× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 436c449621e12dba191d8a5110a542065da06ebf83cbb56e57884234c36bf91f
File name: 5ec8bd3a6753d3b1184a97882b897b43
Detection ratio: 49 / 67
Analysis date: 2018-05-18 10:13:15 UTC ( 9 months, 1 week ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Zusy.284747 20180518
AhnLab-V3 Win-Trojan/Gandcrab01.Exp 20180518
ALYac Gen:Variant.Zusy.284747 20180518
Antiy-AVL Trojan[PSW]/Win32.Coins 20180518
Arcabit Trojan.Zusy.D4584B 20180518
Avast Win32:Malware-gen 20180518
AVG Win32:Malware-gen 20180518
Avira (no cloud) TR/Crypt.Xpack.wulqy 20180518
AVware BehavesLike.Win32.Malware (v) 20180518
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180518
BitDefender Gen:Variant.Zusy.284747 20180518
Comodo TrojWare.Win32.Chapak.GG 20180518
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180418
Cylance Unsafe 20180518
Cyren W32/S-8ce49c37!Eldorado 20180518
DrWeb Trojan.PWS.Stealer.23758 20180518
Emsisoft Gen:Variant.Zusy.284747 (B) 20180518
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/Kryptik.GGRG 20180518
F-Prot W32/S-8ce49c37!Eldorado 20180518
F-Secure Gen:Variant.Zusy.284747 20180518
Fortinet W32/Kryptik.GGPW!tr 20180518
GData Gen:Variant.Zusy.284747 20180518
Ikarus Trojan.Win32.Crypt 20180518
Sophos ML heuristic 20180503
Jiangmin Trojan.PSW.Coins.eg 20180518
K7AntiVirus Trojan ( 0052908c1 ) 20180518
K7GW Trojan ( 0052908c1 ) 20180518
Kaspersky HEUR:Trojan.Win32.Generic 20180518
Malwarebytes Trojan.Bunitu 20180518
MAX malware (ai score=80) 20180518
McAfee GenericRXFJ-OV!5EC8BD3A6753 20180518
McAfee-GW-Edition BehavesLike.Win32.Generic.dc 20180518
Microsoft Trojan:Win32/Tiggre!plock 20180518
eScan Gen:Variant.Zusy.284747 20180518
NANO-Antivirus Trojan.Win32.GenKryptik.fbtusq 20180518
Palo Alto Networks (Known Signatures) generic.ml 20180518
Panda Trj/Genetic.gen 20180517
Qihoo-360 HEUR/QVM10.1.3E50.Malware.Gen 20180518
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/WaledPak-D 20180518
Symantec Trojan.Gen.2 20180518
TrendMicro TROJ_GEN.R032C0OEF18 20180518
TrendMicro-HouseCall Ransom_GANDCRAB.SMD3 20180518
VBA32 BScope.TrojanRansom.GandCrypt 20180517
VIPRE BehavesLike.Win32.Malware (v) 20180518
Webroot W32.Trojan.Gen 20180518
Yandex Trojan.GandCrypt! 20180518
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180518
AegisLab 20180518
Alibaba 20180518
Avast-Mobile 20180518
Babable 20180406
Bkav 20180518
CAT-QuickHeal 20180517
ClamAV 20180518
CMC 20180518
Cybereason None
eGambit 20180518
Kingsoft 20180518
nProtect 20180518
Rising 20180518
SUPERAntiSpyware 20180518
Symantec Mobile Insight 20180517
Tencent 20180518
TheHacker 20180516
TotalDefense 20180518
Trustlook 20180518
ViRobot 20180518
Zillya 20180516
Zoner 20180517
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-13 12:50:22
Entry Point 0x00001827
Number of sections 6
PE sections
PE imports
CloseMetaFile
AddFontResourceA
ResetDCA
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetCommBreak
GetModuleFileNameW
GetConsoleCP
CreateMailslotW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
SetConsoleOutputCP
RtlUnwind
GetStdHandle
DeleteCriticalSection
FlushViewOfFile
RaiseException
GetConsoleMode
CreateConsoleScreenBuffer
GetCurrentProcessId
WriteConsoleW
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetCommMask
MultiByteToWideChar
SetFileShortNameA
SetFilePointerEx
FreeEnvironmentStringsW
SetVolumeMountPointW
FindVolumeMountPointClose
GetProcAddress
InitializeSListHead
GetThreadContext
GetStartupInfoW
SetStdHandle
SetEndOfFile
WideCharToMultiByte
MapViewOfFile
TlsFree
WriteProfileSectionA
ReadFile
FindFirstFileExA
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetCommandLineA
FindNextFileA
GetNumberOfConsoleMouseButtons
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
HeapAlloc
GetSystemTimeAdjustment
TerminateProcess
GetModuleHandleExW
IsValidCodePage
WriteFile
CreateFileW
GetStringTypeW
FindClose
TlsGetValue
GetFileType
ReadConsoleW
TlsSetValue
GetCurrentThreadId
SetMailslotInfo
GetProcessHeap
VirtualAlloc
SetLastError
LeaveCriticalSection
CoGetContextToken
Number of PE resources by type
RT_STRING 14
RT_DIALOG 1
RT_GROUP_CURSOR 1
RT_ICON 1
YBT 1
AFX_DIALOG_LAYOUT 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 20
ENGLISH UK 2
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
187904

ImageVersion
0.0

FileVersionNumber
2.0.4.0

LanguageCode
Unknown (0880)

FileFlagsMask
0x003f

CharacterSet
Unknown (4E0)

LinkerVersion
14.0

EntryPoint
0x1827

MIMEType
application/octet-stream

TimeStamp
2018:05:13 13:50:22+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
75264

FileSubtype
0

ProductVersionNumber
2.0.4.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 5ec8bd3a6753d3b1184a97882b897b43
SHA1 62731efccbff917b1aaa4cd502c2ff957813dfce
SHA256 436c449621e12dba191d8a5110a542065da06ebf83cbb56e57884234c36bf91f
ssdeep
3072:Yc6z+QC2mCoVCzX3TyzfG//7cjXcc4+rKeKw1WQomQS+/Q3aMrB/FbqfznA0sJJ4:A73TyzSZi1rjQaJpOjsJJJXee6A

authentihash 05dc2011b2ad7d342f6e87c6ad633f5bf3e31b459085504cb69883025b7a00d9
imphash 1f2e660495db00b28681a4ca01c9c4ae
File size 211.5 KB ( 216576 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-18 10:13:15 UTC ( 9 months, 1 week ago )
Last submission 2018-05-18 10:13:15 UTC ( 9 months, 1 week ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs