× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 49ac6a6c5449396b98a89709b0ad21d078af783ec8f1cd32c1c8b5ae71bec129
File name: 22672eeb15ab0d07a3dfe4d03c5f0990.virobj
Detection ratio: 49 / 68
Analysis date: 2018-02-12 11:00:02 UTC ( 3 months, 1 week ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Graftor.308358 20180212
AegisLab Uds.Dangerousobject.Multi!c 20180212
AhnLab-V3 Trojan/Win32.Dynamer.C1510827 20180212
ALYac Gen:Variant.Graftor.308358 20180212
Antiy-AVL Trojan/Win32.McRat 20180212
Arcabit Trojan.Graftor.D4B486 20180212
Avast Win32:Malware-gen 20180212
AVG Win32:Malware-gen 20180212
Avira (no cloud) TR/Drop.Agent.hhzs 20180212
AVware Trojan.Win32.Generic!BT 20180210
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20180208
BitDefender Gen:Variant.Graftor.308358 20180212
CAT-QuickHeal Trojan.Dynamer 20180212
CrowdStrike Falcon (ML) malicious_confidence_60% (D) 20170201
Cybereason malicious.b15ab0 20180205
Cylance Unsafe 20180212
Cyren W32/Trojan.NYJW-5358 20180212
DrWeb Trojan.DownLoader22.17310 20180212
eGambit Unsafe.AI_Score_97% 20180212
Emsisoft Gen:Variant.Graftor.308358 (B) 20180212
Endgame malicious (high confidence) 20171130
F-Secure Gen:Variant.Graftor.308358 20180211
Fortinet W32/KORPLUG.MMH!tr 20180212
GData Gen:Variant.Graftor.308358 20180212
Jiangmin Trojan.McRat.g 20180212
K7AntiVirus Riskware ( 0040eff71 ) 20180212
K7GW Riskware ( 0040eff71 ) 20180212
Kaspersky HEUR:Trojan.Win32.Generic 20180212
MAX malware (ai score=100) 20180212
McAfee Generic.adp 20180212
McAfee-GW-Edition Generic.adp 20180212
eScan Gen:Variant.Graftor.308358 20180212
NANO-Antivirus Trojan.Win32.Drop.eevmzy 20180212
Palo Alto Networks (Known Signatures) generic.ml 20180212
Panda Trj/GdSda.A 20180211
Rising Trojan.Generic!8.C3 (TFE:5:1ypIyflWcfO) 20180212
SentinelOne (Static ML) static engine - malicious 20180115
Sophos AV Troj/Agent-ASYM 20180212
Symantec Trojan.Gen.2 20180212
Tencent Win32.Trojan.Generic.Hoyh 20180212
TrendMicro TROJ_MDMBOT.ZTDG-A 20180212
TrendMicro-HouseCall TROJ_MDMBOT.ZTDG-A 20180212
VBA32 Trojan.McRat 20180209
VIPRE Trojan.Win32.Generic!BT 20180212
ViRobot Trojan.Win32.S.Dynamer.489984 20180212
Webroot W32.Trojan.GenKD 20180212
Yandex Trojan.McRat!uNwr6Jrqmh8 20180210
Zillya Trojan.McRat.Win32.22 20180209
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180212
Alibaba 20180209
Avast-Mobile 20180212
Bkav 20180212
ClamAV 20180212
CMC 20180212
Comodo 20180212
ESET-NOD32 20180212
F-Prot 20180212
Ikarus 20180211
Sophos ML 20180121
Kingsoft 20180212
Malwarebytes 20180212
Microsoft 20180212
nProtect 20180212
Qihoo-360 20180212
SUPERAntiSpyware 20180212
Symantec Mobile Insight 20180212
TheHacker 20180208
TotalDefense 20180212
Trustlook 20180212
WhiteArmor 20180205
Zoner 20180212
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-06-22 08:22:28
Entry Point 0x000050AC
Number of sections 9
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetSystemTime
GetStdHandle
GetShortPathNameW
GetModuleFileNameW
FreeLibrary
QueryPerformanceCounter
ExitProcess
LoadLibraryA
RtlUnwind
lstrlenW
CreateProcessW
GetStartupInfoA
SizeofResource
SetThreadPriority
LocalAlloc
lstrcatA
CreateDirectoryA
ExpandEnvironmentStringsA
UnhandledExceptionFilter
GetCommandLineA
lstrcatW
GetCurrentThread
SetFileAttributesA
ExpandEnvironmentStringsW
RaiseException
GetModuleHandleA
WriteFile
GetCurrentProcess
CloseHandle
DeleteFileW
GetACP
GetProcAddress
SetPriorityClass
ResumeThread
LoadResource
lstrcpyA
CreateFileW
VirtualQuery
VirtualFree
TlsGetValue
Sleep
SetFileAttributesW
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
FindResourceA
VirtualAlloc
ShellExecuteW
ShellExecuteA
MessageBoxA
GetKeyboardType
DestroyWindow
Number of PE resources by type
RT_ICON 9
RT_RCDATA 3
RT_DIALOG 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 11
NEUTRAL 3
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:06:22 09:22:28+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
14848

LinkerVersion
2.25

FileTypeExtension
exe

InitializedDataSize
474112

SubsystemVersion
4.0

EntryPoint
0x50ac

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 22672eeb15ab0d07a3dfe4d03c5f0990
SHA1 ca52f7cfcacccdbf9debe1816fe17c7e4808ff9b
SHA256 49ac6a6c5449396b98a89709b0ad21d078af783ec8f1cd32c1c8b5ae71bec129
ssdeep
6144:WlLUM9zgO6Y4+hwt2YrBfyhm8PFTFzymILIrFwCXBZL45AL653:W3b4++r48ClZy9UFwCRr6l

imphash a0d481049dcdbf7191389ffbb6cb4b05
File size 478.5 KB ( 489984 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.6%)
Win16/32 Executable Delphi generic (19.5%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2016-07-18 11:50:16 UTC ( 1 year, 10 months ago )
Last submission 2017-10-21 03:25:09 UTC ( 7 months ago )
File names 1.ex_
2nd Myanmar Industrial Human Resource Development Symposium.exe
22672eeb15ab0d07a3dfe4d03c5f0990.virobj
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Runtime DLLs
DNS requests
TCP connections
UDP communications