× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 46e2d7dac697fb5a521cfd1e96c9eed0109dd26e30f214f47f0799a2a41788bc
File name: codexgigas_db548dfd44dd7765a00250024d12900d2d32b7b3
Detection ratio: 47 / 68
Analysis date: 2018-08-20 08:25:29 UTC ( 7 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40411947 20180820
AhnLab-V3 Worm/Win32.VBNA.C2044715 20180819
Antiy-AVL Worm/Win32.VBNA 20180820
Arcabit Trojan.Generic.D268A32B 20180820
Avast Win32:VB-ABYT [Trj] 20180820
AVG Win32:VB-ABYT [Trj] 20180820
Avira (no cloud) TR/Dropper.Gen 20180820
AVware Trojan.Win32.Generic!BT 20180820
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9974 20180820
BitDefender Trojan.GenericKD.40411947 20180820
CAT-QuickHeal Trojan.VBCrypt.MF.1942 20180819
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.d44dd7 20180225
Cylance Unsafe 20180820
DrWeb Trojan.DownLoader26.33628 20180820
Emsisoft Trojan.GenericKD.40411947 (B) 20180820
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Ainslot.AA 20180820
F-Secure Trojan.GenericKD.40411947 20180820
Fortinet W32/VBNA.BH!worm 20180820
GData Trojan.GenericKD.40411947 20180820
Ikarus Trojan.Win32.VBKrypt 20180820
Sophos ML heuristic 20180717
Jiangmin Worm.VBNA.alpc 20180820
K7AntiVirus NetWorm ( 700000151 ) 20180820
K7GW NetWorm ( 700000151 ) 20180820
Kaspersky Worm.Win32.VBNA.b 20180820
Malwarebytes Backdoor.Revcode 20180820
MAX malware (ai score=87) 20180820
McAfee W32/Generic!im 20180820
McAfee-GW-Edition BehavesLike.Win32.VBObfus.fm 20180820
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180820
eScan Trojan.GenericKD.40411947 20180820
NANO-Antivirus Trojan.Win32.Ainslot.ewnrji 20180820
Palo Alto Networks (Known Signatures) generic.ml 20180820
Qihoo-360 Win32/Trojan.e6b 20180820
Rising Worm.VBNA!8.2BE (CLOUD) 20180820
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/Generic-S 20180820
Symantec ML.Attribute.HighConfidence 20180819
TACHYON Worm/W32.VB-VBNA.385024.C 20180820
Tencent Win32.Worm.Vbna.Hqly 20180820
TrendMicro TROJ_VBINJECT_HD200441.UVPM 20180820
TrendMicro-HouseCall TROJ_VBINJECT_HD200441.UVPM 20180820
VBA32 TScope.Trojan.VB 20180817
VIPRE Trojan.Win32.Generic!BT 20180820
ZoneAlarm by Check Point Worm.Win32.VBNA.b 20180820
AegisLab 20180820
Alibaba 20180713
ALYac 20180820
Avast-Mobile 20180819
Babable 20180725
Bkav 20180817
ClamAV 20180820
CMC 20180817
Comodo 20180820
Cyren 20180820
eGambit 20180820
F-Prot 20180820
Kingsoft 20180820
Panda 20180819
SUPERAntiSpyware 20180820
Symantec Mobile Insight 20180814
TheHacker 20180818
TotalDefense 20180820
Trustlook 20180820
ViRobot 20180820
Webroot 20180820
Yandex 20180818
Zillya 20180817
Zoner 20180819
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-12-29 00:08:39
Entry Point 0x0000131C
Number of sections 3
PE sections
PE imports
EVENT_SINK_QueryInterface
Ord(712)
Ord(546)
Ord(518)
Ord(308)
Ord(521)
Ord(516)
Ord(616)
EVENT_SINK_Invoke
Ord(320)
Ord(527)
Ord(685)
Ord(697)
EVENT_SINK_AddRef
Ord(709)
Ord(594)
Ord(302)
Ord(681)
Ord(665)
Ord(592)
EVENT_SINK_GetIDsOfNames
Ord(717)
Ord(666)
Ord(702)
Ord(307)
Ord(632)
MethCallEngine
DllFunctionCall
Ord(547)
Zombie_GetTypeInfoCount
Ord(626)
Ord(648)
Ord(578)
Ord(543)
Ord(714)
Ord(100)
Zombie_GetTypeInfo
Ord(608)
Ord(544)
Ord(556)
Ord(618)
Ord(301)
Ord(519)
Ord(561)
Ord(520)
Ord(536)
Ord(517)
Ord(542)
Ord(526)
Ord(321)
Ord(319)
ProcCallEngine
Ord(711)
Ord(660)
EVENT_SINK_Release
Ord(713)
Ord(577)
Ord(617)
Ord(573)
Ord(593)
Ord(581)
Ord(528)
Ord(535)
Ord(601)
Ord(716)
__vbaExceptHandler
Ord(607)
Ord(522)
Ord(670)
Ord(644)
Ord(606)
Ord(631)
Ord(553)
Ord(572)
Ord(619)
Ord(537)
Ord(525)
Ord(598)
Ord(545)
Number of PE resources by type
DATA 2
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2017:12:29 01:08:39+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
344064

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x131c

InitializedDataSize
49152

SubsystemVersion
4.0

ImageVersion
1.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 275e0bcf6f8fcda20c2644a9f4e69476
SHA1 db548dfd44dd7765a00250024d12900d2d32b7b3
SHA256 46e2d7dac697fb5a521cfd1e96c9eed0109dd26e30f214f47f0799a2a41788bc
ssdeep
6144:OOI950gxfBI07lfbRA1X+j0jfwZ+qL5u1eiLCMQC:hW50QV7lfbG1ujwwHL5WJCMQC

authentihash 89aa69e820087701d5a19cad696b9071301b218cf39eb9d197a12cefba1b0399
imphash 680a46c7dc94843a8b101f70c6477067
File size 376.0 KB ( 385024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (54.1%)
Win32 Executable MS Visual C++ (generic) (20.6%)
Win64 Executable (generic) (18.2%)
Win32 Executable (generic) (2.9%)
OS/2 Executable (generic) (1.3%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-19 05:05:10 UTC ( 7 months, 1 week ago )
Last submission 2018-08-19 05:05:10 UTC ( 7 months, 1 week ago )
File names codexgigas_db548dfd44dd7765a00250024d12900d2d32b7b3
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
HTTP requests
DNS requests
TCP connections