× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 400f82e8544304ddcdf353807c48bf5f44d5ea957d525bd1ab4e9ef405de46c9
File name: .flserv
Detection ratio: 12 / 42
Analysis date: 2012-04-07 04:55:07 UTC ( 4 years, 6 months ago ) View latest
Antivirus Result Update
Antiy-AVL Trojan/OSX.Flashfake 20120407
Avast MacOS:Flashback-M [Trj] 20120406
BitDefender MAC.OSX.Trojan.FlashBack.M 20120407
ClamAV OSX.Flashback-8 20120407
DrWeb BackDoor.Flashback.39 20120407
F-Secure Trojan-Downloader:OSX/Flashback.gen!B 20120407
GData MAC.OSX.Trojan.FlashBack.M 20120407
Kaspersky Trojan-Downloader.OSX.Flashfake.ab 20120407
McAfee OSX/Flashfake.c 20120407
NOD32 a variant of OSX/Flashback.K 20120407
Sophos OSX/Flshplyr-D 20120407
nProtect MAC.OSX.Trojan.FlashBack.M 20120407
AVG 20120407
AhnLab-V3 20120406
AntiVir 20120406
ByteHero 20120404
CAT-QuickHeal 20120406
Commtouch 20120406
Comodo 20120407
Emsisoft 20120407
F-Prot 20120406
Fortinet 20120407
Ikarus 20120407
Jiangmin 20120331
K7AntiVirus 20120405
McAfee-GW-Edition 20120406
Microsoft 20120406
Norman 20120405
PCTools 20120407
Panda 20120406
Rising 20120406
SUPERAntiSpyware 20120402
Symantec 20120407
TheHacker 20120406
TrendMicro 20120407
TrendMicro-HouseCall 20120407
VBA32 20120405
VIPRE 20120407
ViRobot 20120407
VirusBuster 20120406
eSafe 20120405
eTrust-Vet 20120406
The file being studied is a Mac OS X executable! More specifically it is a FAT multi-architecture binary, either a PPC/PPC64 binary or a universal package made up of 2 Mach-O files.
FAT multi-architecture binary
This file targets more than one architecture, this is done by packaging up 2 Mach-Os in a FAT binary. Details about each Mach-O file follow.
File header
File type executable file
Magic 0xfeedfacf
Required architecture x86_64
Sub-architecture X86_64_ALL
Entry point 0x100000f30
Reserved 0x0
Load commands 15
Load commands size 2128
Flags DYLDLINK
NOUNDEFS
TWOLEVEL
File segments
Shared libraries
Load commands
File header
File type executable file
Magic 0xfeedface
Required architecture i386
Sub-architecture I386_ALL
Entry point 0x20e4
Load commands 15
Load commands size 1716
Flags DYLDLINK
NOUNDEFS
TWOLEVEL
File segments
Shared libraries
Load commands
Compressed bundles
File identification
MD5 681880a4782cad0d55a0ff174e57bd3c
SHA1 10fe32ea19c5ed484a26f40da01347a603fc83b8
SHA256 400f82e8544304ddcdf353807c48bf5f44d5ea957d525bd1ab4e9ef405de46c9
ssdeep
768:JundVI3iHON2+R3PQ9cSXakBu5OPisOp3JXQXCKQI8XakBuNIQ:UndVI3ymscSHmOPaJA0fHYIQ

File size 58.4 KB ( 59844 bytes )
File type Mach-O
Magic literal
Mach-O fat file with 2 architectures

TrID Mac OS X Universal Binary executable (100.0%)
Tags
64bits multi-arch macho

VirusTotal metadata
First submission 2012-04-07 04:55:07 UTC ( 4 years, 6 months ago )
Last submission 2014-05-09 18:24:19 UTC ( 2 years, 5 months ago )
File names 681880A4782CAD0D55A0FF174E57BD3C
400f82e8544304ddcdf353807c48bf5f44d5ea957d525bd1ab4e9ef405de46c9.bin
.flserv
file-3952462_
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
HTTP requests
DNS requests
TCP connections