× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3ab89ffc6e73de4d393adf56b5eaeedb563fb7153f980affe7768edc4e95a389
File name: b3fddc313d17f24430b5463165e38b14
Detection ratio: 54 / 57
Analysis date: 2016-12-14 22:03:46 UTC ( 7 months, 1 week ago )
Antivirus Result Update
Ad-Aware Worm.Generic.230976 20161214
AegisLab Troj.Spy.W32.Agent.bmxb!c 20161214
AhnLab-V3 Trojan/Win32.Npkon.R1489 20161214
ALYac Worm.Generic.230976 20161214
Antiy-AVL Trojan[Spy]/Win32.Agent 20161214
Arcabit Worm.Generic.D38640 20161214
Avast Win32:Agent-AOKX [Trj] 20161214
AVG PSW.Agent.AHCN 20161214
Avira (no cloud) TR/Agent.mtv 20161214
AVware Trojan.Win32.Generic!BT 20161214
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9997 20161207
BitDefender Worm.Generic.230976 20161214
Bkav W32.TBrambulA.Trojan 20161214
CAT-QuickHeal Trojan.Brambul.S11407 20161214
ClamAV Win.Spyware.78857-1 20161214
CMC Trojan-Spy.Win32.Agent!O 20161214
Comodo Worm.Win32.Pepex.E0 20161214
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20161024
Cyren W32/Agent.IX.gen!Eldorado 20161214
DrWeb Win32.HLLW.Bumble 20161214
Emsisoft Worm.Generic.230976 (B) 20161214
ESET-NOD32 Win32/Pepex.F 20161214
F-Prot W32/Agent.IX.gen!Eldorado 20161214
F-Secure Worm.Generic.230976 20161214
Fortinet W32/Bagz.E!worm 20161214
GData Worm.Generic.230976 20161214
Ikarus Trojan-Spy.Win32.Agent 20161214
Sophos ML trojan.win32.brambul.a!dha 20161202
Jiangmin TrojanSpy.Agent.lvw 20161214
K7AntiVirus Backdoor ( 04c4f2671 ) 20161214
K7GW Backdoor ( 04c4f2671 ) 20161214
Kaspersky Trojan.Win32.Brambul.bp 20161214
Malwarebytes Trojan.Agent 20161214
McAfee Downloader-CUZ 20161214
McAfee-GW-Edition BehavesLike.Win32.Downloader.mt 20161214
Microsoft Trojan:Win32/Brambul.A!dha 20161214
eScan Worm.Generic.230976 20161214
NANO-Antivirus Trojan.Win32.Agent.bmgds 20161214
nProtect Trojan-Spy/W32.Agent.86016.AK 20161214
Panda Generic Malware 20161214
Qihoo-360 Malware.Radar05.Gen 20161214
Rising Trojan.Generic-RZS6hQoQ3mM (cloud) 20161214
Sophos AV Mal/Spy-Y 20161214
SUPERAntiSpyware Trojan.Agent/Gen-Spy 20161214
Symantec W32.Brambul 20161214
Tencent Win32.Trojan.Brambul.Phgn 20161214
TheHacker Trojan/Spy.Agent.bbel 20161214
TotalDefense Win32/Tnega.WW 20161214
TrendMicro TROJ_AGENT.AZRG 20161214
TrendMicro-HouseCall TROJ_AGENT.AZRG 20161214
VBA32 TrojanSpy.Agent 20161214
ViRobot Trojan.Win32.Agent.57344.TI[h] 20161214
Yandex Trojan.Brambul!5VxMLp6YrUQ 20161214
Zillya Trojan.Agent.Win32.79567 20161214
Alibaba 20161214
Kingsoft 20161214
Trustlook 20161214
VIPRE 20161214
WhiteArmor 20161212
Zoner 20161214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-10-14 12:45:54
Entry Point 0x0000369E
Number of sections 4
PE sections
PE imports
CloseServiceHandle
RegCloseKey
OpenServiceA
GetUserNameA
CreateServiceA
RegSetValueExA
StartServiceA
DeleteService
RegOpenKeyExA
OpenSCManagerA
GetSystemTime
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
HeapCreate
TerminateThread
lstrlenA
lstrcmpiA
WaitForSingleObject
FreeLibrary
LCMapStringA
CopyFileA
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
GetACP
FreeEnvironmentStringsA
GetStartupInfoA
GetEnvironmentStrings
SetHandleCount
LockResource
GetCPInfo
ExitProcess
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetProcessHeap
UnhandledExceptionFilter
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetCurrentProcess
CloseHandle
lstrcpynA
GetSystemDirectoryA
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
HeapDestroy
GetOEMCP
TerminateProcess
CreateProcessA
InitializeCriticalSection
LoadResource
VirtualFree
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetVersion
FindResourceA
VirtualAlloc
SetLastError
LeaveCriticalSection
rand
srand
_strupr
_beginthreadex
sprintf
_endthreadex
wsprintfA
gethostname
socket
closesocket
inet_addr
send
ioctlsocket
WSAStartup
gethostbyname
select
ntohs
connect
sendto
htons
recv
WSAGetLastError
Number of PE resources by type
RT_RCDATA 2
Number of PE resources by language
KOREAN 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2009:10:14 13:45:54+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
6.0

EntryPoint
0x369e

InitializedDataSize
32768

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 b3fddc313d17f24430b5463165e38b14
SHA1 5cf28be5f222aaa567d6365e8c00393a5484c8b1
SHA256 3ab89ffc6e73de4d393adf56b5eaeedb563fb7153f980affe7768edc4e95a389
ssdeep
768:yW8+9FisiTZdz4HLCLTRnVuwGiJTPpfl6dW6WsyqAgg8RCW+jl2WDMrL4:ysisiTuLCLTRVuwZp5l/lsyqFg8B+RP

authentihash 23da1144e7393e96cadf2dd2218fbb30456da393e0f577f15235bb7dca7a9469
imphash 2b018f96d7cda0b915d2c1dcb16595c4
File size 84.0 KB ( 86016 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Petite compressed Win32 executable (89.3%)
Win32 Executable (generic) (5.6%)
Generic Win/DOS Executable (2.5%)
DOS Executable Generic (2.4%)
Tags
peexe

VirusTotal metadata
First submission 2012-03-09 17:58:34 UTC ( 5 years, 4 months ago )
Last submission 2012-03-16 04:35:23 UTC ( 5 years, 4 months ago )
File names b3fddc313d17f24430b5463165e38b14
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs
DNS requests
UDP communications