× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 55ae063f17268396fcfa530cb125189c268070ccb5380929a7c08e0033f8a734
File name: cd0950d193a61255f2830df461ff57a2b18f580e
Detection ratio: 30 / 69
Analysis date: 2018-09-23 07:36:43 UTC ( 6 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40503562 20180923
ALYac Trojan.GenericKD.40503562 20180923
Antiy-AVL Trojan/Win32.Fuerboos 20180922
Arcabit Trojan.Generic.D26A090A 20180923
Avast Win32:TrojanX-gen [Trj] 20180923
AVG Win32:TrojanX-gen [Trj] 20180923
BitDefender Trojan.GenericKD.40503562 20180923
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cylance Unsafe 20180923
Emsisoft Trojan.GenericKD.40503562 (B) 20180923
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.BVKP 20180923
F-Secure Trojan.GenericKD.40503562 20180923
Fortinet W32/Kryptik.GIHO!tr 20180923
GData Trojan.GenericKD.40503562 20180923
Sophos ML heuristic 20180717
Kaspersky Backdoor.Win32.Androm.qjkc 20180923
MAX malware (ai score=83) 20180923
McAfee RDN/Generic.grp 20180922
McAfee-GW-Edition RDN/Generic.grp 20180923
Microsoft Trojan:Win32/Fuery.B!cl 20180923
eScan Trojan.GenericKD.40503562 20180923
Qihoo-360 HEUR/QVM09.0.0DAB.Malware.Gen 20180923
Rising Malware.Heuristic!ET#95% (RDM+:cmRtazocH3o52WJ5OiPM5f+/AKyp) 20180923
SentinelOne (Static ML) static engine - malicious 20180830
Symantec ML.Attribute.HighConfidence 20180922
Tencent Win32.Backdoor.Androm.Dle 20180923
TrendMicro TROJ_GEN.R020C0PIM18 20180923
TrendMicro-HouseCall TROJ_GEN.R020C0PIM18 20180923
ZoneAlarm by Check Point Backdoor.Win32.Androm.qjkc 20180923
AegisLab 20180923
AhnLab-V3 20180922
Alibaba 20180921
Avast-Mobile 20180923
Avira (no cloud) 20180922
AVware 20180923
Babable 20180918
Baidu 20180914
Bkav 20180921
CAT-QuickHeal 20180922
ClamAV 20180923
CMC 20180922
Comodo 20180923
Cybereason 20180225
Cyren 20180923
DrWeb 20180923
eGambit 20180923
F-Prot 20180923
Ikarus 20180922
Jiangmin 20180923
K7AntiVirus 20180923
K7GW 20180923
Kingsoft 20180923
Malwarebytes 20180923
NANO-Antivirus 20180923
Palo Alto Networks (Known Signatures) 20180923
Panda 20180922
Sophos AV 20180923
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180918
TACHYON 20180922
TheHacker 20180920
TotalDefense 20180923
Trustlook 20180923
VBA32 20180921
VIPRE 20180923
ViRobot 20180922
Webroot 20180923
Yandex 20180922
Zillya 20180922
Zoner 20180922
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-20 09:50:38
Entry Point 0x00030DFA
Number of sections 3
PE sections
PE imports
RegCreateKeyW
HeapSize
GetLastError
InterlockedDecrement
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryA
GetLocaleInfoW
GetModuleFileNameW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
HeapDestroy
ExitProcess
TlsAlloc
GetDateFormatA
GetEnvironmentStringsW
GetVersionExA
GetModuleFileNameA
RtlUnwind
lstrlenW
FreeEnvironmentStringsA
HeapAlloc
GetStartupInfoA
EnumSystemLocalesA
GetEnvironmentStrings
GetLocaleInfoA
SetConsoleCtrlHandler
GetCurrentProcessId
LCMapStringA
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
FatalAppExitA
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetStringTypeA
GetCurrentThread
LeaveCriticalSection
CompareStringW
InitializeCriticalSection
WideCharToMultiByte
LoadLibraryW
TlsFree
GetModuleHandleA
DeleteCriticalSection
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CompareStringA
GetSystemTimeAsFileTime
IsValidLocale
GetACP
HeapReAlloc
GetStringTypeW
GetUserDefaultLCID
SetEnvironmentVariableA
FreeLibrary
TerminateProcess
GetTimeZoneInformation
IsValidCodePage
HeapCreate
GetTimeFormatA
VirtualFree
IsDebuggerPresent
Sleep
GetFileType
TlsSetValue
GetTickCount
GetCurrentThreadId
GetProcessHeap
VirtualAlloc
SetLastError
InterlockedIncrement
CoUninitialize
CoInitialize
OleInitialize
CoCreateGuid
RegisterDragDrop
CreateBindCtx
OleSaveToStream
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
5.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:09:20 10:50:38+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
263680

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
19968

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x30dfa

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 018e43cc906172ef67e43562eda4cabf
SHA1 cd0950d193a61255f2830df461ff57a2b18f580e
SHA256 55ae063f17268396fcfa530cb125189c268070ccb5380929a7c08e0033f8a734
ssdeep
6144:z4uHmVV3206mlejZb/e0/b8CBRApS8aGmjASmVXA8Qb8jPAaAzD:UNubD9BRIajAjVqbOPAVzD

authentihash 9650afa32b1e6e390ee65c7d6d0966d4dba99f1db8cfea5246f0076ca1c6f47d
imphash e1aebf414322382ce024457881d272b1
File size 275.0 KB ( 281600 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-23 07:36:43 UTC ( 6 months, 4 weeks ago )
Last submission 2018-09-23 07:36:43 UTC ( 6 months, 4 weeks ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Opened mutexes
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.