× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 85ddc49cb8679c249bdd24c686bd7b9a98ef6d93111de86ebd9e5ca9bf074e8a
File name: 70acfa5b2185bf9c1cfaa0389c7cb320.virobj
Detection ratio: 43 / 69
Analysis date: 2018-11-24 05:38:33 UTC ( 2 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Agent.DIYX 20181124
AegisLab Trojan.Win32.Diyx.4!c 20181124
AhnLab-V3 Trojan/Win32.Skeeyah.R244952 20181123
ALYac Trojan.Agent.DIYX 20181124
Arcabit Trojan.Agent.DIYX 20181124
Avast Win32:MalwareX-gen [Trj] 20181124
AVG Win32:MalwareX-gen [Trj] 20181124
Avira (no cloud) TR/Kryptik.ieokv 20181124
BitDefender Trojan.Agent.DIYX 20181124
CrowdStrike Falcon (ML) malicious_confidence_60% (W) 20181022
Cylance Unsafe 20181124
Cyren W32/Trojan.MOYV-2187 20181124
DrWeb Trojan.Gozi.363 20181124
eGambit PE.Heur.InvalidSig 20181124
Emsisoft Trojan.Agent.DIYX (B) 20181124
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GMXV 20181124
F-Prot W32/S-664f4d4d!Eldorado 20181124
F-Secure Trojan.Agent.DIYX 20181124
Fortinet W32/GenKryptik.CQXB!tr 20181124
GData Trojan.Agent.DIYX 20181124
Ikarus Trojan.Win32.Crypt 20181123
Sophos ML heuristic 20181108
K7AntiVirus Trojan ( 005413c41 ) 20181124
K7GW Trojan ( 005413c41 ) 20181124
Kaspersky UDS:DangerousObject.Multi.Generic 20181124
MAX malware (ai score=83) 20181124
McAfee RDN/Generic.grp 20181124
McAfee-GW-Edition RDN/Generic.grp 20181124
Microsoft Trojan:Win32/Ursnif!rfn 20181124
eScan Trojan.Agent.DIYX 20181124
NANO-Antivirus Trojan.Win32.Ursnif.fkesyg 20181124
Panda Trj/Genetic.gen 20181123
Qihoo-360 Win32/Trojan.7e6 20181124
Rising Backdoor.Vawtrak!8.11D (TFE:1:6J5Jh0AutOK) 20181124
Sophos AV Mal/EncPk-ANX 20181124
Symantec Trojan.Gen.2 20181123
Trapmine malicious.high.ml.score 20180918
TrendMicro TROJ_GEN.R002C0RKJ18 20181124
TrendMicro-HouseCall TROJ_GEN.R002C0RKJ18 20181124
VBA32 BScope.TrojanSpy.Ursnif 20181123
ViRobot Trojan.Win32.Z.Ursnif.318848.BZ 20181124
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20181124
Alibaba 20180921
Antiy-AVL 20181124
Avast-Mobile 20181123
Babable 20180918
Baidu 20181123
Bkav 20181123
CAT-QuickHeal 20181123
ClamAV 20181124
CMC 20181123
Comodo 20181124
Cybereason 20180225
Jiangmin 20181124
Kingsoft 20181124
Malwarebytes 20181123
Palo Alto Networks (Known Signatures) 20181124
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181121
Symantec Mobile Insight 20181121
TACHYON 20181124
Tencent 20181124
TheHacker 20181118
TotalDefense 20181123
Trustlook 20181124
Webroot 20181124
Yandex 20181123
Zillya 20181123
Zoner 20181124
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2016 The Apache Software Foundation.

Product Apache HTTP Server
Original name httpd.exe
Internal name httpd.exe
File version 2.4.25
Description Apache HTTP Server
Comments Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Signature verification The digital signature of the object did not verify.
Signing date 12:17 AM 2/8/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-11-18 02:41:45
Entry Point 0x00002430
Number of sections 6
PE sections
Overlays
MD5 9daee6e60c3c105e932de69d4d0ae1c4
File type data
Offset 311296
Size 7552
Entropy 7.24
PE imports
SetSecurityDescriptorOwner
CryptEnumProviderTypesW
RegQueryInfoKeyW
JetTerm2
GetCharWidthFloatA
GetModuleHandleW
DsBindWithCredW
PathRemoveExtensionA
CreateWindowStationA
ToAscii
SetClipboardViewer
midiInStart
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
4294905856

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.4.25.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Apache HTTP Server

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
290816

EntryPoint
0x2430

OriginalFileName
httpd.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2016 The Apache Software Foundation.

FileVersion
2.4.25

TimeStamp
2014:11:18 03:41:45+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
httpd.exe

ProductVersion
2.4.25

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Apache Software Foundation

CodeSize
20480

ProductName
Apache HTTP Server

ProductVersionNumber
2.4.25.0

DistributedBy
The Apache Haus

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 70acfa5b2185bf9c1cfaa0389c7cb320
SHA1 21874665c8720dbb1bb704ba99e94efe986f9e86
SHA256 85ddc49cb8679c249bdd24c686bd7b9a98ef6d93111de86ebd9e5ca9bf074e8a
ssdeep
1536:Mlhc9MLyRR5AB4yxIAGWVV9+PmW49KBEPgjC+EhqIHkC5oi7E:Mlh2MGRQB4qIWokRHkCG

authentihash 1821b4e4eec2674390764f03b4d1787496a4762fb32c7375383840e004b6c5e1
imphash 99c3bb22296edaa6606a5feb0290d47b
File size 311.4 KB ( 318848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-11-19 17:19:00 UTC ( 3 months ago )
Last submission 2018-11-24 05:38:33 UTC ( 2 months, 4 weeks ago )
File names 70acfa5b2185bf9c1cfaa0389c7cb320.virobj
.
httpd.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.