DrWeb Trojan.DownLoader22.63830 20190220
Emsisoft Generic.Trojan.TrickBot.41B29EF0 (B) 20190220
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/TrickBot.A 20190220
F-Secure Trojan.TR/ATRAPS.Gen 20190220
Fortinet W32/Generic.AP.18673A!tr 20190220
GData Generic.Trojan.TrickBot.41B29EF0 20190220
Ikarus Trojan.Win32.Agent 20190220
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.CoreBot.j 20190220
K7AntiVirus Trojan ( 001b27e51 ) 20190220
K7GW Trojan ( 001b27e51 ) 20190220
Kaspersky HEUR:Trojan.Win32.Trickster.gen 20190220
MAX malware (ai score=100) 20190220
McAfee GenericRXAM-PQ!F24384228FB4 20190220
McAfee-GW-Edition BehavesLike.Win32.Generic.lh 20190220
Microsoft Trojan:Win32/Totbrick.A 20190220
eScan Generic.Trojan.TrickBot.41B29EF0 20190220
NANO-Antivirus Trojan.Win32.Dwn.ehgkqr 20190220
Palo Alto Networks (Known Signatures) generic.ml 20190220
Panda Trj/GdSda.A 20190220
Qihoo-360 Win32/Trojan.cbd 20190220
Rising Trojan.TrickBot!8.E313 (CLOUD) 20190220
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Generic-S 20190220
SUPERAntiSpyware Trojan.Agent/Gen-TDSS[Pragma] 20190220
Symantec Trojan.Gen.2 20190220
Tencent Win32.Trojan.Trickster.Eaml 20190220
TheHacker Trojan/Agent.rye 20190217
Trapmine malicious.high.ml.score 20190123
TrendMicro TROJ_DYNAMER.XXYX 20190220
TrendMicro-HouseCall TROJ_DYNAMER.XXYX 20190220
VBA32 BScope.Trojan.Downloader 20190220
VIPRE Trojan.Win32.Generic!BT 20190220
Webroot W32.Trojan.Gen 20190220
Yandex Trojan.Agent!IxT6axTRL5Y 20190219
ZoneAlarm by Check Point HEUR:Trojan.Win32.Trickster.gen 20190220
Acronis 20190220
AegisLab 20190220
Alibaba 20180921
Avast-Mobile 20190220
Babable 20180917
Baidu 20190214
Bkav 20190219
ClamAV 20190220
CMC 20190220
eGambit 20190220
F-Prot 20190220
Kingsoft 20190220
Malwarebytes 20190220
Symantec Mobile Insight 20190220
TACHYON 20190220
TotalDefense 20190220
Trustlook 20190220
ViRobot 20190220
Zillya 20190219
Zoner 20190220
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-10-11 19:04:44
Entry Point 0x0000DDF9
Number of sections 5
PE sections
Overlays
MD5 7012fe2d85da13995aa003bc04be7a26
File type data
Offset 76800
Size 4432
Entropy 0.09
PE imports
GetTokenInformation
CryptDestroyKey
CryptReleaseContext
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenProcessToken
GetUserNameW
CryptSetKeyParam
FreeSid
CryptGetHashParam
AllocateAndInitializeSid
CryptAcquireContextW
EqualSid
CryptImportKey
LookupAccountNameW
CryptHashData
CryptDecrypt
CryptDestroyHash
CryptCreateHash
CryptStringToBinaryW
CryptBinaryToStringW
CreateToolhelp32Snapshot
GetLastError
HeapFree
CopyFileW
lstrcpynW
ReadFile
VirtualAllocEx
GetSystemInfo
lstrlenA
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
HeapAlloc
GetFileAttributesW
GetCommandLineW
DuplicateHandle
CreateRemoteThread
GetCurrentProcess
VirtualFreeEx
GetCurrentProcessId
WriteProcessMemory
OpenProcess
LockResource
SetFileTime
lstrlenW
UnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
GetTickCount
ReadProcessMemory
CreateDirectoryW
DeleteFileW
GetProcAddress
InterlockedCompareExchange
VirtualProtectEx
Process32FirstW
GetProcessHeap
GetTempFileNameW
GetComputerNameW
GetFileTime
GetModuleHandleA
WriteFile
SetFileAttributesW
WideCharToMultiByte
LoadLibraryW
MoveFileExW
SetFilePointer
lstrcmpA
FindNextFileW
GetCurrentThreadId
InterlockedExchange
SetUnhandledExceptionFilter
GetTempPathW
Process32NextW
CreateMutexW
ResetEvent
GetSystemTimeAsFileTime
FindFirstFileW
lstrcmpW
HeapReAlloc
GetModuleHandleW
SetEvent
LocalFree
TerminateProcess
ResumeThread
CreateEventW
GetExitCodeThread
lstrcmpiW
SetCurrentDirectoryW
LoadResource
FindResourceW
CreateFileW
CreateProcessW
FindClose
InterlockedDecrement
Sleep
MoveFileW
GetFullPathNameW
SignalObjectAndWait
GetVersion
CloseHandle
SysAllocStringLen
SysFreeString
VariantClear
VariantInit
SysAllocString
SHGetFolderPathW
CommandLineToArgvW
PathRenameExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathAddBackslashW
StrStrIW
PathFindExtensionW
PathCombineW
PathRemoveBackslashW
WinHttpSetOption
WinHttpConnect
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpCloseHandle
WinHttpQueryDataAvailable
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpOpen
WinHttpOpenRequest
WinHttpReadData
WSAStartup
gethostbyname
WSACleanup
GetAdaptersInfo
__p__fmode
malloc
??0exception@@QAE@ABV0@@Z
rand
??1type_info@@UAE@XZ
srand
_time64
__dllonexit
_CxxThrowException
_vsnwprintf
_amsg_exit
?terminate@@YAXXZ
_lock
_onexit
exit
_XcptFilter
_itow
__setusermatherr
_wcmdln
_cexit
memset
_unlock
??1exception@@UAE@XZ
__p__commode
?what@exception@@UBEPBDXZ
memcpy
__wgetmainargs
free
_callnewh
_controlfp
_vsnprintf
??0exception@@QAE@XZ
_initterm
_exit
__set_app_type
_wtoi
RtlUnwind
NtQueryInformationProcess
CoUninitialize
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
Number of PE resources by type
RT_RCDATA 2
Number of PE resources by language
NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:10:11 12:04:44-07:00

FileType
Win32 EXE

PEType
PE32

CodeSize
54784

LinkerVersion
10.0

ImageFileCharacteristics
Executable, 32-bit

FileTypeExtension
exe

InitializedDataSize
20992

SubsystemVersion
5.1

EntryPoint
0xddf9

OSVersion
5.1

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 f24384228fb49f9271762253b0733123
SHA1 8a5ee36f1d0fe4925c261a4e667312dff38b6d3b
SHA256 2c4eab037c37b55780cce28e48d930faa60879045208ae4b64631bb7a2f4cb2a
ssdeep
1536:D6xjJ1ft7DEFogMjXHdp9Bi4SKLsKDO0yF5NnlGGQXAT:exjfxD0ogMjXHdp9Bi4SbKDOlNn/2AT

authentihash 60e828899ed211cd9233c36eb2b0b47bdc58ff84fe5e57a3486b4f2873349996
imphash 1eb4077b51d8f882d3b8aa39408d55c6
File size 79.3 KB ( 81232 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (45.0%)
Microsoft Visual C++ compiled executable (generic) (26.9%)
Win32 Dynamic Link Library (generic) (10.7%)
Win32 Executable (generic) (7.3%)
OS/2 Executable (generic) (3.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2016-10-14 15:19:51 UTC ( 2 years, 6 months ago )
Last submission 2018-10-22 03:15:08 UTC ( 6 months ago )
File names 2c4eab037c37b55780cce28e48d930faa60879045208ae4b64631bb7a2f4cb2a.bin
Vir _ (10).exe
payload_3.exe
f24384228fb49f9271762253b0733123.vir
f24384228fb49f9271762253b0733123.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Terminated processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications