× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4583277747a3a566504eea8745fe4596563323b9ae862870917ef0669e385368
File name: 4d4c2729b8aa56e70eaf9ef84e9d5d3d.exe
Detection ratio: 61 / 64
Analysis date: 2017-07-26 04:02:47 UTC ( 10 hours, 24 minutes ago )
Antivirus Result Update
Ad-Aware Worm.Generic.230976 20170725
AegisLab Troj.Spy.W32.Agent.bbel!c 20170725
AhnLab-V3 Trojan/Win32.Npkon.R1489 20170725
ALYac Trojan.Spammer.57344 20170725
Antiy-AVL Trojan[Spy]/Win32.Agent 20170725
Arcabit Worm.Generic.D38640 20170725
Avast Win32:Agent-AOKX [Trj] 20170725
AVG Win32:Agent-AOKX [Trj] 20170725
Avira (no cloud) TR/Agent.grpm 20170725
AVware Trojan.Win32.Generic!BT 20170721
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20170725
BitDefender Worm.Generic.230976 20170725
Bkav W32.TBrambulA.Trojan 20170725
CAT-QuickHeal Trojan.Brambul.S11407 20170725
ClamAV Win.Spyware.78857-1 20170725
CMC Trojan-Spy.Win32.Agent!O 20170725
Comodo TrojWare.Win32.Agent.mtv0 20170725
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170710
Cylance Unsafe 20170726
Cyren W32/Agent.IX.gen!Eldorado 20170725
DrWeb Win32.HLLW.Bumble 20170725
Emsisoft Worm.Generic.230976 (B) 20170725
Endgame malicious (high confidence) 20170721
ESET-NOD32 Win32/Pepex.F 20170725
F-Prot W32/Agent.IX.gen!Eldorado 20170725
F-Secure Worm.Generic.230976 20170725
Fortinet W32/Bagz.E!worm 20170725
GData Win32.Worm.Pepex.A 20170725
Ikarus Trojan-Spy.Win32.Agent 20170725
Sophos ML heuristic 20170607
Jiangmin TrojanSpy.Agent.lvw 20170725
K7AntiVirus Backdoor ( 04c4f2671 ) 20170725
K7GW Backdoor ( 04c4f2671 ) 20170725
Kaspersky Trojan.Win32.Brambul.bp 20170725
Malwarebytes Trojan.Agent 20170725
McAfee Downloader-CUZ 20170725
McAfee-GW-Edition BehavesLike.Win32.Downloader.qh 20170725
Microsoft Trojan:Win32/Brambul.A!dha 20170725
eScan Worm.Generic.230976 20170725
NANO-Antivirus Trojan.Win32.Agent.bmgds 20170725
nProtect Trojan-Spy/W32.Agent.57344.KT 20170725
Palo Alto Networks (Known Signatures) generic.ml 20170726
Panda Generic Malware 20170725
Qihoo-360 Win32/RootKit.Rootkit.7e5 20170726
Rising Trojan.Generic (cloud:27tEjOoQ3mM) 20170725
SentinelOne (Static ML) static engine - malicious 20170718
Sophos AV Mal/Spy-Y 20170725
SUPERAntiSpyware Trojan.Agent/Gen-Brambul 20170725
Symantec Trojan Horse 20170725
Tencent Win32.Trojan.Brambul.Pegi 20170726
TheHacker Trojan/Spy.Agent.bmxb 20170724
TotalDefense Win32/Tnega.WW 20170725
TrendMicro WORM_MYDOOM.WA 20170725
TrendMicro-HouseCall WORM_MYDOOM.WA 20170725
VBA32 TrojanSpy.Agent 20170725
VIPRE Trojan.Win32.Generic!BT 20170725
ViRobot Trojan.Win32.Agent.57344.UI 20170725
Webroot Trojan:Win32/Brambul.A 20170726
Yandex Trojan.Brambul!EaXSuFVXfdU 20170725
Zillya Trojan.Agent.Win32.100751 20170725
ZoneAlarm by Check Point Trojan.Win32.Brambul.bp 20170725
Alibaba 20170725
Kingsoft 20170726
MAX 20170725
Symantec Mobile Insight 20170725
Trustlook 20170726
WhiteArmor 20170725
Zoner 20170725
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-10-14 12:45:54
Entry Point 0x0000369E
Number of sections 4
PE sections
PE imports
CloseServiceHandle
RegCloseKey
OpenServiceA
GetUserNameA
CreateServiceA
RegSetValueExA
StartServiceA
DeleteService
RegOpenKeyExA
OpenSCManagerA
GetSystemTime
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
HeapCreate
TerminateThread
lstrlenA
lstrcmpiA
WaitForSingleObject
FreeLibrary
LCMapStringA
CopyFileA
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
GetACP
FreeEnvironmentStringsA
GetStartupInfoA
GetEnvironmentStrings
SetHandleCount
LockResource
GetCPInfo
ExitProcess
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetProcessHeap
UnhandledExceptionFilter
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetCurrentProcess
CloseHandle
lstrcpynA
GetSystemDirectoryA
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
HeapDestroy
GetOEMCP
TerminateProcess
CreateProcessA
InitializeCriticalSection
LoadResource
VirtualFree
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetVersion
FindResourceA
VirtualAlloc
SetLastError
LeaveCriticalSection
rand
srand
_strupr
_beginthreadex
sprintf
_endthreadex
wsprintfA
gethostname
socket
closesocket
inet_addr
send
ioctlsocket
WSAStartup
gethostbyname
select
ntohs
connect
sendto
htons
recv
WSAGetLastError
Number of PE resources by type
RT_RCDATA 2
Number of PE resources by language
KOREAN 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2009:10:14 13:45:54+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
6.0

EntryPoint
0x369e

InitializedDataSize
32768

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 4d4c2729b8aa56e70eaf9ef84e9d5d3d
SHA1 e10c84a65e928dbc03e5a84ee4dc5a96304d2707
SHA256 4583277747a3a566504eea8745fe4596563323b9ae862870917ef0669e385368
ssdeep
768:hW8+9FisiTZdz4HLCLTRnVuwGiJTPpfl6dW6WsyqAgg8RCW+jl2WDMrL4C:hsisiTuLCLTRVuwZp5l/lsyqFg8B+RPC

authentihash c5df1051b6a24689d9ddd8c86147ea092d3c4ad3d4f5621b6ddcc069274af870
imphash 2b018f96d7cda0b915d2c1dcb16595c4
File size 56.0 KB ( 57344 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Petite compressed Win32 executable (48.4%)
Win32 Executable MS Visual C++ (generic) (21.1%)
Win64 Executable (generic) (18.7%)
Win32 Dynamic Link Library (generic) (4.4%)
Win32 Executable (generic) (3.0%)
Tags
peexe armadillo

VirusTotal metadata
First submission 2009-12-21 08:17:59 UTC ( 7 years, 7 months ago )
Last submission 2016-10-11 15:11:25 UTC ( 9 months, 2 weeks ago )
File names 4583277747a3a566504eea8745fe4596563323b9ae862870917ef0669e385368
1 (361).exe
file-2105788_
4d4c2729b8aa56e70eaf9ef84e9d5d3de10c84a65e928dbc03e5a84ee4dc5a96304d270757344.exe
file-3284758_exe
0 (341).exe
1db61ae18c85d6aca77a4a3800af07b4
smona131098677562595114305
4d4c2729b8aa56e70eaf9ef84e9d5d3d.exe
smona131098697623496566383
4d4c2729b8aa56e70eaf9ef84e9d5d3d
4d4c2729b8aa56e70eaf9ef84e9d5d3d
2011-10-13-001028.bin
GgHBB6t1
B2731.exe
2011-10-13-001028.bi
0 (329).exe
4583277747a3a566504eea8745fe4596563323b9ae862870917ef0669e385368-57344
test.txt
e10c84a65e928dbc03e5a84ee4dc5a96304d2707
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!