× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 883b274e5f79f47e5d75afa940eb0c99d4a77526137cbc9a0af1581875e99b0d
File name: 883b274e5f79f47e5d75afa940eb0c99d4a77526137cbc9a0af1581875e99b0d.vir
Detection ratio: 40 / 55
Analysis date: 2016-01-12 16:22:18 UTC ( 3 weeks, 5 days ago )
Antivirus Result Update
AVG Generic28.ANAN 20160112
AVware Trojan.Win32.Generic!SB.0 20160111
Ad-Aware Trojan.Downloader.JPIS 20160112
Agnitum Trojan.DL.Agent!TeJ1xFhuAcA 20160111
AhnLab-V3 Dropper/Dalbot.2192363 20160112
Antiy-AVL Trojan[:HEUR]/Win32.Unknown 20160112
Arcabit Trojan.Downloader.JPIS 20160112
Avast Win32:Malware-gen 20160112
Avira TR/Downloader.Gen 20160112
Baidu-International Trojan.Win32.Agent.RFT 20160112
BitDefender Trojan.Downloader.JPIS 20160112
CAT-QuickHeal TrojanTrojan.Agent.gyok 20160112
ClamAV Trojan.Leepload 20160112
Comodo UnclassifiedMalware 20160112
Cyren W32/Trojan.USUV-7153 20160112
DrWeb Trojan.DownLoader6.34186 20160112
ESET-NOD32 Win32/TrojanDownloader.Agent.RFT 20160112
Emsisoft Trojan.Downloader.JPIS (B) 20160112
F-Secure Trojan.Downloader.JPIS 20160112
Fortinet W32/Agent.RFT!tr.dldr 20160111
GData Trojan.Downloader.JPIS 20160112
Ikarus Trojan-Dropper.Agent 20160112
Jiangmin TrojanDownloader.Agent.dsrl 20160112
K7AntiVirus Trojan-Downloader ( 003b04ba1 ) 20160112
K7GW Trojan-Downloader ( 003b04ba1 ) 20160112
Kaspersky HEUR:Trojan.Win32.Generic 20160112
McAfee Artemis!C6B95B178188 20160112
McAfee-GW-Edition Generic Trojan 20160112
MicroWorld-eScan Trojan.Downloader.JPIS 20160112
Microsoft TrojanDownloader:Win32/Dalbot.A 20160112
NANO-Antivirus Trojan.Win32.DloadrDOI.sxvve 20160112
Qihoo-360 Win32/Trojan.Downloader.437 20160112
Rising PE:Malware.Generic/QRS!1.9E2D [F] 20160112
Sophos Mal/Generic-L 20160112
TrendMicro TROJ_DALBOT.SMRR 20160112
TrendMicro-HouseCall TROJ_DALBOT.SMRR 20160112
VBA32 TrojanDownloader.Agent 20160112
VIPRE Trojan.Win32.Generic!SB.0 20160112
Zillya Downloader.Agent.Win32.137848 20160112
nProtect Trojan/W32.Cnasp.2192363 20160112
ALYac 20160112
AegisLab 20160112
Alibaba 20160112
Bkav 20160112
ByteHero 20160112
CMC 20160111
F-Prot 20160111
Malwarebytes 20160112
Panda 20160112
SUPERAntiSpyware 20160112
Symantec 20160112
TheHacker 20160107
TotalDefense 20160112
ViRobot 20160112
Zoner 20160112
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
Command RAR
F-PROT appended, RAR
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-05-28 16:04:29
Link date 5:04 PM 5/28/2011
Entry Point 0x0000B480
Number of sections 5
PE sections
Overlays
MD5 65db9dd15d9fbfa4b006c853c41ad7fb
File type application/x-rar
Offset 387072
Size 1805291
Entropy 8.00
PE imports
RegCreateKeyExW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityA
RegQueryValueExW
Ord(17)
InitCommonControlsEx
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
GetDeviceCaps
DeleteDC
SelectObject
StretchBlt
GetObjectW
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
SetFilePointer
GetSystemTime
GetLastError
HeapFree
GetStdHandle
SystemTimeToFileTime
ReadFile
FileTimeToSystemTime
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
FindNextFileA
CompareStringW
HeapAlloc
SetFileTime
IsDBCSLeadByte
GetCommandLineW
GetFileAttributesW
GetCurrentProcess
FileTimeToLocalFileTime
MoveFileW
OpenFileMappingW
SetFileAttributesA
GetDateFormatW
CreateDirectoryA
DeleteFileA
GetCPInfo
ExitProcess
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
GetTimeFormatW
WriteFile
SetFileAttributesW
DosDateTimeToFileTime
CloseHandle
WideCharToMultiByte
MapViewOfFile
MoveFileExW
ExpandEnvironmentStringsW
FindNextFileW
SetEndOfFile
GetFileAttributesA
GetTempPathW
FindFirstFileA
FindFirstFileW
HeapReAlloc
GetModuleHandleW
GetFullPathNameA
GetCurrentDirectoryW
LoadLibraryW
SetCurrentDirectoryW
UnmapViewOfFile
FindResourceW
CreateFileW
GlobalAlloc
LocalFileTimeToFileTime
FindClose
Sleep
GetFileType
GetFullPathNameW
CreateFileA
GetTickCount
GetLocaleInfoW
GetNumberFormatW
SetLastError
CompareStringA
VariantInit
SHBrowseForFolderW
SHChangeNotify
SHFileOperationW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFileInfoW
SHGetMalloc
SHAutoComplete
SetFocus
MapWindowPoints
GetParent
UpdateWindow
EndDialog
LoadBitmapW
DefWindowProcW
CopyRect
GetWindowTextW
GetMessageW
ShowWindow
GetSystemMetrics
SetWindowPos
wvsprintfW
CharToOemBuffA
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
RegisterClassExW
CharUpperW
DialogBoxParamW
CharToOemBuffW
wvsprintfA
SendDlgItemMessageW
GetDlgItemTextW
PostMessageW
GetSysColor
SetDlgItemTextW
GetDC
ReleaseDC
DestroyIcon
TranslateMessage
IsWindowVisible
LoadStringW
SetWindowTextW
GetDlgItem
GetWindow
MessageBoxW
DispatchMessageW
GetClassNameW
PeekMessageW
CharUpperA
OemToCharA
EnableWindow
GetClientRect
WaitForInputIdle
OemToCharBuffA
LoadCursorW
LoadIconW
FindWindowExW
CreateWindowExW
GetWindowLongW
SetForegroundWindow
DestroyWindow
CharToOemA
CreateStreamOnHGlobal
OleUninitialize
CoCreateInstance
OleInitialize
CLSIDFromString
Number of PE resources by type
RT_ICON 10
RT_DIALOG 6
RT_STRING 5
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
CHINESE SIMPLIFIED 13
NEUTRAL DEFAULT 11
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:05:28 17:04:29+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
72192

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
313856

SubsystemVersion
5.0

EntryPoint
0xb480

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 c6b95b178188b8c35d14bed40520e685
SHA1 5eec19a882a66aee148fe195b3a4147242e86541
SHA256 883b274e5f79f47e5d75afa940eb0c99d4a77526137cbc9a0af1581875e99b0d
ssdeep
49152:6mHzzTnKy9nn/JIGv6FAEjUhKw4cJXAAT07RwQxwnY:6mvnKSxIG6AEjIKw4cJAATSwQx5

authentihash 9952f582b2072b449ac6a15cd6390495dd9ae7b43c6a1861df51f7eb88d720cb
imphash dbb1eb5c3476069287a73206929932fd
File size 2.1 MB ( 2192363 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2012-06-07 21:49:31 UTC ( 3 years, 8 months ago )
Last submission 2016-01-12 16:22:18 UTC ( 3 weeks, 5 days ago )
File names 883b274e5f79f47e5d75afa940eb0c99d4a77526137cbc9a0af1581875e99b0d.vir
c6b95b178188b8c35d14bed4052
c6b95b178188b8c35d14bed40520e685
vti-rescan
c6b95b178188b8c35d14bed40520e685
Leveraging_Ethernet_Card_Vulnerabilities_in_Field_Devices.pdf.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs
UDP communications