× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 427d854945b83d7f4d22ccfbe58246e108af6eec9739b1563e50818a9994ce22
File name: ax1nun2c.exe
Detection ratio: 12 / 62
Analysis date: 2018-07-03 16:33:32 UTC ( 10 months, 3 weeks ago ) View latest
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9933 20180703
Bkav W32.eHeur.Malware14 20180703
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180530
Endgame malicious (high confidence) 20180612
Sophos ML heuristic 20180601
Kaspersky UDS:DangerousObject.Multi.Generic 20180703
McAfee Artemis!331DCF7E01E9 20180703
McAfee-GW-Edition BehavesLike.Win32.Generic.cc 20180703
SentinelOne (Static ML) static engine - malicious 20180701
Symantec ML.Attribute.HighConfidence 20180703
TACHYON Trojan/W32.Packer.884224.B 20180703
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180703
Ad-Aware 20180703
AegisLab 20180703
AhnLab-V3 20180703
ALYac 20180703
Antiy-AVL 20180703
Arcabit 20180703
Avast 20180703
Avast-Mobile 20180703
AVG 20180703
AVware 20180703
Babable 20180406
BitDefender 20180703
CAT-QuickHeal 20180703
ClamAV 20180703
CMC 20180703
Comodo 20180703
Cybereason 20180225
Cyren 20180703
DrWeb 20180703
eGambit 20180703
Emsisoft 20180703
ESET-NOD32 20180703
F-Prot 20180703
F-Secure 20180703
Fortinet 20180703
GData 20180703
Ikarus 20180703
Jiangmin 20180703
K7AntiVirus 20180703
K7GW 20180703
Kingsoft 20180703
Malwarebytes 20180703
Microsoft 20180703
eScan 20180703
NANO-Antivirus 20180703
Palo Alto Networks (Known Signatures) 20180703
Panda 20180703
Qihoo-360 20180703
Sophos AV 20180703
SUPERAntiSpyware 20180703
Tencent 20180703
TheHacker 20180628
TotalDefense 20180703
Trustlook 20180703
VBA32 20180629
VIPRE 20180703
ViRobot 20180703
Webroot 20180703
Yandex 20180703
Zillya 20180703
Zoner 20180702
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2018

Product v5bxgyqj
Original name BushMaster.exe
Internal name BushMaster.exe
File version 1.0.0.0
Description v5bxgyqj
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-07-13 22:47:16
Entry Point 0x0000CD2F
Number of sections 4
PE sections
PE imports
CreateToolhelp32Snapshot
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
HeapCreate
lstrlenA
WriteConsoleW
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
FreeEnvironmentStringsW
LockResource
GetCPInfo
Module32First
TlsGetValue
MultiByteToWideChar
HeapSize
GetTickCount
SetHandleCount
GetCommandLineA
GetProcAddress
TlsFree
GetProcessHeap
SetStdHandle
SetFilePointer
RaiseException
CompareStringA
UnhandledExceptionFilter
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
ReadFile
Module32Next
SetUnhandledExceptionFilter
WriteFile
InterlockedIncrement
CloseHandle
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
FreeResource
SetEnvironmentVariableA
CreateFileA
CompareStringW
TerminateProcess
GetEnvironmentStrings
QueryPerformanceCounter
WriteConsoleA
IsValidCodePage
LoadResource
VirtualFree
InterlockedDecrement
Sleep
GetFileType
SetEndOfFile
TlsSetValue
GetConsoleOutputCP
ExitProcess
GetCurrentThreadId
FindResourceA
VirtualAlloc
GetStartupInfoA
SetLastError
LeaveCriticalSection
SafeArrayAccessData
SafeArrayUnaccessData
VariantClear
SysAllocString
SafeArrayDestroy
SafeArrayCreate
VariantInit
SysFreeString
SafeArrayCreateVector
OleInitialize
Number of PE resources by type
RT_RCDATA 2
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
v5bxgyqj

ImageFileCharacteristics
No relocs, Executable, Large address aware, 32-bit

CharacterSet
Unicode

InitializedDataSize
778752

EntryPoint
0xcd2f

OriginalFileName
BushMaster.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2018

FileVersion
1.0.0.0

TimeStamp
2012:07:13 23:47:16+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
BushMaster.exe

ProductVersion
1.0.0.0

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
104448

ProductName
v5bxgyqj

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

Compressed bundles
File identification
MD5 331dcf7e01e91f7593cd2584d4e148e3
SHA1 b341a0e1934653caff9caad1d24b0cae7516c0ca
SHA256 427d854945b83d7f4d22ccfbe58246e108af6eec9739b1563e50818a9994ce22
ssdeep
24576:Ok70Trc9IHTp8XG7Uu89MP9E1afrKpNvdoX6s:OkQTAGJ8aP9g7pN+t

authentihash 9ca8706f9e9303adf2632d755d2fa4f78d8d03aafa712c2fd70ce0e61c2ae306
imphash bf5a4aa99e5b160f8521cadd6bfe73b8
File size 863.5 KB ( 884224 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-07-03 16:33:32 UTC ( 10 months, 3 weeks ago )
Last submission 2018-10-25 19:16:01 UTC ( 6 months, 4 weeks ago )
File names ax1nun2c.exe
331dcf7e01e91f7593cd2584d4e148e3.vir
BushMaster.exe
AX1NUN2C (1).EXE
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened mutexes
Runtime DLLs