× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5a4f2ac060738e3b427efe8c88704acd6b3304ed4dda8be37f6606912b004a4f
File name: 788f5b0671086c00a1089338dec8e4b0.virus
Detection ratio: 40 / 59
Analysis date: 2017-03-02 23:27:24 UTC ( 1 year, 11 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.140334 20170302
AhnLab-V3 Trojan/Win32.Cerber.R195956 20170302
ALYac Gen:Variant.Razy.140334 20170302
Arcabit Trojan.Razy.D2242E 20170302
Avast Win32:Malware-gen 20170302
AVG Ransomer.NCE 20170302
Avira (no cloud) TR/Crypt.Xpack.dkvye 20170302
AVware Trojan.Win32.Generic!BT 20170302
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170302
BitDefender Gen:Variant.Razy.140334 20170302
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170130
DrWeb Trojan.PWS.Sphinx.2 20170302
Emsisoft Gen:Variant.Razy.140334 (B) 20170302
Endgame malicious (high confidence) 20170222
ESET-NOD32 a variant of Win32/Kryptik.FOZP 20170302
F-Secure Gen:Variant.Razy.140334 20170302
Fortinet W32/GenKryptik.WDP!tr 20170302
GData Gen:Variant.Razy.140334 20170302
Sophos ML trojandropper.win32.sality.au 20170203
Jiangmin Trojan.Zerber.aum 20170301
K7AntiVirus Trojan ( 005071111 ) 20170302
K7GW Trojan ( 005071111 ) 20170302
Kaspersky Trojan-Ransom.Win32.Zerber.clxb 20170302
Malwarebytes Ransom.Spora 20170302
McAfee Ransomware-FMJ!788F5B067108 20170302
McAfee-GW-Edition BehavesLike.Win32.ZeroAccess.dc 20170302
Microsoft Ransom:Win32/Cerber 20170302
eScan Gen:Variant.Razy.140334 20170302
NANO-Antivirus Trojan.Win32.Zerber.elyzpc 20170302
Panda Trj/GdSda.A 20170302
Qihoo-360 HEUR/QVM20.1.0000.Malware.Gen 20170303
Rising Malware.Generic.2!tfe (thunder:2:AdwrpTbZf4U) 20170302
Sophos AV Mal/Elenoocka-E 20170302
SUPERAntiSpyware Ransom.Spora/Variant 20170302
Symantec Packed.Generic.493 20170302
Tencent Win32.Trojan.Zerber.Aisl 20170303
TrendMicro Ransom_Cerber.R0EAC0DBS17 20170302
TrendMicro-HouseCall Ransom_Cerber.R0EAC0DBS17 20170302
VIPRE Trojan.Win32.Generic!BT 20170302
Webroot Malicious 20170303
AegisLab 20170302
Alibaba 20170228
Antiy-AVL 20170302
Bkav 20170302
CAT-QuickHeal 20170302
ClamAV 20170302
CMC 20170302
Comodo 20170302
Cyren 20170302
F-Prot 20170302
Ikarus 20170302
Kingsoft 20170303
nProtect 20170302
TheHacker 20170302
TotalDefense 20170302
Trustlook 20170303
VBA32 20170302
ViRobot 20170302
WhiteArmor 20170222
Yandex 20170225
Zillya 20170302
Zoner 20170302
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-10-04 16:08:32
Entry Point 0x00006948
Number of sections 3
PE sections
Overlays
MD5 6be567897b9f7871df7ab12af9250870
File type data
Offset 258048
Size 186
Entropy 6.95
PE imports
CreateFileMappingW
TlsGetValue
GetProcAddress
LoadLibraryW
SetCurrentDirectoryA
SetEvent
CopyFileA
GetProfileStringA
IsBadWritePtr
OpenMutexW
TlsSetValue
FindFirstFileW
CreateMailslotA
LoadLibraryA
HeapReAlloc
CreateNamedPipeA
SleepEx
GetPrivateProfileStringW
ResetEvent
TraceSQLFetch
TraceSQLConnect
ClusWorkerStart
ClusWorkerCreate
ResUtilDupString
ClusWorkerTerminate
ExtractIconA
StrChrW
SHBrowseForFolderW
SHGetFolderPathW
SHChangeNotify
ShellMessageBoxW
DragQueryPoint
FindExecutableW
SHGetDiskFreeSpaceA
SHGetFileInfoW
DragQueryFileA
ShellAboutA
ShellExecuteA
SHFileOperationA
IsCharAlphaW
LoadCursorA
GetPropW
DrawStateA
CreateDesktopW
DialogBoxParamW
LoadBitmapA
LoadIconW
GetMonitorInfoA
PostMessageW
IsChild
GetClassLongA
CharToOemA
Number of PE resources by type
RT_GROUP_CURSOR 8
RT_MANIFEST 1
MIKL 1
Number of PE resources by language
NEUTRAL 10
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2015:10:04 17:08:32+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
243712

LinkerVersion
5.5

FileTypeExtension
exe

InitializedDataSize
13312

SubsystemVersion
4.0

EntryPoint
0x6948

OSVersion
5.1

ImageVersion
5.1

UninitializedDataSize
0

File identification
MD5 788f5b0671086c00a1089338dec8e4b0
SHA1 f34ae9fb4b8a5d4cebe7f34ade16181f051cfa44
SHA256 5a4f2ac060738e3b427efe8c88704acd6b3304ed4dda8be37f6606912b004a4f
ssdeep
6144:u7j5msjsQxpW0KQwIK1QHVjhBdoQEkFw34BWJA76B5I:u7j5msjsZ9IKy1lPoQEkq3UG5I

authentihash fb9296a24f315ef2c884f982e5e65f9829c3e03ec57bd5639f0cd8fef29c93f4
imphash bfea4db99e9bfb329cc9d3049c664487
File size 252.2 KB ( 258234 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe overlay suspicious-udp

VirusTotal metadata
First submission 2017-03-02 23:27:24 UTC ( 1 year, 11 months ago )
Last submission 2017-03-02 23:27:24 UTC ( 1 year, 11 months ago )
File names 788f5b0671086c00a1089338dec8e4b0.virus
5a4f2ac060738e3b427efe8c88704acd6b3304ed4dda8be37f6606912b004a4f
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
UDP communications