× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 603b65c612b2e65e420679094fdf351e5b649fb1d8d57cda413c3c712749a2a2
File name: PostalReceipt.exe
Detection ratio: 7 / 46
Analysis date: 2013-01-31 21:01:33 UTC ( 6 years, 3 months ago ) View latest
Antivirus Result Update
ESET-NOD32 a variant of Win32/Kryptik.ABNX 20130131
Fortinet W32/Kuluoz.ABY!tr.dldr 20130131
Kaspersky UDS:DangerousObject.Multi.Generic 20130131
Symantec Suspicious.Cloud 20130131
TheHacker Posible_Worm32 20130131
TrendMicro PAK_Generic.001 20130131
TrendMicro-HouseCall PAK_Generic.001 20130131
Yandex 20130131
AhnLab-V3 20130131
AntiVir 20130131
Antiy-AVL 20130131
Avast 20130131
AVG 20130131
BitDefender 20130131
ByteHero 20130131
CAT-QuickHeal 20130131
ClamAV 20130131
Commtouch 20130131
Comodo 20130131
DrWeb 20130131
Emsisoft 20130131
eSafe 20130131
F-Prot 20130131
F-Secure 20130131
GData 20130131
Ikarus 20130131
Jiangmin 20121221
K7AntiVirus 20130131
Kingsoft 20130131
Malwarebytes 20130131
McAfee 20130131
McAfee-GW-Edition 20130131
Microsoft 20130131
eScan 20130131
NANO-Antivirus 20130131
Norman 20130131
nProtect 20130131
Panda 20130131
PCTools 20130131
Rising 20130131
Sophos AV 20130131
SUPERAntiSpyware 20130131
TotalDefense 20130131
VBA32 20130131
VIPRE 20130131
ViRobot 20130131
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-02-01 06:32:51
Entry Point 0x0000C5F0
Number of sections 3
PE sections
PE imports
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
Ord(267)
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:02:01 07:32:51+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
9.0

FileAccessDate
2013:04:23 12:19:58+01:00

EntryPoint
0xc5f0

InitializedDataSize
4096

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

FileCreateDate
2013:04:23 12:19:58+01:00

UninitializedDataSize
24576

Compressed bundles
File identification
MD5 bf061265407ea1f7c21fbf5f545c4c2b
SHA1 42d6d837709c1ee86d10add83fe35b761181306e
SHA256 603b65c612b2e65e420679094fdf351e5b649fb1d8d57cda413c3c712749a2a2
ssdeep
768:J+nC9DXY648PVhC2oKzmaaP4/tHVtgGWn9/O:JJDO2nSs/VxI9/

imphash 5452e9ff7f56e9235cd0771f67fe4395
File size 25.0 KB ( 25600 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2013-01-31 20:23:33 UTC ( 6 years, 3 months ago )
Last submission 2013-02-04 02:13:19 UTC ( 6 years, 3 months ago )
File names bf061265407ea1f7c21fbf5f545c4c2b
file-5090720_exe
bf061265407ea1f7c21fbf5f545c4c2b.exe
1528429.malware
bf061265407ea1f7c21fbf5f545c4c2b.malware
PostalReceipt.exe
ukjlbkma.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!