× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 686fc21ea9461f1d406d042cc99e3a43360b98136dff134ee31d783de19f193d
File name: output.114272103.txt
Detection ratio: 49 / 67
Analysis date: 2018-10-18 18:15:50 UTC ( 1 day, 14 hours ago )
Antivirus Result Update
Ad-Aware Trojan.AgentWDCR.OND 20181018
AegisLab Trojan.Win32.Generic.4!c 20181018
AhnLab-V3 Malware/Win32.Generic.C2735681 20181018
ALYac Trojan.AgentWDCR.OND 20181018
Arcabit Trojan.AgentWDCR.OND 20181018
Avast Win32:Malware-gen 20181018
AVG Win32:Malware-gen 20181018
Avira (no cloud) TR/Formbook.arr 20181018
BitDefender Trojan.AgentWDCR.OND 20181018
CAT-QuickHeal Trojan.IGENERIC 20181018
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20180723
Cybereason malicious.f9b4c9 20180225
Cylance Unsafe 20181018
Cyren W32/Skeeyah.FVYF-5980 20181018
DrWeb Trojan.PWS.Banker1.26525 20181018
Emsisoft Trojan.AgentWDCR.OND (B) 20181018
Endgame malicious (high confidence) 20180730
ESET-NOD32 Win32/Formbook.AA 20181018
F-Prot W32/Skeeyah.JU 20181018
F-Secure Trojan.GenericKD.40454831 20181018
Fortinet W32/Injector.EANH!tr 20181018
GData NSIS.Trojan-Ransom.GandCrab.H 20181018
Ikarus Trojan.Win32.Formbook 20181018
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 0052eef11 ) 20181018
K7GW Trojan ( 0052eef11 ) 20181018
Kaspersky Trojan.Win32.Agentb.jfcs 20181018
Malwarebytes Trojan.MalPack.NSIS 20181018
MAX malware (ai score=100) 20181018
McAfee Artemis!AAADCA8F9B4C 20181018
McAfee-GW-Edition BehavesLike.Win32.Vopak.dc 20181018
Microsoft Trojan:Win32/Skeeyah.A!rfn 20181018
eScan Trojan.AgentWDCR.OND 20181018
NANO-Antivirus Trojan.Win32.Banker1.fjdxdi 20181018
Palo Alto Networks (Known Signatures) generic.ml 20181018
Panda Trj/WLT.D 20181018
Qihoo-360 Win32/Trojan.Spy.9dd 20181018
Rising Trojan.Injector!8.C4 (CLOUD) 20181018
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/Generic-S 20181018
Symantec Trojan.Gen.2 20181018
Tencent Win32.Trojan.Agentb.Lpbp 20181018
TrendMicro TSPY_FAREIT.USJHAH 20181018
TrendMicro-HouseCall TSPY_FAREIT.USJHAH 20181018
VBA32 TrojanSpy.Noon 20181018
Webroot W32.Trojan.GenKD 20181018
Yandex Trojan.Injector!jpNqH+Emxlg 20181017
Zillya Trojan.Noon.Win32.3106 20181018
ZoneAlarm by Check Point Trojan.Win32.Agentb.jfcs 20181018
Alibaba 20180921
Antiy-AVL 20181018
Avast-Mobile 20181018
Babable 20180918
Baidu 20181018
Bkav 20181018
ClamAV 20181018
CMC 20181018
eGambit 20181018
Jiangmin 20181018
Kingsoft 20181018
SUPERAntiSpyware 20181015
Symantec Mobile Insight 20181001
TACHYON 20181018
TheHacker 20181018
TotalDefense 20181018
Trustlook 20181018
ViRobot 20181018
Zoner 20181017
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT NSIS, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-01-30 03:57:31
Entry Point 0x000031D6
Number of sections 5
PE sections
Overlays
MD5 e90593e90c04c2d516bee27d181fbeb7
File type data
Offset 34816
Size 240218
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
RemoveDirectoryA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
ExpandEnvironmentStringsA
GetCommandLineA
GetProcAddress
GetFullPathNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcmpiA
SetFilePointer
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
MoveFileExA
GlobalLock
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
MoveFileA
CreateProcessA
lstrcpyA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
EmptyClipboard
GetMessagePos
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
ReleaseDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
SendMessageA
DialogBoxParamA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
SetWindowTextA
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
CreateWindowExA
LoadCursorA
TrackPopupMenu
DrawTextA
DestroyWindow
FillRect
RegisterClassA
CharNextA
CallWindowProcA
GetSystemMenu
EndPaint
CloseClipboard
OpenClipboard
ExitWindowsEx
SetCursor
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 3
RT_ICON 1
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 6
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:01:30 04:57:31+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x31d6

InitializedDataSize
118784

SubsystemVersion
4.0

ImageVersion
6.0

OSVersion
4.0

UninitializedDataSize
1024

File identification
MD5 aaadca8f9b4c9d0340152ec3ace2c3de
SHA1 49e99e50f27ff718ad0af74f0f5ce163d763b677
SHA256 686fc21ea9461f1d406d042cc99e3a43360b98136dff134ee31d783de19f193d
ssdeep
6144:zDlYm4xvxDWjHTzPhn/gqrsySz8hR5KKTrmT1pLFNirM2JfoIzORkVXhUaJ:lwx5UpSIhRnT+Tsf/J

authentihash 61b3d3cd487ac1910fe5ec8fd38b673e2ea1061446e51c91d7fd3f986774d8ac
imphash 3abe302b6d9a1256e6a915429af4ffd2
File size 268.6 KB ( 275034 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2018-09-23 06:55:15 UTC ( 3 weeks, 6 days ago )
Last submission 2018-10-06 19:44:55 UTC ( 1 week, 6 days ago )
File names 686fc21ea9461f1d406d042cc99e3a43360b98136dff134ee31d783de19f193d_4.exe
4.exe
output.114272103.txt
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Runtime DLLs