× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 89c6d791f611ab64f1d95a0c20c3ff2693684a24015810dc2d0f99a55743a034
File name: fbiQ.exe.822572050
Detection ratio: 0 / 56
Analysis date: 2015-08-08 19:50:37 UTC ( 3 years, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20150808
AegisLab 20150808
Yandex 20150808
AhnLab-V3 20150808
Alibaba 20150803
ALYac 20150808
Antiy-AVL 20150808
Arcabit 20150808
Avast 20150808
AVG 20150808
Avira (no cloud) 20150808
AVware 20150808
Baidu-International 20150808
BitDefender 20150808
Bkav 20150807
ByteHero 20150808
CAT-QuickHeal 20150808
ClamAV 20150808
Comodo 20150808
Cyren 20150808
DrWeb 20150808
Emsisoft 20150808
ESET-NOD32 20150808
F-Prot 20150808
F-Secure 20150807
Fortinet 20150808
GData 20150808
Ikarus 20150808
Jiangmin 20150807
K7AntiVirus 20150808
K7GW 20150808
Kaspersky 20150808
Kingsoft 20150808
Malwarebytes 20150808
McAfee 20150808
McAfee-GW-Edition 20150808
Microsoft 20150808
eScan 20150808
NANO-Antivirus 20150808
nProtect 20150807
Panda 20150808
Qihoo-360 20150808
Rising 20150807
Sophos AV 20150808
SUPERAntiSpyware 20150808
Symantec 20150808
Tencent 20150808
TheHacker 20150807
TotalDefense 20150808
TrendMicro 20150808
TrendMicro-HouseCall 20150808
VBA32 20150807
VIPRE 20150808
ViRobot 20150808
Zillya 20150808
Zoner 20150808
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Publisher AVTOZVIT Scientific Production Private Company
Signature verification A certificate was explicitly revoked by its issuer.
Signers
[+] AVTOZVIT Scientific Production Private Company
Status Valid
Issuer None
Valid from 1:00 AM 7/20/2015
Valid to 12:59 AM 7/20/2016
Valid usage Code Signing
Algorithm 1.2.840.113549.1.1.11
Thumbprint FBEC5B6535B0CFCEB7E14F02CF2EF91FFFDE20A1
Serial number 00 86 F4 B4 B5 45 62 38 17 6D 8D DF 3A C6 6C 1F 7E
[+] COMODO RSA Code Signing CA
Status Valid
Issuer None
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm 1.2.840.113549.1.1.12
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO
Status Valid
Issuer None
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm 1.2.840.113549.1.1.12
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] COMODO Time Stamping Signer
Status Valid
Issuer None
Valid from 1:00 AM 5/5/2015
Valid to 12:59 AM 1/1/2016
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint DF946A5E503015777FD22F46B5624ECD27BEE376
Serial number 00 9F EA C8 11 B0 F1 62 47 A5 FC 20 D8 05 23 AC E6
[+] USERTrust
Status Valid
Issuer None
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm SHA1
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-02-02 07:59:51
Entry Point 0x00036D2E
Number of sections 3
.NET details
Module Version ID a8ae307d-3382-45ce-85df-0c7cd5d6a4ae
PE sections
Overlays
MD5 4577b9379a4fc481dc3e4be241e6d707
File type data
Offset 233984
Size 6808
Entropy 7.48
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 9
Number of PE resources by language
SAAMI ARABIC MOROCCO 1
NORWEGIAN BOKMAL 1
SYRIAC DEFAULT 1
SAAMI ARABIC OMAN 1
SPANISH PERU 1
ARABIC LIBYA 1
GERMAN SWISS 1
MONGOLIAN DEFAULT 1
CHINESE HONGKONG 1
PE resources
ExifTool file metadata
CBISRGHqcription
0FileVersion

UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileVersionNumber
0.0.0.0

riorBucklingVanityexe
(CBIS@RGHoqyright

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
16896

EntryPoint
0x36d2e

OriginalFileName
WarriorBucklingVanity.exe

MIMEType
application/octet-stream

TimeStamp
2008:02:02 08:59:51+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
.066116

SubsystemVersion
4.0

Tag6116
TInternalName

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
216576

FileSubtype
0

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
.066116

File identification
MD5 ff6d7979f3f1d681e0128bd19d268892
SHA1 ff1ac252ff1558e0712fd253eb7f9a1a6b1297ed
SHA256 89c6d791f611ab64f1d95a0c20c3ff2693684a24015810dc2d0f99a55743a034
ssdeep
6144:SbVPzc5Vc6nWWn9/yGQe7CXo5Q2S9LN4RlTSx/OxS:9V/WW9/yGQGC4A9L2TS

authentihash 71f61311f56d440069dc901a267ffa50caef1476ac260ca21026dd0210e76618
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 235.1 KB ( 240792 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Win64 Executable (generic) (49.5%)
Windows screen saver (23.4%)
Win32 Dynamic Link Library (generic) (11.7%)
Win32 Executable (generic) (8.0%)
Generic Win/DOS Executable (3.5%)
Tags
peexe assembly signed overlay

VirusTotal metadata
First submission 2015-08-08 19:50:37 UTC ( 3 years, 3 months ago )
Last submission 2015-08-11 13:15:47 UTC ( 3 years, 3 months ago )
File names crypted.120.ex_
2015-12-15_89c6d791f611ab64f1d95a0c20c3ff2693684a24015810dc2d0f99a55743a034
crypted.120.exe
VZgs1rnQG.dll
fbiQ.exe.822572050
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R047C0PHN15.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections