× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5bff51a9aa0172409a3699c62dd965717d69d178de5cf3cdff73ee10d47d653e
File name: 89abgbf67c20hd5dr92rh2fa6a382cdb.exe
Detection ratio: 46 / 70
Analysis date: 2018-11-28 19:13:13 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40763852 20181128
AhnLab-V3 Trojan/Win32.Skeeyah.R244952 20181128
ALYac Trojan.GenericKD.40763852 20181128
Antiy-AVL Trojan/Win32.GenKryptik 20181128
Arcabit Trojan.Generic.D26E01CC 20181128
Avast Win32:MalwareX-gen [Trj] 20181128
AVG Win32:MalwareX-gen [Trj] 20181128
Avira (no cloud) TR/Kryptik.ieokv 20181128
BitDefender Trojan.GenericKD.40763852 20181128
CAT-QuickHeal Trojan.IGENERIC 20181128
Comodo Malware@#21qyye5z2utsh 20181128
CrowdStrike Falcon (ML) malicious_confidence_60% (W) 20181022
Cylance Unsafe 20181128
Cyren W32/Trojan.TLHT-1453 20181128
DrWeb Trojan.Gozi.363 20181128
eGambit PE.Heur.InvalidSig 20181128
Emsisoft Trojan.GenericKD.40763852 (B) 20181128
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GMXV 20181128
F-Prot W32/S-664f4d4d!Eldorado 20181128
F-Secure Trojan.GenericKD.40763852 20181128
Fortinet W32/GenKryptik.CQXB!tr 20181128
GData Trojan.GenericKD.40763852 20181128
Ikarus Trojan.Crypt 20181128
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005413c41 ) 20181128
K7GW Trojan ( 005413c41 ) 20181128
Kaspersky HEUR:Trojan.Win32.Generic 20181128
MAX malware (ai score=100) 20181128
McAfee RDN/Generic.dx 20181128
McAfee-GW-Edition RDN/Generic.dx 20181128
Microsoft Trojan:Win32/Ursnif.C!MTB 20181128
eScan Trojan.GenericKD.40763852 20181128
NANO-Antivirus Trojan.Win32.Ursnif.fkesyg 20181128
Palo Alto Networks (Known Signatures) generic.ml 20181128
Panda Trj/Genetic.gen 20181128
Qihoo-360 Win32/Trojan.7e6 20181128
Rising Backdoor.Vawtrak!8.11D (CLOUD) 20181128
Sophos AV Mal/EncPk-ANX 20181128
Symantec Trojan.Gen.2 20181128
Trapmine suspicious.low.ml.score 20181126
TrendMicro TROJ_GEN.R011C0PKI18 20181128
TrendMicro-HouseCall TROJ_GEN.R011C0PKI18 20181128
VBA32 BScope.TrojanSpy.Ursnif 20181128
Zillya Trojan.Ursnif.Win32.3578 20181128
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181128
AegisLab 20181128
Alibaba 20180921
Avast-Mobile 20181128
Babable 20180918
Baidu 20181128
Bkav 20181128
ClamAV 20181128
CMC 20181128
Cybereason 20180225
Jiangmin 20181128
Kingsoft 20181128
Malwarebytes 20181128
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181128
Symantec Mobile Insight 20181121
TACHYON 20181128
Tencent 20181128
TheHacker 20181126
TotalDefense 20181128
Trustlook 20181128
VIPRE 20181128
ViRobot 20181128
Webroot 20181128
Yandex 20181128
Zoner 20181128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2016 The Apache Software Foundation.

Product Apache HTTP Server
Original name httpd.exe
Internal name httpd.exe
File version 2.4.25
Description Apache HTTP Server
Comments Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Signature verification The digital signature of the object did not verify.
Signing date 12:31 PM 2/7/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-11-22 14:01:07
Entry Point 0x00002430
Number of sections 6
PE sections
Overlays
MD5 9daee6e60c3c105e932de69d4d0ae1c4
File type data
Offset 311296
Size 7552
Entropy 7.24
PE imports
SetSecurityDescriptorOwner
CryptEnumProviderTypesW
RegQueryInfoKeyW
JetTerm2
GetCharWidthFloatA
GetModuleHandleW
DsBindWithCredW
PathRemoveExtensionA
CreateWindowStationA
ToAscii
SetClipboardViewer
midiInStart
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
4294905856

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.4.25.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Apache HTTP Server

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
290816

EntryPoint
0x2430

OriginalFileName
httpd.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2016 The Apache Software Foundation.

FileVersion
2.4.25

TimeStamp
2005:11:22 06:01:07-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
httpd.exe

ProductVersion
2.4.25

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Apache Software Foundation

CodeSize
20480

ProductName
Apache HTTP Server

ProductVersionNumber
2.4.25.0

DistributedBy
The Apache Haus

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 0f930c9ad106265c5fd604a976a7ec43
SHA1 89c51612e37d2f90b437e1ac25ab6bf148394aff
SHA256 5bff51a9aa0172409a3699c62dd965717d69d178de5cf3cdff73ee10d47d653e
ssdeep
1536:hlhc9MLyRR5AB4yxIAGWVV9+PmW49KBEPgjC+EhqIHkC5oi7E:hlh2MGRQB4qIWokRHkCG

authentihash 4c9d66b26b2c00bb4c6a96aa2d0fccdfbdd8a6322941db23ad0ffbad91370c87
imphash 99c3bb22296edaa6606a5feb0290d47b
File size 311.4 KB ( 318848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-11-16 08:20:22 UTC ( 3 months ago )
Last submission 2018-11-16 08:20:22 UTC ( 3 months ago )
File names 89abgbf67c20hd5dr92rh2fa6a382cdb.exe
httpd.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.