× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7155dab9bd929dac2ba3084db8612209c16de99b147309bee01c04483a2abd42
File name: ca34c7b55bd8e66ff8a260cd18521950228f1322
Detection ratio: 29 / 70
Analysis date: 2018-12-24 05:45:39 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181222
Ad-Aware Trojan.GenericKD.31443154 20181224
ALYac Trojan.GenericKD.31443154 20181224
Arcabit Trojan.Generic.D1DFC8D2 20181224
Avast Win32:MalwareX-gen [Trj] 20181224
AVG Win32:MalwareX-gen [Trj] 20181224
BitDefender Trojan.GenericKD.31443154 20181224
CrowdStrike Falcon (ML) malicious_confidence_60% (D) 20181022
Cylance Unsafe 20181224
Emsisoft Trojan.GenericKD.31443154 (B) 20181224
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOBG 20181224
F-Secure Trojan.GenericKD.31443154 20181224
Fortinet W32/Kryptik.GOBG!tr 20181224
GData Trojan.GenericKD.31443154 20181224
Sophos ML heuristic 20181128
Jiangmin Trojan.Chapak.ako 20181224
Kaspersky Trojan-Spy.Win32.Ursnif.afyg 20181224
Malwarebytes Trojan.MalPack 20181224
MAX malware (ai score=83) 20181224
McAfee Packed-FPJ!E6D51F22B0E5 20181224
McAfee-GW-Edition BehavesLike.Win32.Dropper.ch 20181223
eScan Trojan.GenericKD.31443154 20181224
Qihoo-360 HEUR/QVM10.1.128B.Malware.Gen 20181224
Rising Malware.Obscure/Heur!1.A89E (CLASSIC) 20181224
Symantec ML.Attribute.HighConfidence 20181224
Trapmine malicious.high.ml.score 20181205
VBA32 BScope.Trojan.Fuery 20181222
ZoneAlarm by Check Point Trojan-Spy.Win32.Ursnif.afyg 20181224
AegisLab 20181224
AhnLab-V3 20181223
Alibaba 20180921
Antiy-AVL 20181223
Avast-Mobile 20181223
Avira (no cloud) 20181223
Babable 20180918
Baidu 20181207
Bkav 20181221
CAT-QuickHeal 20181223
ClamAV 20181224
CMC 20181223
Comodo 20181224
Cybereason 20180225
Cyren 20181224
DrWeb 20181224
eGambit 20181224
F-Prot 20181224
Ikarus 20181224
K7AntiVirus 20181223
K7GW 20181223
Kingsoft 20181224
Microsoft 20181224
NANO-Antivirus 20181224
Palo Alto Networks (Known Signatures) 20181224
Panda 20181223
SentinelOne (Static ML) 20181223
Sophos AV 20181224
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181215
TACHYON 20181224
Tencent 20181224
TheHacker 20181220
TotalDefense 20181223
TrendMicro 20181224
TrendMicro-HouseCall 20181224
Trustlook 20181224
ViRobot 20181223
Webroot 20181224
Yandex 20181223
Zillya 20181222
Zoner 20181224
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-25 12:28:13
Entry Point 0x00012007
Number of sections 4
PE sections
PE imports
ClearEventLogA
BackupEventLogW
ChangeServiceConfigW
CloseServiceHandle
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
FindFirstChangeNotificationA
LoadLibraryW
GlobalFree
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetEnvironmentStringsW
LoadLibraryA
RtlUnwind
FillConsoleOutputCharacterW
GetStdHandle
HeapSetInformation
GetCurrentProcess
GetStartupInfoW
DecodePointer
GetCurrentProcessId
SetHandleCount
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
ExitThread
GetProcAddress
EncodePointer
EnumTimeFormatsA
ExitProcess
FindResourceExA
RaiseException
WideCharToMultiByte
GetModuleFileNameW
TlsFree
DeleteCriticalSection
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
TerminateProcess
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
FindAtomW
IsValidCodePage
HeapCreate
FindAtomA
TlsGetValue
Sleep
GetFileType
TlsSetValue
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
SetLastError
LeaveCriticalSection
ShellExecuteA
MapWindowPoints
LoadImageA
UpdateWindow
LoadBitmapW
MapVirtualKeyW
PrivateExtractIconsA
GetParent
PeekMessageW
MapVirtualKeyExA
GetDialogBaseUnits
LoadCursorFromFileA
GetMessageExtraInfo
LookupIconIdFromDirectoryEx
LoadKeyboardLayoutA
GetMenu
DlgDirSelectExA
RealGetWindowClassW
CloseClipboard
GetRawInputDeviceInfoA
GetDesktopWindow
LoadCursorW
LoadIconW
ScrollWindow
GetUpdateRect
DefDlgProcW
PE exports
Number of PE resources by type
RT_ICON 8
RT_BITMAP 3
DA 1
WOHURACUREMAXOJOSEWUMA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
SERBIAN DEFAULT 15
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileVersionNumber
7.0.0.0

LanguageCode
Unknown (457A)

FileFlagsMask
0x004f

ImageFileCharacteristics
Executable, Large address aware, 32-bit

CharacterSet
Unknown (A56B)

InitializedDataSize
168448

EntryPoint
0x12007

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.7.3.29

TimeStamp
2018:06:25 13:28:13+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.7.3.29

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Unknown (0x40534)

LegalCopyright
Copyright (C) 2018, huboy

MachineType
Intel 386 or later, and compatibles

CodeSize
94720

FileSubtype
0

ProductVersionNumber
3.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e6d51f22b0e5e472b81a49f2e8f9547f
SHA1 ca34c7b55bd8e66ff8a260cd18521950228f1322
SHA256 7155dab9bd929dac2ba3084db8612209c16de99b147309bee01c04483a2abd42
ssdeep
3072:6DYUFncB6t71+r6ks8HcCj1wIfsQwtdb75pTA12:jkc8p1e7s6EQwLXTA1

authentihash f06cab5477f35120976ced6a563c83095eafb41e2279a65cbc16c53f09c9763d
imphash e34a01f9bb77b286d6d9126c12bff41d
File size 153.5 KB ( 157184 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (40.0%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-24 05:45:39 UTC ( 1 month, 4 weeks ago )
Last submission 2018-12-24 05:45:39 UTC ( 1 month, 4 weeks ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Runtime DLLs
HTTP requests
DNS requests
TCP connections