× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2d8b14188eb0d121a36b6c79b44e5ec7f3239cf18fb70c278e26a53a96d2a6c8
File name: m.exe
Detection ratio: 40 / 63
Analysis date: 2017-08-21 16:50:25 UTC ( 1 year, 9 months ago )
Antivirus Result Update
Ad-Aware Trojan.ScriptKD.234 20170821
AegisLab Backdoor.W32.Gulpix!c 20170821
ALYac Trojan.ScriptKD.234 20170821
Antiy-AVL Trojan[Backdoor]/Win32.Gulpix 20170821
Arcabit Trojan.ScriptKD.234 20170821
Avast Win32:Dropper-OIY [Drp] 20170821
AVG Win32:Dropper-OIY [Drp] 20170821
Avira (no cloud) TR/Korplug.258369 20170821
AVware Trojan.Win32.Generic!BT 20170821
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9924 20170817
BitDefender Trojan.ScriptKD.234 20170821
CAT-QuickHeal TrojanAPT.Plugx.B4 20170821
Comodo UnclassifiedMalware 20170821
Cylance Unsafe 20170821
Emsisoft Trojan.ScriptKD.234 (B) 20170821
ESET-NOD32 a variant of Win32/Korplug.DE 20170821
F-Secure Trojan.Generic.14836729 20170821
Fortinet W32/Korplug.DE!tr 20170821
GData Trojan.ScriptKD.234 20170821
Jiangmin Backdoor.Gulpix.cx 20170821
K7AntiVirus Trojan ( 004b8cb41 ) 20170821
K7GW Trojan ( 004b8cb41 ) 20170821
Kaspersky Backdoor.Win32.Zegost.dghj 20170821
MAX malware (ai score=88) 20170821
McAfee BackDoor-PlugX.c 20170821
McAfee-GW-Edition BackDoor-PlugX.c 20170821
eScan Trojan.ScriptKD.234 20170821
NANO-Antivirus Trojan.Win32.Gulpix.dxgszf 20170821
Palo Alto Networks (Known Signatures) generic.ml 20170821
Panda Trj/CI.A 20170821
Qihoo-360 HEUR/QVM06.1.Malware.Gen 20170821
SentinelOne (Static ML) static engine - malicious 20170806
Sophos AV Troj/Plugx-AP 20170821
Symantec Trojan.Gen 20170821
Tencent Win32.Backdoor.Zegost.Ebgu 20170821
VBA32 Backdoor.Gulpix 20170821
VIPRE Trojan.Win32.Generic!BT 20170821
Yandex Backdoor.Gulpix!9A26Bzy6THQ 20170818
Zillya Backdoor.Gulpix.Win32.129 20170821
ZoneAlarm by Check Point Backdoor.Win32.Zegost.dghj 20170821
AhnLab-V3 20170821
Alibaba 20170821
ClamAV 20170821
CMC 20170821
CrowdStrike Falcon (ML) 20170804
Cyren 20170821
DrWeb 20170821
Endgame 20170721
F-Prot 20170821
Ikarus 20170821
Sophos ML 20170818
Kingsoft 20170821
Malwarebytes 20170821
Microsoft 20170821
nProtect 20170821
SUPERAntiSpyware 20170821
Symantec Mobile Insight 20170818
TheHacker 20170821
TotalDefense 20170821
TrendMicro 20170821
TrendMicro-HouseCall 20170821
Trustlook 20170821
ViRobot 20170821
Webroot 20170821
WhiteArmor 20170817
Zoner 20170821
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT RAR
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-03-02 07:40:24
Entry Point 0x0000B4B5
Number of sections 5
PE sections
Overlays
MD5 b804bd41d3ae1470a106d57c5098a09f
File type application/x-rar
Offset 98816
Size 159553
Entropy 8.00
PE imports
RegCreateKeyExW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityA
RegQueryValueExW
Ord(17)
InitCommonControlsEx
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
GetDeviceCaps
DeleteDC
SelectObject
StretchBlt
GetObjectW
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
SetFilePointer
GetSystemTime
GetLastError
HeapFree
GetStdHandle
SystemTimeToFileTime
ReadFile
FileTimeToSystemTime
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
FindNextFileA
CompareStringW
HeapAlloc
SetFileTime
IsDBCSLeadByte
GetCommandLineW
GetFileAttributesW
GetCurrentProcess
FileTimeToLocalFileTime
MoveFileW
OpenFileMappingW
SetFileAttributesA
GetDateFormatW
CreateDirectoryA
DeleteFileA
GetCPInfo
ExitProcess
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
GetTimeFormatW
WriteFile
SetFileAttributesW
DosDateTimeToFileTime
CloseHandle
WideCharToMultiByte
MapViewOfFile
MoveFileExW
ExpandEnvironmentStringsW
FindNextFileW
SetEndOfFile
GetFileAttributesA
GetTempPathW
FindFirstFileA
FindFirstFileW
HeapReAlloc
GetModuleHandleW
GetFullPathNameA
GetCurrentDirectoryW
LoadLibraryW
SetCurrentDirectoryW
UnmapViewOfFile
FindResourceW
CreateFileW
GlobalAlloc
LocalFileTimeToFileTime
FindClose
Sleep
GetFileType
GetFullPathNameW
CreateFileA
GetTickCount
GetLocaleInfoW
GetNumberFormatW
SetLastError
CompareStringA
VariantInit
SHBrowseForFolderW
SHChangeNotify
SHFileOperationW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFileInfoW
SHGetMalloc
SHAutoComplete
SetFocus
MapWindowPoints
GetParent
UpdateWindow
EndDialog
LoadBitmapW
DefWindowProcW
CopyRect
GetWindowTextW
GetMessageW
ShowWindow
GetSystemMetrics
SetWindowPos
wvsprintfW
CharToOemBuffA
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
RegisterClassExW
CharUpperW
DialogBoxParamW
CharToOemBuffW
wvsprintfA
SendDlgItemMessageW
GetDlgItemTextW
PostMessageW
GetSysColor
SetDlgItemTextW
GetDC
ReleaseDC
DestroyIcon
TranslateMessage
IsWindowVisible
LoadStringW
SetWindowTextW
GetDlgItem
GetWindow
MessageBoxW
DispatchMessageW
GetClassNameW
PeekMessageW
CharUpperA
OemToCharA
EnableWindow
GetClientRect
WaitForInputIdle
OemToCharBuffA
LoadCursorW
LoadIconW
FindWindowExW
CreateWindowExW
GetWindowLongW
SetForegroundWindow
DestroyWindow
CharToOemA
CreateStreamOnHGlobal
OleUninitialize
CoCreateInstance
OleInitialize
CLSIDFromString
Number of PE resources by type
RT_DIALOG 6
RT_STRING 5
RT_ICON 4
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 18
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:03:02 08:40:24+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
72192

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
90624

SubsystemVersion
5.0

EntryPoint
0xb4b5

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 8874567c55128ac62b468d5adce0dd63
SHA1 a3ef44f69a59bc7a992d8609ae18528002d79470
SHA256 2d8b14188eb0d121a36b6c79b44e5ec7f3239cf18fb70c278e26a53a96d2a6c8
ssdeep
6144:DFw8wzBhaEUJ45mnkrlVu7gO1/35D+qGiRO/bLBOXdE:DFszBhqS5mGVON1xDtGpbLBOXdE

authentihash dbacf6d9d8e3a915a9cc69437943eabf7eabf9c505031a13655a4ab68bbb2f52
imphash dbb1eb5c3476069287a73206929932fd
File size 252.3 KB ( 258369 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe overlay

VirusTotal metadata
First submission 2015-04-08 00:33:36 UTC ( 4 years, 1 month ago )
Last submission 2017-08-21 16:50:25 UTC ( 1 year, 9 months ago )
File names m.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R03EC0DDF15.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
DNS requests
UDP communications