× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 65e2b986f8ede3af62ea8d7d2340ba4a614173a8acdfcf3f60c1d2b476674f92
File name: 08ac933158685079745ab869c870ff8229714e3a
Detection ratio: 41 / 67
Analysis date: 2018-03-27 21:38:44 UTC ( 1 year ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30480364 20180327
AegisLab Troj.Downloader.W32.Injecter!c 20180327
AhnLab-V3 Trojan/Win32.Agent.C2444162 20180327
ALYac Backdoor.Agent.Gootkit 20180327
Antiy-AVL Trojan[Downloader]/Win32.Injecter 20180327
Arcabit Trojan.Generic.D1D117EC 20180327
Avast Win32:Malware-gen 20180327
AVG Win32:Malware-gen 20180327
Avira (no cloud) TR/Crypt.EPACK.ykapc 20180327
AVware Trojan.Win32.Generic!BT 20180327
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9969 20180327
BitDefender Trojan.GenericKD.30480364 20180327
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170201
Cylance Unsafe 20180327
Cyren W32/Trojan.GOSE-0915 20180327
DrWeb Trojan.Siggen7.42981 20180327
Emsisoft Trojan.GenericKD.30480364 (B) 20180327
Endgame malicious (high confidence) 20180316
ESET-NOD32 Win32/TrojanDownloader.Agent.DWX 20180327
Fortinet W32/Injecter.DWX!tr.dldr 20180327
GData Trojan.GenericKD.30480364 20180327
Ikarus Trojan-Downloader.Win32.Agent 20180327
Sophos ML heuristic 20180121
K7AntiVirus Trojan-Downloader ( 0052aafa1 ) 20180327
K7GW Trojan-Downloader ( 0052aafa1 ) 20180327
Kaspersky Trojan-Downloader.Win32.Injecter.wwh 20180327
McAfee Artemis!CB3AD4983482 20180327
McAfee-GW-Edition BehavesLike.Win32.Trojan.dh 20180327
Microsoft Trojan:Win32/Tiggre!plock 20180327
eScan Trojan.GenericKD.30480364 20180327
Palo Alto Networks (Known Signatures) generic.ml 20180327
Panda Trj/GdSda.A 20180327
SentinelOne (Static ML) static engine - malicious 20180225
Symantec Trojan.Asprox.B 20180327
Tencent Win32.Trojan-downloader.Injecter.Syrq 20180327
TrendMicro TROJ_OTLARD.UF 20180327
TrendMicro-HouseCall TROJ_OTLARD.UF 20180327
VIPRE Trojan.Win32.Generic!BT 20180327
ViRobot Trojan.Win32.S.Agent.270336.WB 20180327
WhiteArmor Malware.HighConfidence 20180324
ZoneAlarm by Check Point Trojan-Downloader.Win32.Injecter.wwh 20180327
Alibaba 20180327
Avast-Mobile 20180327
Bkav 20180327
CAT-QuickHeal 20180327
ClamAV 20180327
CMC 20180327
Comodo 20180327
Cybereason 20180225
eGambit 20180327
F-Prot 20180327
F-Secure 20180327
Jiangmin 20180327
Kingsoft 20180327
Malwarebytes 20180327
MAX 20180327
NANO-Antivirus 20180327
nProtect 20180327
Qihoo-360 20180327
Rising 20180327
Sophos AV 20180327
SUPERAntiSpyware 20180327
Symantec Mobile Insight 20180311
TheHacker 20180327
TotalDefense 20180327
Trustlook 20180327
VBA32 20180327
Yandex 20180327
Zillya 20180327
Zoner 20180326
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-26 10:36:55
Entry Point 0x0002991B
Number of sections 4
PE sections
PE imports
HeapSize
GetLastError
IsValidCodePage
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetLocaleInfoW
LoadLibraryW
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
HeapAlloc
TlsAlloc
GetDateFormatA
GetEnvironmentStringsW
GetVersionExA
GetModuleFileNameA
RtlUnwind
LoadLibraryA
GetACP
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
EnumSystemLocalesA
GetEnvironmentStrings
GetLocaleInfoA
SetConsoleCtrlHandler
GetCurrentProcessId
GetUserDefaultLCID
UnhandledExceptionFilter
LCMapStringA
GetCurrentProcess
ExitProcess
InterlockedDecrement
MultiByteToWideChar
FatalAppExitA
FreeEnvironmentStringsW
GetCPInfo
GetCommandLineA
GetProcAddress
TlsFree
GetCurrentThread
LeaveCriticalSection
CompareStringW
RaiseException
InitializeCriticalSection
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
GetSystemTimeAsFileTime
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
InterlockedIncrement
CloseHandle
GetTimeFormatA
IsValidLocale
HeapDestroy
HeapReAlloc
GetStringTypeW
GetModuleHandleW
SetEnvironmentVariableA
FreeLibrary
TerminateProcess
CreateEventW
GetTimeZoneInformation
HeapCreate
VirtualFree
TlsGetValue
Sleep
GetFileType
TlsSetValue
GetTickCount
GetCurrentThreadId
GetProcessHeap
VirtualAlloc
SetLastError
CompareStringA
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
ReleaseStgMedium
CoCreateGuid
CoCreateInstance
CLSIDFromProgID
CoQueryProxyBlanket
OleSaveToStream
CLSIDFromString
Number of PE resources by type
RT_DIALOG 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:03:26 11:36:55+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
233472

LinkerVersion
7.1

ImageFileCharacteristics
Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x2991b

InitializedDataSize
32768

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 cb3ad4983482a70022eaa83bbcf56374
SHA1 4793f245ee6f04f836071528f9f66d3a9a678341
SHA256 65e2b986f8ede3af62ea8d7d2340ba4a614173a8acdfcf3f60c1d2b476674f92
ssdeep
6144:tUqkdjo/DjPDlsmt+6hqGfPTDMR6qJJsdQs:t/yjoPDt+6hDvMRJzsdQs

authentihash d4c1f49321baaf040d72b9b3ae3e80be3c624bac2f782bf6f8cdc512c8c1a781
imphash 9b3dc568aaaec34a493318f0f3b0714f
File size 264.0 KB ( 270336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-03-26 12:16:31 UTC ( 1 year ago )
Last submission 2019-01-06 20:24:35 UTC ( 3 months, 2 weeks ago )
File names urlref_httpafirmfwc.org10873.exe
10873.exe
HbdHnshBc.exe
08ac933158685079745ab869c870ff8229714e3a
VirusShare_cb3ad4983482a70022eaa83bbcf56374
.
HbdHnshBc.exe
output.113042447.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Opened mutexes
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.