× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 696ef2318f0233da224f5ee03be4268a7fda70814b2d6d4eefa46de90da22ba8
File name: output.114627733.txt
Detection ratio: 51 / 69
Analysis date: 2018-12-03 14:07:55 UTC ( 5 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Generic.Delph.PWS.E06EBA9A 20181203
AegisLab Trojan.Win32.Delf.moev 20181203
AhnLab-V3 Malware/Win32.Generic.C2622462 20181203
ALYac Generic.Delph.PWS.E06EBA9A 20181203
Antiy-AVL Trojan[Ransom]/Win32.Blocker 20181202
Arcabit Generic.Delph.PWS.E06EBA9A 20181203
Avast Win32:Malware-gen 20181203
AVG Win32:Malware-gen 20181203
Avira (no cloud) TR/AD.MoksSteal.elw 20181203
BitDefender Generic.Delph.PWS.E06EBA9A 20181203
CAT-QuickHeal Trojan.Sigmal.S3989901 20181203
ClamAV Win.Ransomware.Delf-6651871-0 20181203
CrowdStrike Falcon (ML) malicious_confidence_80% (W) 20181022
Cylance Unsafe 20181203
Cyren W32/PWS.stealer.A.gen!Eldorado 20181203
DrWeb Trojan.PWS.Stealer.24300 20181203
Emsisoft Generic.Delph.PWS.E06EBA9A (B) 20181203
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/PSW.Delf.OSF 20181203
F-Prot W32/PWS.stealer.A.gen!Eldorado 20181203
F-Secure Generic.Delph.PWS.E06EBA9A 20181203
Fortinet W32/Delf.OSF!tr 20181203
GData Generic.Delph.PWS.E06EBA9A 20181203
Ikarus Trojan-PSW.Delf 20181203
Sophos ML heuristic 20181128
Jiangmin Trojan.PSW.Coins.buh 20181203
K7AntiVirus Password-Stealer ( 0052f96e1 ) 20181203
K7GW Password-Stealer ( 0052f96e1 ) 20181203
Kaspersky Trojan-Ransom.Win32.Blocker.lckf 20181203
Malwarebytes Trojan.AzorUlt 20181203
MAX malware (ai score=83) 20181203
McAfee GenericRXGI-KI!7BAC787C33BC 20181203
McAfee-GW-Edition BehavesLike.Win32.Dropper.ch 20181203
Microsoft PWS:Win32/Stimilina.E!bit 20181203
eScan Generic.Delph.PWS.E06EBA9A 20181203
NANO-Antivirus Trojan.Win32.Stealer.fflqpr 20181203
Palo Alto Networks (Known Signatures) generic.ml 20181203
Panda Trj/Genetic.gen 20181202
Qihoo-360 HEUR/QVM05.1.9E24.Malware.Gen 20181203
Rising Ransom.Blocker!8.12A (RDM+:cmRtazo+t7oincKDKEzUba22pNBn) 20181203
Sophos AV Troj/PWS-CJJ 20181203
SUPERAntiSpyware Trojan.Agent/Gen-Crypt 20181128
Symantec Trojan.Coinstealer 20181203
Trapmine malicious.high.ml.score 20181128
TrendMicro TrojanSpy.Win32.CLIPBANKER.SMMR 20181203
TrendMicro-HouseCall TrojanSpy.Win32.CLIPBANKER.SMMR 20181203
VBA32 BScope.TrojanRansom.Blocker 20181203
Webroot W32.Trojan.Gen 20181203
Yandex Trojan.Blocker!m3aQMhOteaA 20181130
Zillya Trojan.Blocker.Win32.40079 20181130
ZoneAlarm by Check Point Trojan-Ransom.Win32.Blocker.lckf 20181203
Alibaba 20180921
Avast-Mobile 20181203
Babable 20180918
Baidu 20181203
Bkav 20181203
CMC 20181203
Comodo 20181203
Cybereason 20180225
eGambit 20181203
Kingsoft 20181203
SentinelOne (Static ML) 20181011
Symantec Mobile Insight 20181121
TACHYON 20181203
Tencent 20181203
TheHacker 20181202
TotalDefense 20181203
Trustlook 20181203
ViRobot 20181203
Zoner 20181203
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0001A1F8
Number of sections 5
PE sections
PE imports
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
FreeSid
DeleteDC
SelectObject
BitBlt
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
EnterCriticalSection
GetSystemInfo
FreeLibrary
QueryPerformanceCounter
ExitProcess
GetThreadLocale
GlobalUnlock
GetModuleFileNameA
RtlUnwind
LoadLibraryA
CopyFileW
DeleteCriticalSection
GetStartupInfoA
GetLocaleInfoA
LocalAlloc
FindClose
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateDirectoryW
GetCommandLineA
GlobalLock
RaiseException
WideCharToMultiByte
GetModuleHandleA
FindNextFileW
WriteFile
GetCurrentProcess
DeleteFileW
FindFirstFileW
GetCurrentThreadId
LocalFree
InitializeCriticalSection
VirtualFree
GetFileAttributesW
Sleep
GetTickCount
GetVersion
GetProcAddress
VirtualAlloc
GetCurrentProcessId
LeaveCriticalSection
CoCreateInstance
OleInitialize
SysReAllocStringLen
SysFreeString
SysAllocStringLen
ReleaseDC
GetSystemMetrics
CharToOemBuffA
CharNextA
MessageBoxA
GetKeyboardType
GetDC
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:19 15:22:17-07:00

FileType
Win32 EXE

PEType
PE32

CodeSize
103424

LinkerVersion
2.25

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0x1a1f8

InitializedDataSize
10752

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 7bac787c33bc939eaad3379b98dd903f
SHA1 53d186382c4af3ebdc8dd8eae0f6f5cd72ccb620
SHA256 696ef2318f0233da224f5ee03be4268a7fda70814b2d6d4eefa46de90da22ba8
ssdeep
3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/Ixg/:Zzx7ZApszolIo7lf/ipT/I

authentihash 832cc11440855eff3c7cdf89b65d94eb63a8fcd645397fd7010b5fd44316ee00
imphash 6d1f2b41411eacafcf447fc002d8cb00
File size 112.5 KB ( 115200 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (40.5%)
Win32 Dynamic Link Library (generic) (20.3%)
Win32 Executable (generic) (13.9%)
Win16/32 Executable Delphi generic (6.4%)
OS/2 Executable (generic) (6.2%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2018-12-03 13:30:52 UTC ( 5 months, 2 weeks ago )
Last submission 2018-12-21 19:24:36 UTC ( 4 months, 4 weeks ago )
File names ikee.exe
output.114627733.txt
ike.exe
7bac787c33bc939eaad3379b98dd903f
696ef2318f0233da224f5ee03be4268a7fda70814b2d6d4eefa46de90da22ba8.bin
output.114636074.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
DNS requests