× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 889589844d0f6a79dfff7de99e165d7ba796b26c9fd4c8e059db36d509d6b549
File name: 007103129
Detection ratio: 51 / 57
Analysis date: 2015-06-12 11:37:53 UTC ( 3 weeks, 2 days ago )
Antivirus Result Update
ALYac Trojan.Dropper.VZB 20150612
AVG Generic35.YBF 20150612
AVware Trojan.Win32.Generic!BT 20150612
Ad-Aware Trojan.Dropper.VZB 20150612
Agnitum Backdoor.Androm!hqmSfws/5Ak 20150611
AhnLab-V3 Trojan/Win32.Fareit 20150612
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20150612
Arcabit Trojan.Dropper.VZB 20150612
Avast Win32:Trustezeb-K [Cryp] 20150612
Avira TR/Injector.dfffg 20150612
Baidu-International Trojan.Win32.PowerLoader.A 20150612
BitDefender Trojan.Dropper.VZB 20150612
Bkav HW32.Packed.8FB7 20150612
CAT-QuickHeal TrojanPWS.Zbot.Gen 20150612
Comodo Backdoor.Win32.Androm.CUJ 20150612
Cyren W32/Trojan.VJAB-7744 20150612
DrWeb Trojan.Inject1.27909 20150612
ESET-NOD32 Win32/PowerLoader.A 20150612
Emsisoft Trojan.Dropper.VZB (B) 20150612
F-Prot W32/Trojan4.AFFG 20150612
F-Secure Trojan.Dropper.VZB 20150612
Fortinet W32/Androm.CUJ!tr.bdr 20150612
GData Trojan.Dropper.VZB 20150612
Ikarus Virus.Win32.CeeInject 20150612
Jiangmin Backdoor/Androm.dif 20150610
K7AntiVirus Trojan ( 0048e6f31 ) 20150612
K7GW Trojan ( 0048e6f31 ) 20150612
Kaspersky Backdoor.Win32.Androm.cuj 20150612
Malwarebytes Trojan.Ransom.IS 20150612
McAfee Generic.rn 20150612
McAfee-GW-Edition Generic.rn 20150612
MicroWorld-eScan Trojan.Dropper.VZB 20150612
Microsoft VirTool:Win32/CeeInject.gen!KK 20150612
NANO-Antivirus Trojan.Win32.Tepfer.clkpxx 20150612
Panda Trj/Agent.IVN 20150612
Qihoo-360 Win32/Backdoor.627 20150612
Rising PE:Trojan.Win32.Generic.161F658E!371156366 20150612
SUPERAntiSpyware Trojan.Agent/Gen-Graftor 20150612
Sophos Troj/Zbot-GVC 20150612
Symantec Trojan.Hesperbot!gen2 20150612
Tencent Backdoor.Win32.Androm.cuj 20150612
TheHacker Trojan/PowerLoader.a 20150611
TotalDefense Win32/CInject.WQ 20150612
TrendMicro TROJ_INJECTO.BWM 20150612
TrendMicro-HouseCall TROJ_INJECTO.BWM 20150612
VBA32 Backdoor.Androm 20150612
VIPRE Trojan.Win32.Generic!BT 20150612
ViRobot Trojan.Win32.S.Fareit.126265[h] 20150612
Zillya Backdoor.Androm.Win32.4427 20150611
Zoner Trojan.PowerLoader.A 20150612
nProtect Trojan.Dropper.VZB 20150612
AegisLab 20150612
Alibaba 20150611
ByteHero 20150612
CMC 20150610
ClamAV 20150611
Kingsoft 20150612
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
Copyright ? 2013

Publisher
Product S0
Original name S0.exe
Internal name S0
File version 1, 0, 0, 1
Description S0
Packers identified
PEiD InstallShield 2000
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-11-03 11:25:04
Link date 12:25 PM 11/3/2013
Entry Point 0x00005000
Number of sections 5
PE sections
Overlays
MD5 e5eb484e89d6bb0a7531cc2023992011
File type data
Offset 38912
Size 87353
Entropy 7.99
PE imports
RegEnumKeyA
GetObjectA
SetTextColor
GetObjectW
GetCurrentProcess
GetEnvironmentVariableA
GetCPInfo
GetModuleHandleA
GetModuleFileNameW
FindFirstFileA
ClearCommBreak
GetStartupInfoA
GetProcessTimes
SetFilePointer
Ord(1775)
Ord(4080)
Ord(4710)
Ord(1830)
Ord(3597)
Ord(459)
Ord(1168)
Ord(2120)
Ord(3136)
Ord(4524)
Ord(554)
Ord(1842)
Ord(5237)
Ord(4303)
Ord(4629)
Ord(5577)
Ord(3350)
Ord(6354)
Ord(6375)
Ord(755)
Ord(3798)
Ord(2621)
Ord(6352)
Ord(3259)
Ord(1665)
Ord(2446)
Ord(5214)
Ord(4595)
Ord(5301)
Ord(2985)
Ord(4163)
Ord(4964)
Ord(4897)
Ord(6215)
Ord(4586)
Ord(4529)
Ord(5098)
Ord(4531)
Ord(815)
Ord(2723)
Ord(366)
Ord(4940)
Ord(641)
Ord(2494)
Ord(4455)
Ord(5277)
Ord(2514)
Ord(4953)
Ord(4671)
Ord(4425)
Ord(4619)
Ord(3454)
Ord(5199)
Ord(4441)
Ord(1134)
Ord(4465)
Ord(5836)
Ord(4108)
Ord(5300)
Ord(4545)
Ord(4476)
Ord(4724)
Ord(2400)
Ord(338)
Ord(4627)
Ord(4448)
Ord(3738)
Ord(4853)
Ord(4589)
Ord(2982)
Ord(2486)
Ord(617)
Ord(3172)
Ord(5500)
Ord(4526)
Ord(4234)
Ord(4368)
Ord(825)
Ord(1206)
Ord(3081)
Ord(5307)
Ord(796)
Ord(4823)
Ord(4239)
Ord(5251)
Ord(2542)
Ord(4424)
Ord(2623)
Ord(5076)
Ord(4003)
Ord(4078)
Ord(4886)
Ord(3059)
Ord(2554)
Ord(4376)
Ord(6376)
Ord(5282)
Ord(4614)
Ord(4891)
Ord(2117)
Ord(1727)
Ord(344)
Ord(1776)
Ord(4496)
Ord(2379)
Ord(2725)
Ord(4998)
Ord(5472)
Ord(823)
Ord(4436)
Ord(4457)
Ord(3749)
Ord(1199)
Ord(4694)
Ord(2512)
Ord(470)
Ord(4427)
Ord(4274)
Ord(5261)
Ord(5817)
Ord(4696)
Ord(4079)
Ord(4467)
Ord(3058)
Ord(3147)
Ord(2124)
Ord(4615)
Ord(4242)
Ord(4077)
Ord(6336)
Ord(6175)
Ord(3262)
Ord(5653)
Ord(674)
Ord(975)
Ord(1576)
Ord(5243)
Ord(4353)
Ord(657)
Ord(3748)
Ord(5065)
Ord(5290)
Ord(4407)
Ord(4426)
Ord(6117)
Ord(4938)
Ord(6453)
Ord(3346)
Ord(1223)
Ord(2396)
Ord(4159)
Ord(3831)
Ord(520)
Ord(6374)
Ord(5280)
Ord(986)
Ord(4612)
Ord(4486)
Ord(2976)
Ord(4498)
Ord(1089)
Ord(3198)
Ord(4510)
Ord(807)
Ord(3922)
Ord(5240)
Ord(6080)
Ord(1247)
Ord(4151)
Ord(2649)
Ord(6052)
Ord(5252)
Ord(2626)
Ord(5871)
Ord(6000)
Ord(4623)
Ord(324)
Ord(5265)
Ord(4238)
Ord(2510)
Ord(3830)
Ord(5103)
Ord(2385)
Ord(4613)
Ord(4349)
Ord(2878)
Ord(4591)
Ord(3079)
Ord(652)
Ord(4387)
Ord(4723)
Ord(4420)
Ord(2055)
Ord(2627)
Ord(4837)
Ord(5241)
Ord(743)
Ord(5100)
Ord(2399)
Ord(5012)
Ord(2648)
Ord(3065)
Ord(5714)
Ord(5289)
Ord(2390)
Ord(1205)
Ord(3403)
Ord(4622)
Ord(561)
Ord(1746)
Ord(4543)
Ord(4610)
Ord(4961)
Ord(2879)
Ord(4676)
Ord(1723)
Ord(3825)
Ord(4341)
Ord(529)
Ord(4698)
Ord(5163)
Ord(6055)
Ord(6199)
Ord(296)
Ord(5061)
Ord(4858)
Ord(4432)
Ord(5740)
Ord(5302)
Ord(1825)
Ord(4690)
Ord(5731)
__p__fmode
malloc
_wfopen
fread
fclose
__dllonexit
__p__acmdln
_except_handler3
fseek
__p__commode
_onexit
ftell
exit
_XcptFilter
rewind
__setusermatherr
_controlfp
__CxxFrameHandler
_adjust_fdiv
__getmainargs
_initterm
_setmbcp
_exit
__set_app_type
GetSystemMetrics
InsertMenuW
UpdateWindow
EnableWindow
RegisterClipboardFormatA
MoveWindow
MessageBoxA
CreateDialogParamA
GetClipboardData
InvalidateRect
Number of PE resources by type
RT_STRING 14
RT_DIALOG 1
RT_ICON 1
Struct(241) 1
RT_MENU 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 19
NEUTRAL 2
CHINESE SIMPLIFIED 1
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2013:11:03 12:25:04+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
17408

LinkerVersion
5.18

EntryPoint
0x5000

InitializedDataSize
20480

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.93

UninitializedDataSize
0

File identification
MD5 e5e1ee559dcad00b6f3da78c68249120
SHA1 36a7d5a89c913809280488b7217fba9c5ea651c5
SHA256 889589844d0f6a79dfff7de99e165d7ba796b26c9fd4c8e059db36d509d6b549
ssdeep
1536:7iZwE6ZhJl3hnFm+U/WEtcKxQyTCrJd4yG8vYjY+XavJexc2IkhlzcdXGEcfQa8:wej9FHU/WE7xEVvnQc2IkzcTRa8

authentihash 73df9ba85de30a8b04924ae7ab79a6568d6f348e8bc06517d1d3d63e7e4e21a1
imphash 48c9e595e1ee51d8fc91772def7c00a5
File size 123.3 KB ( 126265 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.2%)
Win32 Executable (generic) (26.2%)
Win16/32 Executable Delphi generic (12.0%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe installshield overlay

VirusTotal metadata
First submission 2013-11-05 13:25:41 UTC ( 1 year, 8 months ago )
Last submission 2015-06-12 11:37:53 UTC ( 3 weeks, 2 days ago )
File names S0.exe
adcbfbcebcfsacfsfdsf.exe
889589844d0f6a79dfff7de99e165d7ba796b26c9fd4c8e059db36d509d6b549
S0
dfbbffbabeadfbsacfsfdsf.exe
dbcdfbfbbebsacfsfdsf.exe
사본 - WINWORD.EXE
ccbaddaabdfsacfsfdsf.exe_
007103129
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!