× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8638d88f0af18344797ae2a87781f803be702fa45f6a54d81ca31a35977b00a1
File name: 44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe
Detection ratio: 53 / 68
Analysis date: 2018-12-10 14:55:35 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31275858 20181210
AegisLab Trojan.Win32.Trickster.4!c 20181210
AhnLab-V3 Trojan/Win32.Trickbot.C2753198 20181210
ALYac Trojan.Trickster.Gen 20181210
Antiy-AVL Trojan[Banker]/Win32.Trickster 20181210
Arcabit Trojan.Generic.D1DD3B52 20181210
Avast Win32:Malware-gen 20181210
AVG Win32:Malware-gen 20181210
Avira (no cloud) HEUR/AGEN.1035840 20181210
BitDefender Trojan.GenericKD.31275858 20181210
CAT-QuickHeal Trojan.IGENERIC 20181210
ClamAV Win.Packer.Trickbot-6683856-3 20181210
Comodo Malware@#kjiuxwx5ukz2 20181210
Cybereason malicious.774a97 20180225
Cylance Unsafe 20181210
Cyren W32/Fqev.UURW-8309 20181210
DrWeb Trojan.DownLoader27.15557 20181210
eGambit Trojan.Generic 20181210
Emsisoft Trojan.GenericKD.31275858 (B) 20181210
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GLNT 20181210
F-Prot W32/Fqev.A 20181210
F-Secure Trojan.GenericKD.31275858 20181210
Fortinet W32/Kryptik.GLNT!tr 20181210
GData Trojan.GenericKD.31275858 20181210
Ikarus Trojan-Banker.TrickBot 20181209
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Trickster.cu 20181210
K7AntiVirus Riskware ( 0040eff71 ) 20181210
K7GW Riskware ( 0040eff71 ) 20181210
Kaspersky Trojan-Banker.Win32.Trickster.to 20181210
Malwarebytes Trojan.TrickBot 20181210
McAfee Trojan-FQEV!D3B50E25331C 20181210
McAfee-GW-Edition BehavesLike.Win32.Generic.hh 20181210
Microsoft Trojan:Win32/MereTam.A 20181210
eScan Trojan.GenericKD.31275858 20181210
NANO-Antivirus Trojan.Win32.Kryptik.fixqgt 20181210
Palo Alto Networks (Known Signatures) generic.ml 20181210
Panda Trj/GdSda.A 20181209
Qihoo-360 Win32/Trojan.c01 20181210
Rising Trojan.Kryptik!8.8 (CLOUD) 20181210
Sophos AV Troj/Trickbo-IQ 20181210
Symantec Trojan.Gen.2 20181210
TACHYON Banker/W32.Trickster.578372.B 20181210
Tencent Win32.Trojan-banker.Trickster.Wrqb 20181210
Trapmine suspicious.low.ml.score 20181205
TrendMicro TROJ_GEN.R004C0DJC18 20181210
TrendMicro-HouseCall TROJ_GEN.R004C0DJC18 20181210
VBA32 TrojanBanker.Trickster 20181210
ViRobot Trojan.Win32.Z.Agent.578372 20181210
Webroot W32.Trojan.Trickbot 20181210
Zillya Adware.Trickster.Win32.23 20181208
ZoneAlarm by Check Point Trojan-Banker.Win32.Trickster.to 20181210
Alibaba 20180921
Avast-Mobile 20181210
Babable 20180918
Baidu 20181207
Bkav 20181210
CMC 20181209
CrowdStrike Falcon (ML) 20181022
Kingsoft 20181210
MAX 20181210
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181207
TheHacker 20181202
Trustlook 20181210
Yandex 20181207
Zoner 20181210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-10-10 09:21:25
Entry Point 0x000014E0
Number of sections 16
PE sections
Overlays
MD5 addaa55255caae47fc503f49166eb457
File type data
Offset 503808
Size 74564
Entropy 4.34
PE imports
GetLastError
EnterCriticalSection
ReleaseMutex
TryEnterCriticalSection
ResumeThread
SetEvent
QueryPerformanceCounter
WaitForSingleObject
GetTickCount
TlsAlloc
GetHandleInformation
LoadLibraryA
DeleteCriticalSection
GetAtomNameA
SetThreadPriority
GetCurrentProcessId
AddAtomA
GetCurrentProcess
UnhandledExceptionFilter
TlsGetValue
VirtualProtect
SetProcessAffinityMask
WaitForMultipleObjects
InterlockedCompareExchange
GetThreadContext
GetCurrentThread
SuspendThread
CreateMutexA
InterlockedExchangeAdd
CreateSemaphoreA
GetModuleHandleA
InterlockedExchange
SetUnhandledExceptionFilter
GetStartupInfoA
CloseHandle
GetSystemTimeAsFileTime
DuplicateHandle
GetThreadPriority
SetThreadContext
MoveFileA
TerminateProcess
GetProcessAffinityMask
ReleaseSemaphore
ResetEvent
InitializeCriticalSection
VirtualQuery
CreateEventA
FindAtomA
InterlockedDecrement
Sleep
TlsSetValue
GetCurrentThreadId
LeaveCriticalSection
SetLastError
InterlockedIncrement
strncmp
__lconv_init
malloc
realloc
memset
__dllonexit
_cexit
abort
fprintf
_setjmp3
printf
_fmode
_endthreadex
_amsg_exit
fputc
fwrite
_lock
_onexit
__initenv
fputs
_strdup
sprintf
memcmp
strlen
exit
__setusermatherr
_acmdln
longjmp
_unlock
free
vfprintf
__getmainargs
calloc
_write
memcpy
memmove
signal
strchr
_beginthreadex
_initterm
__set_app_type
strcmp
_ftime
_iob
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:10:10 02:21:25-07:00

FileType
Win32 EXE

PEType
PE32

CodeSize
87040

LinkerVersion
2.23

ImageFileCharacteristics
No relocs, Executable, No line numbers, 32-bit

EntryPoint
0x14e0

InitializedDataSize
417792

SubsystemVersion
4.0

ImageVersion
1.0

OSVersion
4.0

UninitializedDataSize
1536

Execution parents
File identification
MD5 d3b50e25331ca30b8ed351e4a3237f90
SHA1 74c6467774a9718a8a1a4e2fcbf42a9286464b8f
SHA256 8638d88f0af18344797ae2a87781f803be702fa45f6a54d81ca31a35977b00a1
ssdeep
12288:1CMKOT9ReTvM4/lQzPyEG0xNcvJMBT4BWiMbGu:QU9ReTvSj1TEpMbGu

authentihash d7291e4c972bc9adb853e750cf6e3e5cb1db1dffe9386e3561b2142d78f52b8f
imphash 02589aaae3d71c9e6c6828c106a46ad6
File size 564.8 KB ( 578372 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (45.0%)
Microsoft Visual C++ compiled executable (generic) (26.9%)
Win32 Dynamic Link Library (generic) (10.7%)
Win32 Executable (generic) (7.3%)
OS/2 Executable (generic) (3.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-10-10 12:52:35 UTC ( 4 months, 1 week ago )
Last submission 2018-10-10 12:52:35 UTC ( 4 months, 1 week ago )
File names 44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe
44893m9uh88g9l9_nkubyhu6vfxxbh989xo7hlttkppzf29ttdu6kwppk_11c1jl.exe
44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe
44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe
eesrl8lukzszknzo7kcxl8pg7prclqlj2txv6d1oi3kxw16xuteqjdfhmn_ahugq.exe
lb4nl8rp7n2a8euuc9rs7xvk1vqwlzdhb9lypmfhhoezfrdl3loz4o_fnw3l8cmf.exe
44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe
brca.exe
44783m8uh77g8l8_nkubyhu5vfxxbh878xo6hlttkppzf28tsdu5kwppk_11c1jl.exe
44893m9uh88g9l9_nkubyhu6vfxxbh989xo7hlttkppzf29ttdu6kwppk_11c1jl.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections