× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 52fd5008f67426fd0176f5c956474c3557844a48e697fca7c0e72e83193cbb14
File name: lb.exe.vir
Detection ratio: 7 / 44
Analysis date: 2013-02-11 01:09:02 UTC ( 5 years, 5 months ago ) View latest
Antivirus Result Update
AntiVir TR/Agent.18944.C.2 20130211
Commtouch W32/QQhelper.C.gen!Eldorado 20130210
Comodo TrojWare.Win32.TrojanDownloader.Small.CO 20130210
F-Prot W32/QQhelper.C.gen!Eldorado 20130201
K7AntiVirus Riskware 20130209
Kaspersky HEUR:Trojan.Win32.Generic 20130210
VIPRE Trojan.Win32.Generic.pak!cobra 20130211
Yandex 20130210
Antiy-AVL 20130210
Avast 20130211
AVG 20130211
BitDefender 20130211
ByteHero 20130207
CAT-QuickHeal 20130210
ClamAV 20130211
Emsisoft 20130211
eSafe 20130206
ESET-NOD32 20130210
F-Secure 20130210
Fortinet 20130211
GData 20130211
Ikarus 20130210
Jiangmin 20130210
Kingsoft 20130204
Malwarebytes 20130211
McAfee 20130211
McAfee-GW-Edition 20130210
Microsoft 20130211
eScan 20130211
NANO-Antivirus 20130210
Norman 20130210
nProtect 20130210
Panda 20130210
PCTools 20130211
Rising 20130205
Sophos AV 20130210
SUPERAntiSpyware 20130210
Symantec 20130211
TheHacker 20130208
TotalDefense 20130210
TrendMicro 20130211
TrendMicro-HouseCall 20130211
VBA32 20130208
ViRobot 20130210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Certificate out of its validity period
Signers
[+] jtc
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Code Signing CA - G2
Valid from 1:00 AM 10/29/2012
Valid to 12:59 AM 10/30/2013
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm sha1RSA
Thumbprint 03A35AD923428136BED6CB931BC88FFFDDE8B01F
Serial number 72 B4 F5 66 7F 69 F5 43 21 A9 40 09 97 4C CC F8
[+] Thawte Code Signing CA - G2
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 808D62642B7D1C4A9A83FD667F7A2A9D243FB1C7
Serial number 47 97 4D 78 73 A5 BC AB 0D 2F B3 70 19 2F CE 5E
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-01-30 16:28:33
Entry Point 0x00003C90
Number of sections 4
PE sections
Overlays
MD5 585ee1112df76101255ff003c21cd6eb
File type data
Offset 39936
Size 3936
Entropy 7.40
PE imports
CloseServiceHandle
RegOpenKeyA
RegCloseKey
StartServiceCtrlDispatcherA
OpenServiceA
SetServiceStatus
CreateServiceA
RegQueryValueExA
RegSetValueExA
StartServiceA
DeleteService
RegOpenKeyExA
OpenSCManagerA
RegisterServiceCtrlHandlerA
GetFileTitleA
GetLastError
TerminateThread
lstrlenA
QueryPerformanceCounter
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
ExitThread
GetCurrentProcess
GetCurrentProcessId
UnhandledExceptionFilter
InterlockedCompareExchange
GetProcessHeap
CreateThread
InterlockedExchange
SetUnhandledExceptionFilter
GetStartupInfoA
CloseHandle
GetSystemTimeAsFileTime
GlobalMemoryStatus
GetSystemDirectoryA
SetFileAttributesA
TerminateProcess
CopyFileA
Sleep
GetTickCount
GetCurrentThreadId
strncmp
__p__fmode
rand
srand
_time64
__dllonexit
_controlfp_s
printf
_invoke_watson
_cexit
?terminate@@YAXXZ
_lock
_onexit
_amsg_exit
_encode_pointer
_XcptFilter
exit
__setusermatherr
_decode_pointer
__p__commode
_adjust_fdiv
_acmdln
memset
_ismbblead
_unlock
_crt_debugger_hook
memcpy
__CxxFrameHandler3
_except_handler4_common
atoi
__getmainargs
_initterm
strstr
_initterm_e
_configthreadlocale
_exit
__set_app_type
wsprintfA
setsockopt
WSASocketA
gethostname
socket
__WSAFDIsSet
recv
inet_addr
send
WSAStartup
gethostbyname
select
connect
sendto
htonl
inet_ntoa
htons
closesocket
WSAGetLastError
Ord(2539)
Ord(820)
Ord(300)
Ord(2568)
Ord(2082)
Ord(305)
Ord(1611)
Ord(3213)
Ord(4507)
Ord(5924)
Ord(1603)
Ord(817)
Ord(910)
Ord(2481)
Ord(316)
Ord(601)
Ord(310)
Ord(5997)
Ord(6613)
Ord(800)
Ord(4392)
Ord(3178)
Ord(941)
Ord(2691)
Number of PE resources by type
RT_ICON 3
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
CHINESE SIMPLIFIED 4
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2013:01:30 17:28:33+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
13824

LinkerVersion
9.0

EntryPoint
0x3c90

InitializedDataSize
25088

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 834c5d298c2670c2ea093b4ced41e311
SHA1 46d1d7c806457e16ee891d6cb0456e1406abc1a9
SHA256 52fd5008f67426fd0176f5c956474c3557844a48e697fca7c0e72e83193cbb14
ssdeep
768:DCcBdGuOljrJyWu+zHYbE2T+QH4caea7hnBXMe8aqdGNujn8+K0:OwwuOljrgW5gE2T+7c32dKt90NYw0

authentihash 4edb8828f0a30bd759dc0a55cd8767d35850fc5374e0a97fc7d75ba60504318f
imphash 20fad5ac5eee79be5bed40aa36d50d24
File size 42.8 KB ( 43872 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.4%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2013-02-11 01:09:02 UTC ( 5 years, 5 months ago )
Last submission 2017-08-05 06:56:02 UTC ( 11 months, 2 weeks ago )
File names 52fd.exe
lb.exe
52fd5008f67426fd0176f5c956474c3557844a48e697fca7c0e72e83193cbb14
834c5d298c2670c2ea093b4ced41e311.vir
834c5d298c2670c2ea093b4ced41e311
lb.exe.vir
46D1D7C806457E16EE891D6CB0456E1406ABC1A9.a2m
52fd5008f67426fd0176f5c956474c3557844a48e697fca7c0e72e83193cbb14.exe
111.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!