× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 88bb94c3ce727db13b77abdbdb75a4c878e91d651692f3618178dec5bbb7080c
File name: standalonephase1.dat
Detection ratio: 5 / 49
Analysis date: 2014-02-25 13:46:43 UTC ( 3 years ago ) View latest
Antivirus Result Update
Yandex HackTool.CheatEngine!h2lP7QG9eRI 20140223
Antiy-AVL Trojan/Win32.Tgenic 20140225
ESET-NOD32 a variant of Win32/HackTool.CheatEngine.AF 20140225
Jiangmin TrojanDropper.Injector.bhlg 20140225
VBA32 Hoax.Blocker 20140224
AVG 20140225
Ad-Aware 20140225
AhnLab-V3 20140224
AntiVir 20140225
Avast 20140225
Baidu-International 20140225
BitDefender 20140225
Bkav 20140224
ByteHero 20140225
CAT-QuickHeal 20140225
CMC 20140220
ClamAV 20140225
Commtouch 20140225
Comodo 20140225
DrWeb 20140225
Emsisoft 20140225
F-Prot 20140225
F-Secure 20140225
Fortinet 20140225
GData 20140225
Ikarus 20140225
K7AntiVirus 20140225
K7GW 20140225
Kaspersky 20140225
Kingsoft 20140225
Malwarebytes 20140225
McAfee 20140225
McAfee-GW-Edition 20140225
eScan 20140225
Microsoft 20140225
NANO-Antivirus 20140225
Norman 20140224
Panda 20140224
Qihoo-360 20140225
Rising 20140223
SUPERAntiSpyware 20140225
Sophos 20140225
Symantec 20140225
TheHacker 20140224
TotalDefense 20140225
TrendMicro 20140225
TrendMicro-HouseCall 20140225
VIPRE 20140225
ViRobot 20140225
nProtect 20140225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-06-28 14:45:44
Entry Point 0x000015EB
Number of sections 5
PE sections
PE imports
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
SetStdHandle
SetHandleCount
LoadLibraryA
WaitForSingleObject
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
RemoveDirectoryA
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
GetConsoleOutputCP
WriteConsoleW
CreateDirectoryA
DeleteFileA
GetCPInfo
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetStringTypeA
GetConsoleCP
LeaveCriticalSection
LCMapStringW
SetFilePointer
GetTempPathA
WideCharToMultiByte
TlsFree
GetModuleHandleA
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
GetTempFileNameA
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
HeapAlloc
TerminateProcess
GetEnvironmentStrings
CreateProcessA
LCMapStringA
WriteConsoleA
IsValidCodePage
LoadResource
VirtualFree
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
FindResourceA
VirtualAlloc
HeapCreate
SetLastError
InterlockedIncrement
PathRemoveFileSpecA
PathAddBackslashA
PathStripPathA
MessageBoxA
Number of PE resources by type
RT_ICON 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 3
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2013:06:28 15:45:44+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
36352

LinkerVersion
9.0

EntryPoint
0x15eb

InitializedDataSize
17920

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
Compressed bundles
File identification
MD5 eb339eecec8aa8c0fd3b08d39799d4d8
SHA1 860efd5893e4dd4e820227b7dead144f974456ac
SHA256 88bb94c3ce727db13b77abdbdb75a4c878e91d651692f3618178dec5bbb7080c
ssdeep
768:IlSyUIeWkNgcT1+z/9ADX38J8u46Z09XPe+vpgEGfk6rAlpdej5fe6di:0Jdu+D9Ar38f46ZcPe+vpgE6AC5fe

authentihash 72c06ae24374ad856fcadf12f18f43c831fda55cac5a2218f61347f681ee3f21
imphash 8d92fa1956a6a631c642190121740197
File size 54.0 KB ( 55296 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2013-07-02 01:24:14 UTC ( 3 years, 8 months ago )
Last submission 2017-02-26 12:50:09 UTC ( 1 day, 10 hours ago )
File names standalonephase1_860EFD5893E4DD4E820227B7DEAD144F974456AC.dat
standalonephase1.dat
Şaman Hack.EXE
Pimper_PlusV4.EXE
Roblox exploit.EXE
DenialD3D.EXE
b0295fa8-48e5-f67f-90ea-d208484b75f4_1d2163af314d79a
Menu D3D.EXE
is-cla3r.tmp
is-rcjut.tmp
чит на скор брауз.EXE
GodModeV2_HandEValues_SteampunkDreamed.EXE
iUtku MiniVIP Hack.EXE
is-lsepg.tmp
file-6150685_EXE
Physical Memory.EXE
MiniVIP Hack.EXE
Agil.EXE
standalonephase1.dat
2f31d44d6a7e791e5fa74a942b7fb87e_standalonephase1.dat.safe
222.EXE
noirscheat.EXE
hack red crucible 32 bit.EXE
ы.exe
standalonephase1.dat
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!