× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3c96fd224a210eb2e0c768de6ea79394f5c63348a19e1ef89f73bc09ea93e3c8
File name: 2db25406150eab8e4c487008a1c615e8
Detection ratio: 48 / 67
Analysis date: 2018-11-30 04:13:22 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Agent.DIYX 20181130
AegisLab Trojan.Win32.Diyx.4!c 20181130
AhnLab-V3 Trojan/Win32.Skeeyah.R244952 20181129
ALYac Trojan.Agent.DIYX 20181130
Antiy-AVL Trojan/Win32.SGeneric 20181130
Arcabit Trojan.Agent.DIYX 20181130
Avast Win32:MalwareX-gen [Trj] 20181130
AVG Win32:MalwareX-gen [Trj] 20181130
Avira (no cloud) TR/Kryptik.ieokv 20181129
BitDefender Trojan.Agent.DIYX 20181130
CAT-QuickHeal Trojan.IGENERIC 20181129
Comodo TrojWare.Win32.Crypt.ICZ@7y2rpn 20181130
CrowdStrike Falcon (ML) malicious_confidence_60% (W) 20181022
Cylance Unsafe 20181130
Cyren W32/Trojan.IJPT-0704 20181130
DrWeb Trojan.Gozi.363 20181130
eGambit PE.Heur.InvalidSig 20181130
Emsisoft Trojan.Agent.DIYX (B) 20181130
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GMXV 20181130
F-Prot W32/S-664f4d4d!Eldorado 20181130
F-Secure Trojan.Agent.DIYX 20181130
Fortinet W32/GenKryptik.CQXB!tr 20181130
GData Trojan.Agent.DIYX 20181130
Ikarus Trojan.Crypt 20181129
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005413c41 ) 20181129
K7GW Trojan ( 005413c41 ) 20181129
Kaspersky HEUR:Trojan.Win32.Generic 20181130
MAX malware (ai score=80) 20181130
McAfee Ursnif-FQGH!2DB25406150E 20181130
McAfee-GW-Edition Artemis 20181130
Microsoft Trojan:Win32/Ursnif.C!MTB 20181130
eScan Trojan.Agent.DIYX 20181130
NANO-Antivirus Trojan.Win32.Ursnif.fkesyg 20181130
Palo Alto Networks (Known Signatures) generic.ml 20181130
Panda Trj/Genetic.gen 20181129
Qihoo-360 Win32/Trojan.7e6 20181130
Rising Backdoor.Vawtrak!8.11D (CLOUD) 20181130
Sophos AV Mal/EncPk-ANX 20181130
Symantec ML.Attribute.HighConfidence 20181129
Trapmine suspicious.low.ml.score 20181128
TrendMicro TROJ_GEN.R015C0RKH18 20181130
TrendMicro-HouseCall TROJ_GEN.R015C0RKH18 20181130
VBA32 BScope.TrojanSpy.Ursnif 20181129
ViRobot Trojan.Win32.Z.Ursnif.318848.T 20181129
Zillya Trojan.Ursnif.Win32.3578 20181129
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181130
Alibaba 20180921
Avast-Mobile 20181129
Baidu 20181129
Bkav 20181129
ClamAV 20181129
CMC 20181129
Cybereason 20180225
Jiangmin 20181130
Kingsoft 20181130
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181128
Symantec Mobile Insight 20181121
TACHYON 20181130
Tencent 20181130
TheHacker 20181129
TotalDefense 20181129
Trustlook 20181130
Webroot 20181130
Yandex 20181129
Zoner 20181130
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2016 The Apache Software Foundation.

Product Apache HTTP Server
Original name httpd.exe
Internal name httpd.exe
File version 2.4.25
Description Apache HTTP Server
Comments Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Signature verification The digital signature of the object did not verify.
Signing date 7:39 PM 2/6/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-03-04 06:15:15
Entry Point 0x00002430
Number of sections 6
PE sections
Overlays
MD5 9daee6e60c3c105e932de69d4d0ae1c4
File type data
Offset 311296
Size 7552
Entropy 7.24
PE imports
SetSecurityDescriptorOwner
CryptEnumProviderTypesW
RegQueryInfoKeyW
JetTerm2
GetCharWidthFloatA
GetModuleHandleW
DsBindWithCredW
PathRemoveExtensionA
CreateWindowStationA
ToAscii
SetClipboardViewer
midiInStart
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
4294905856

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.4.25.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Apache HTTP Server

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
290816

EntryPoint
0x2430

OriginalFileName
httpd.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2016 The Apache Software Foundation.

FileVersion
2.4.25

TimeStamp
2007:03:04 07:15:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
httpd.exe

ProductVersion
2.4.25

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Apache Software Foundation

CodeSize
20480

ProductName
Apache HTTP Server

ProductVersionNumber
2.4.25.0

DistributedBy
The Apache Haus

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 2db25406150eab8e4c487008a1c615e8
SHA1 f2e58a61ec1bc573b56e52056fb33f078b941c85
SHA256 3c96fd224a210eb2e0c768de6ea79394f5c63348a19e1ef89f73bc09ea93e3c8
ssdeep
1536:Tlhc9MLyRR5AB4yxIAGWVV9+PmW49KBEPgjC+EhqIHkC5oi7E:Tlh2MGRQB4qIWokRHkCG

authentihash c37ab2239ecc2e24dcacc5b24aded372e899f25fe788d54635fa29854779e963
imphash 99c3bb22296edaa6606a5feb0290d47b
File size 311.4 KB ( 318848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-11-18 13:27:53 UTC ( 3 months ago )
Last submission 2018-11-18 13:27:53 UTC ( 3 months ago )
File names httpd.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.