× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 52915c7a47c3f8b815d7dab2c1c4b6838d0d7ab5dab54c95f690aa64cefed447
File name: file-5984959_
Detection ratio: 51 / 54
Analysis date: 2016-07-08 04:18:38 UTC ( 2 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Generic.KD.914347 20160708
AegisLab Packer.W32.Krap.lJyH 20160708
AhnLab-V3 Trojan/Win32.HmBlocker.N954679251 20160707
ALYac Trojan.Generic.KD.914347 20160708
Antiy-AVL Worm[Net]/Win32.Kolab 20160708
Arcabit Trojan.Generic.KD.DDF3AB 20160708
Avast Win32:Malware-gen 20160708
AVG Dropper.Generic7.COFM 20160708
Avira (no cloud) TR/Dropper.Gen 20160708
AVware Trojan.Win32.Agent.aaxv (v) 20160708
Baidu Win32.Trojan.Injector.dt 20160706
BitDefender Trojan.Generic.KD.914347 20160708
Bkav W32.KeyloggerLTHVAP.Trojan 20160707
ClamAV Win.Trojan.Agent-1073066 20160708
CMC Backdoor.Win32.Azbreg!O 20160704
Comodo TrojWare.Win32.Injector.BGJ 20160708
Cyren W32/Trojan.WLUI-7811 20160708
DrWeb BackDoor.Gurl.2 20160708
Emsisoft Trojan.Generic.KD.914347 (B) 20160708
ESET-NOD32 Win32/Injector.AEJX 20160707
F-Prot W32/Trojan2.NWBR 20160708
F-Secure Trojan.Generic.KD.914347 20160708
Fortinet W32/Injector.AEJX!tr 20160708
GData Trojan.Generic.KD.914347 20160708
Ikarus Trojan.Win32.Ircbrute 20160707
Jiangmin Backdoor/Azbreg.aoo 20160707
K7AntiVirus Trojan ( 0040f5791 ) 20160707
K7GW Trojan ( 0040f5791 ) 20160708
Kaspersky HEUR:Trojan.Win32.Generic 20160708
Malwarebytes Worm.AutoRun 20160708
McAfee Dropper-FED!611A6341C52A 20160708
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.pt 20160708
Microsoft Trojan:Win32/Lethic.B 20160708
eScan Trojan.Generic.KD.914347 20160708
NANO-Antivirus Trojan.Win32.Gurl.brorzr 20160708
nProtect Trojan.Generic.KD.914347 20160707
Panda Trj/Zbot.M 20160707
Qihoo-360 HEUR/Malware.QVM07.Gen 20160708
Sophos AV Troj/Agent-AAXV 20160708
SUPERAntiSpyware Trojan.Agent/Gen-Zusy 20160708
Symantec Packed.Generic.326 20160708
Tencent Win32.Trojan.Generic.Wklu 20160708
TheHacker Trojan/Injector.aejx 20160707
TotalDefense Win32/Lethic.THCJaN 20160708
TrendMicro TROJ_SPNR.35JA13 20160708
TrendMicro-HouseCall TROJ_SPNR.2BJ213 20160708
VBA32 BScope.Backdoor.IRCBot.2122 20160707
VIPRE Trojan.Win32.Agent.aaxv (v) 20160708
ViRobot Worm.Win32.Net-Kolab.68231[h] 20160707
Zillya Trojan.HmBlocker.Win32.3851 20160707
Zoner Trojan.Lethic.AA 20160708
Alibaba 20160708
CAT-QuickHeal 20160707
Kingsoft 20160708
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-10-28 19:00:30
Entry Point 0x0000160F
Number of sections 5
PE sections
Overlays
MD5 d54b5afbbe057f99e7315848f347b0cb
File type ASCII text
Offset 40960
Size 4570
Entropy 0.00
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetOEMCP
LCMapStringA
HeapDestroy
ExitProcess
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
GetCurrentProcess
GetEnvironmentStrings
AddAtomA
GetCPInfo
UnhandledExceptionFilter
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetStartupInfoA
GetACP
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
TerminateProcess
InitializeCriticalSection
HeapCreate
VirtualFree
TlsGetValue
GetFileType
GetTickCount
TlsSetValue
HeapAlloc
GetVersion
VirtualAlloc
SetLastError
LeaveCriticalSection
DrawAnimatedRects
FlashWindowEx
Number of PE resources by type
Struct(202) 1
Struct(211) 1
Number of PE resources by language
GERMAN NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:10:28 20:00:30+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
6.0

FileTypeExtension
exe

InitializedDataSize
16384

SubsystemVersion
4.0

EntryPoint
0x160f

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 611a6341c52a9bc4601bb9e619c339e3
SHA1 ba728e51d841d6e048f1232663c40abba8fd76c8
SHA256 52915c7a47c3f8b815d7dab2c1c4b6838d0d7ab5dab54c95f690aa64cefed447
ssdeep
384:bpcTPJTRb47dEbmltqyA6FVvQQVU+oE3l3ZSQjwAcIoHeHOHEhw:bCbJTWdEDgbvXF3l3ZSQcAg+uHEhw

authentihash 6546b6ee4adbaa9d4d012532cf8942801bf85fddecb5b7c2fa31b0f953d09a44
imphash b41f22486d4aa79695588232cb2c7b00
File size 44.5 KB ( 45530 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 5.0 (56.7%)
Win32 Executable MS Visual C++ (generic) (29.1%)
Win32 Dynamic Link Library (generic) (6.1%)
Win32 Executable (generic) (4.2%)
Generic Win/DOS Executable (1.8%)
Tags
peexe armadillo usb-autorun overlay

VirusTotal metadata
First submission 2013-09-17 07:02:30 UTC ( 5 years, 6 months ago )
Last submission 2013-09-18 10:59:03 UTC ( 5 years, 6 months ago )
File names 4fc6.exe
file-5984959_
tl246.exe
xtra.exe
e2f1.exe
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs