× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 879b4438f2c2bb964eea4664f546328c811b5b0c15f4cde7ce69d1d0bce946d8
File name: crypted121med.exe
Detection ratio: 22 / 52
Analysis date: 2016-02-02 10:56:26 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.3023286 20160202
AegisLab Troj.W32.Waldek!c 20160202
Arcabit Trojan.Generic.D2E21B6 20160202
Avast Win32:Malware-gen 20160202
BitDefender Trojan.GenericKD.3023286 20160202
ESET-NOD32 Win32/Dridex.AA 20160202
F-Secure Trojan.GenericKD.3023286 20160202
GData Trojan.GenericKD.3023286 20160202
Ikarus Trojan.Injector 20160202
K7GW Trojan ( 004d86461 ) 20160202
Kaspersky Trojan.Win32.Waldek.cbq 20160202
Malwarebytes Trojan.Dridex 20160202
McAfee Artemis!1F44D15A0A23 20160202
McAfee-GW-Edition BehavesLike.Win32.Ransom.fh 20160202
Microsoft Backdoor:Win32/Drixed.M 20160202
eScan Trojan.GenericKD.3023286 20160202
Panda Trj/Agent.JOI 20160201
Qihoo-360 HEUR/QVM07.1.Malware.Gen 20160202
TrendMicro TROJ_SWIZZOR.ABD 20160202
TrendMicro-HouseCall TROJ_SWIZZOR.ABD 20160202
VIPRE Trojan.Win32.Generic.pak!cobra 20160202
ViRobot Trojan.Win32.A.Waldek.315392[h] 20160202
Yandex 20160202
AhnLab-V3 20160201
Alibaba 20160202
ALYac 20160202
Antiy-AVL 20160202
AVG 20160202
Avira (no cloud) 20160201
Baidu-International 20160202
Bkav 20160201
ByteHero 20160202
CAT-QuickHeal 20160202
ClamAV 20160202
Comodo 20160202
Cyren 20160202
DrWeb 20160202
F-Prot 20160129
Fortinet 20160202
Jiangmin 20160202
K7AntiVirus 20160202
NANO-Antivirus 20160202
nProtect 20160201
Rising 20160202
Sophos AV 20160202
SUPERAntiSpyware 20160201
Symantec 20160201
Tencent 20160202
TheHacker 20160130
VBA32 20160201
Zillya 20160201
Zoner 20160202
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2006-05-25 15:57:48
Entry Point 0x00041D0E
Number of sections 4
PE sections
PE imports
SetSecurityDescriptorOwner
GetServiceKeyNameW
RegCloseKey
CopySid
RegOverridePredefKey
AdjustTokenPrivileges
ControlService
InitializeAcl
RegDeleteKeyW
RegCreateKeyA
GetAclInformation
RegQueryValueExW
LsaOpenPolicy
SetSecurityDescriptorDacl
GetSidSubAuthorityCount
RegFlushKey
ChangeServiceConfig2W
OpenProcessToken
RegQueryMultipleValuesW
RegEnumKeyW
SetFileSecurityW
SetServiceObjectSecurity
LookupAccountNameW
SetPrivateObjectSecurity
GetTokenInformation
DuplicateTokenEx
RegLoadKeyA
LsaLookupNames
CloseServiceHandle
IsValidSid
GetSidIdentifierAuthority
RegQueryInfoKeyW
ObjectCloseAuditAlarmW
GetPrivateObjectSecurity
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
BuildSecurityDescriptorW
RegSaveKeyA
RegQueryInfoKeyA
RegisterServiceCtrlHandlerA
MapGenericMask
ReadEventLogA
RevertToSelf
QueryServiceLockStatusA
AddAce
OpenSCManagerW
ReportEventW
RegQueryValueA
EqualSid
ChangeServiceConfigW
EnumDependentServicesA
SetSecurityDescriptorGroup
BuildTrusteeWithSidW
PropertySheetA
ImageList_BeginDrag
CreateToolbarEx
ImageList_Replace
ImageList_SetImageCount
FlatSB_GetScrollRange
Ord(6)
Ord(5)
ImageList_SetDragCursorImage
FlatSB_GetScrollInfo
UninitializeFlatSB
FlatSB_SetScrollRange
FlatSB_SetScrollProp
ImageList_Merge
ImageList_DrawEx
Ord(13)
FlatSB_ShowScrollBar
ImageList_GetImageCount
DrawStatusTextW
ImageList_SetOverlayImage
ImageList_Destroy
_TrackMouseEvent
ImageList_GetIconSize
FlatSB_EnableScrollBar
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
FlatSB_SetScrollPos
FlatSB_GetScrollProp
ImageList_Add
ImageList_AddMasked
ImageList_Duplicate
ImageList_LoadImageW
ImageList_LoadImageA
CreatePropertySheetPageW
FlatSB_GetScrollPos
ImageList_DragShowNolock
ImageList_Remove
CreatePropertySheetPageA
ImageList_Copy
Ord(8)
ImageList_EndDrag
SymGetSymPrev
FindExecutableImage
MapAndLoad
MapDebugInformation
SplitSymbols
SymRegisterCallback
ImageAddCertificate
SymEnumerateSymbols
SymLoadModule
ImageRemoveCertificate
BindImage
GetStartupInfoA
GetLongPathNameW
GetModuleHandleA
FindNextFileW
GetStringTypeExW
GetDateFormatW
__p__fmode
_acmdln
log
asin
_adjust_fdiv
__setusermatherr
_controlfp
_aligned_realloc
__getmainargs
_initterm
_spawnlp
__p__commode
__set_app_type
VARIANT_UserFree
midiOutGetNumDevs
midiStreamPause
SendDriverMessage
waveInPrepareHeader
Number of PE resources by type
RT_ICON 5
RT_GROUP_ICON 5
RT_MENU 3
RT_ACCELERATOR 3
E1w0u58E8 1
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
ZULU DEFAULT 13
ENGLISH US 6
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
7.0

ImageVersion
0.0

FileVersionNumber
0.58.38.13

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
151552

EntryPoint
0x41d0e

OriginalFileName
Maidservant.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2010

FileVersion
224, 112, 57, 14

TimeStamp
2006:05:25 16:57:48+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Hospitality

ProductVersion
120, 237, 17, 243

FileDescription
Narration

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Nsasoft LLC.

CodeSize
266240

FileSubtype
0

ProductVersionNumber
0.97.2.123

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 1f44d15a0a23c1cba11a864f750f4352
SHA1 8bde86d00f5b7e79bd866ea57a4fbca8b9ccb62c
SHA256 879b4438f2c2bb964eea4664f546328c811b5b0c15f4cde7ce69d1d0bce946d8
ssdeep
6144:6Olq/e7jJoQMUCQ7sjVQfJOzqN0JI/ZaOk7XivJ1NGh7/GhdaWMAkjl1kDZ8t83Y:6OwitdT7sjVL2aSbkWR18FkdaWMAkjlz

authentihash e91705bb9c8ca2f97f8147d25325b38a827fb9fbe19ad56442d30bc78dcad05d
imphash b8fc434c32d567e7447b8c4550caeb6c
File size 308.0 KB ( 315392 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-01 14:33:29 UTC ( 3 years, 1 month ago )
Last submission 2018-05-02 17:43:10 UTC ( 10 months, 3 weeks ago )
File names crypted121med.exe
crypted121med.exe.vir
yFUYIdsf.exe
yFUYIdsf.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications