× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4c0103c745fa6e173821035c304863d751bea9c073d19070d9ebf8685da95040
File name: krablin.exe
Detection ratio: 50 / 69
Analysis date: 2019-01-16 05:59:23 UTC ( 6 days, 4 hours ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31502722 20190115
AegisLab Trojan.Win32.Chapak.4!c 20190115
AhnLab-V3 Dropper/Win32.Agent.C2918276 20190114
ALYac Trojan.Ransom.GandCrab 20190115
Antiy-AVL Trojan/Win32.Chapak 20190115
Arcabit Trojan.Generic.D1E0B182 20190115
Avast Win32:Trojan-gen 20190115
AVG Win32:Trojan-gen 20190115
Avira (no cloud) TR/Crypt.Agent.nhcyu 20190115
BitDefender Trojan.GenericKD.31502722 20190115
CAT-QuickHeal Trojan.Chapak 20190116
Comodo Malware@#wcajjx4xkszt 20190114
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.4a70af 20190109
Cylance Unsafe 20190116
Cyren W32/Trojan.GBGU-2878 20190115
DrWeb Win32.HLLW.Phorpiex.1331 20190114
Emsisoft Trojan-Dropper.Agent (A) 20190114
Endgame malicious (high confidence) 20181108
ESET-NOD32 Win32/Phorpiex.G 20190116
F-Secure Trojan.GenericKD.31502722 20190114
Fortinet W32/GenKryptik.CVXP!tr 20190114
GData Trojan.GenericKD.31502722 20190115
Ikarus Trojan-Ransom.GandCrab 20190115
Sophos ML heuristic 20181128
Jiangmin Trojan/Dialer.mou 20190115
K7AntiVirus Trojan ( 00543e471 ) 20190115
K7GW Trojan ( 00543e471 ) 20190115
Kaspersky Trojan.Win32.Chapak.bqvw 20190115
Malwarebytes Trojan.MalPack.GS 20190115
MAX malware (ai score=100) 20190116
McAfee Trojan-FPYT!77067974A70A 20190115
McAfee-GW-Edition BehavesLike.Win32.PUPXDW.ch 20190115
Microsoft VirTool:Win32/CryptInject.YC!MTB 20190114
eScan Trojan.GenericKD.31502722 20190115
NANO-Antivirus Trojan.Win32.Phorpiex.flxnag 20190116
Palo Alto Networks (Known Signatures) generic.ml 20190116
Panda Trj/GdSda.A 20190116
Qihoo-360 Win32/Trojan.ef8 20190116
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20190116
Sophos AV Troj/Phorpie-I 20190115
Symantec Trojan Horse 20190115
Tencent Win32.Trojan.Chapak.Afhm 20190116
Trapmine malicious.high.ml.score 20190103
TrendMicro Ransom.Win32.GANDCRAB.AA 20190115
TrendMicro-HouseCall Ransom.Win32.GANDCRAB.AA 20190115
VBA32 BScope.Trojan.Chapak 20190115
ViRobot Trojan.Win32.Agent.144384.X 20190115
Webroot W32.Trojan.Gen 20190116
ZoneAlarm by Check Point Trojan.Win32.Chapak.bqvw 20190115
Acronis 20190116
Alibaba 20180921
Avast-Mobile 20190115
Babable 20180918
Baidu 20190115
Bkav 20190108
ClamAV 20190115
CMC 20190114
eGambit 20190116
F-Prot 20190115
Kingsoft 20190116
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190109
TACHYON 20190115
TheHacker 20190115
Trustlook 20190116
Yandex 20190111
Zillya 20190115
Zoner 20190115
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-12-13 13:38:41
Entry Point 0x00007E9D
Number of sections 7
PE sections
PE imports
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
TerminateProcess
SetHandleCount
GetModuleFileNameW
GetOEMCP
GetEnvironmentStringsW
HeapDestroy
ExitProcess
TlsAlloc
IsValidLocale
VirtualProtect
GetLocaleInfoW
LoadLibraryA
RtlUnwind
FillConsoleOutputCharacterW
HeapAlloc
HeapSetInformation
GetStartupInfoA
EnumSystemLocalesA
GetLocaleInfoA
GetCurrentProcessId
AddAtomA
GetCurrentDirectoryA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
IsDebuggerPresent
GetCommandLineA
GetProcAddress
AddAtomW
EncodePointer
GetCurrentThread
LCMapStringW
RaiseException
GetCPInfo
LoadLibraryW
TlsFree
GetSystemTimeAsFileTime
DeleteCriticalSection
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
IsProcessorFeaturePresent
GetSystemTimes
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
FreeLibrary
LocalFree
GlobalMemoryStatus
GetModuleFileNameA
QueryPerformanceCounter
WideCharToMultiByte
GetProcessShutdownParameters
IsValidCodePage
HeapCreate
GetStringTypeW
FatalAppExitA
TlsGetValue
Sleep
GetFileType
TlsSetValue
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
GetUserDefaultLCID
SetConsoleCtrlHandler
SetLastError
InterlockedIncrement
PeekMessageA
Number of PE resources by type
RT_ICON 2
COPISAGIBEPISATOXIWUCATOJOSU 1
Struct(241) 1
RT_STRING 1
RT_VERSION 1
YIHURU 1
RT_GROUP_ICON 1
Number of PE resources by language
SERBIAN DEFAULT 8
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileVersionNumber
1.0.0.0

LanguageCode
Unknown (457A)

FileFlagsMask
0x004f

ImageFileCharacteristics
Executable, Large address aware, 32-bit

CharacterSet
Unknown (A56B)

InitializedDataSize
143872

EntryPoint
0x7e9d

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3.4.6.86

TimeStamp
2017:12:13 14:38:41+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
mukuge.exe

ProductVersion
3.4.6.86

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Unknown (0x40534)

LegalCopyright
Copyright (C) 2018, vasupejen

MachineType
Intel 386 or later, and compatibles

CodeSize
105472

FileSubtype
0

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
Compressed bundles
File identification
MD5 77067974a70af43a3cadf88219d1e28c
SHA1 7aa8fd4d0e0f44a4ed37f8542f7a1b0bc9faa58c
SHA256 4c0103c745fa6e173821035c304863d751bea9c073d19070d9ebf8685da95040
ssdeep
1536:EJuqJbIXcA+Uli+SR1rJ0Fgc/7rSmOnVO1en5n/bFzhvYCvCY1AbIwLVbV56:yLJbIXjPkSgnzDHFCjbI8V

authentihash a3b0cdfc4ee687bda4cc3187c726b162be43125c4e8d3c58873e1c35bf2b21f7
imphash 7fcc8b9d7ca1591b5c9cd6b043691cb9
File size 141.0 KB ( 144384 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (61.9%)
Win32 Dynamic Link Library (generic) (13.0%)
Win32 Executable (generic) (8.9%)
OS/2 Executable (generic) (4.0%)
Clipper DOS Executable (4.0%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-08 00:06:35 UTC ( 2 weeks ago )
Last submission 2019-01-10 06:13:08 UTC ( 1 week, 5 days ago )
File names sample7.exe
tempnrq77.exe
TempFLP12.exe
krablin.exe
tempdic86.exe
tempfpe37.exe
tempflp12.exe
temppje77.exe
winsvcs.exe
GandCrab v5.0.4.exe
temptgn89.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!