× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 59926a094f97fc24a410c89c2fefc8e1b283583486f9d8af37f4eb72c8c00bd2
File name: vt-upload-ajSCJ
Detection ratio: 23 / 55
Analysis date: 2014-09-27 08:29:15 UTC ( 4 years, 5 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Graftor.156553 20140927
AhnLab-V3 Trojan/Win32.ZBot 20140926
Avast Win32:Malware-gen 20140927
AVG Zbot.OGT 20140927
Avira (no cloud) TR/Graftor.156553.9 20140927
AVware Trojan.Win32.Generic!BT 20140927
BitDefender Gen:Variant.Graftor.156553 20140927
Bkav HW32.Paked.27AD 20140925
Emsisoft Gen:Variant.Graftor.156553 (B) 20140927
ESET-NOD32 Win32/Spy.Zbot.ACB 20140927
F-Secure Gen:Variant.Graftor.156553 20140926
Fortinet W32/Zbot.ACB!tr.spy 20140927
GData Gen:Variant.Graftor.156553 20140927
Ikarus Trojan.Win32.ASProtect 20140927
Malwarebytes Trojan.Agent.EDUR 20140927
McAfee RDN/Generic PWS.y!bb3 20140927
McAfee-GW-Edition BehavesLike.Win32.Expiro.gc 20140926
eScan Gen:Variant.Graftor.156553 20140927
Qihoo-360 Win32/Trojan.330 20140927
SUPERAntiSpyware Trojan.Agent/Gen-Dropper 20140926
Symantec WS.Reputation.1 20140927
TrendMicro-HouseCall TROJ_GEN.R011H09IN14 20140927
VIPRE Trojan.Win32.Generic!BT 20140927
AegisLab 20140927
Yandex 20140926
Antiy-AVL 20140927
Baidu-International 20140927
ByteHero 20140927
CAT-QuickHeal 20140926
ClamAV 20140927
CMC 20140925
Comodo 20140927
Cyren 20140927
DrWeb 20140927
F-Prot 20140927
Jiangmin 20140926
K7AntiVirus 20140926
K7GW 20140926
Kaspersky 20140927
Kingsoft 20140927
Microsoft 20140927
NANO-Antivirus 20140926
Norman 20140927
nProtect 20140926
Panda 20140926
Rising 20140926
Sophos AV 20140927
Tencent 20140927
TheHacker 20140924
TotalDefense 20140926
TrendMicro 20140927
VBA32 20140926
ViRobot 20140927
Zillya 20140927
Zoner 20140925
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
Packers identified
F-PROT Aspack
PEiD ASProtect v1.23 RC1
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-08-02 19:22:17
Entry Point 0x00001000
Number of sections 7
PE sections
Number of PE resources by type
UTAWUGERTYAWQ 2
Number of PE resources by language
ENGLISH US 2
PE resources
File identification
MD5 d2b7e92cc623eb9aa5526a22acb6ff5b
SHA1 883fa0abffb5b92cdcf4f1005e45d939c9028ca1
SHA256 59926a094f97fc24a410c89c2fefc8e1b283583486f9d8af37f4eb72c8c00bd2
ssdeep
12288:nGhaBhYsQSgCifPLBll5O5vc+YXrOcUAERIyl:V4C+9kvcVaxRIy

authentihash e031404603a1c8eeb5c5825f34fbd2c01f6d74ada85042ed09f259f1f0f1cae5
imphash 93100dd53246f74afa5a8ee94a53376d
File size 482.5 KB ( 494086 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.4%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
VXD Driver (0.2%)
Tags
peexe asprotect aspack

VirusTotal metadata
First submission 2014-09-27 08:29:15 UTC ( 4 years, 5 months ago )
Last submission 2014-09-27 08:29:15 UTC ( 4 years, 5 months ago )
File names 59926a094f97fc24a410c89c2fefc8e1b283583486f9d8af37f4eb72c8c00bd2.exe
vt-upload-ajSCJ
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.