× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8ebdf780ba006188e03bc571a25fd5948c78518788a1084a55d64ac853597b8d
File name: jofb.exe
Detection ratio: 39 / 70
Analysis date: 2019-02-22 21:43:02 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190222
Ad-Aware Gen:Variant.Razy.467172 20190222
AegisLab Trojan.Win32.Generic.4!c 20190222
ALYac Gen:Variant.Razy.467172 20190222
Arcabit Trojan.Razy.D720E4 20190222
Avast Win32:Trojan-gen 20190222
AVG Win32:Trojan-gen 20190222
Avira (no cloud) TR/Injector.ybkvf 20190222
BitDefender Gen:Variant.Razy.467172 20190222
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181023
Cylance Unsafe 20190222
Emsisoft Gen:Variant.Razy.467172 (B) 20190222
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Injector.EDTO 20190222
F-Secure Trojan.TR/Injector.ybkvf 20190222
Fortinet W32/Injector.EDTO!tr 20190222
GData Gen:Variant.Razy.467172 20190222
Ikarus Trojan.Crypt.Malcert 20190222
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005483821 ) 20190222
K7GW Trojan ( 005483821 ) 20190222
Kaspersky Trojan-Spy.Win32.Noon.aaif 20190222
MAX malware (ai score=100) 20190222
McAfee Fareit-FNV!E1B641A9B190 20190222
McAfee-GW-Edition Fareit-FNV!E1B641A9B190 20190222
Microsoft Trojan:Win32/Tiggre!plock 20190222
eScan Gen:Variant.Razy.467172 20190222
NANO-Antivirus Trojan.Win32.Noon.fniigv 20190222
Palo Alto Networks (Known Signatures) generic.ml 20190222
Panda Trj/GdSda.A 20190222
Qihoo-360 HEUR/QVM03.0.6805.Malware.Gen 20190222
Rising Stealer.Fareit!8.170 (CLOUD) 20190222
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Generic-S 20190222
Symantec ML.Attribute.HighConfidence 20190222
Trapmine malicious.high.ml.score 20190123
VIPRE Trojan.Win32.Generic!BT 20190222
Webroot W32.Trojan.Gen 20190222
ZoneAlarm by Check Point Trojan-Spy.Win32.Noon.aaif 20190222
AhnLab-V3 20190222
Alibaba 20180921
Antiy-AVL 20190222
Avast-Mobile 20190222
Babable 20180918
Baidu 20190215
Bkav 20190222
CAT-QuickHeal 20190222
ClamAV 20190222
CMC 20190222
Comodo 20190222
Cybereason 20190109
Cyren 20190222
DrWeb 20190222
eGambit 20190222
F-Prot 20190222
Jiangmin 20190222
Kingsoft 20190222
Malwarebytes 20190222
SUPERAntiSpyware 20190220
Symantec Mobile Insight 20190220
TACHYON 20190222
Tencent 20190222
TheHacker 20190217
TrendMicro 20190222
TrendMicro-HouseCall 20190222
Trustlook 20190222
VBA32 20190222
ViRobot 20190222
Yandex 20190222
Zillya 20190222
Zoner 20190222
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product irretractile
Original name unrealness.exe
Internal name unrealness
File version 1.09.0009
Comments LIPECTOMY
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 5:23 AM 2/27/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-05-04 14:45:41
Entry Point 0x000010B0
Number of sections 3
PE sections
Overlays
MD5 1a8d898d816989ad542f5353db08cdfd
File type data
Offset 630784
Size 4960
Entropy 7.56
PE imports
EVENT_SINK_QueryInterface
Ord(667)
ProcCallEngine
Ord(646)
__vbaExceptHandler
Ord(100)
MethCallEngine
DllFunctionCall
Ord(578)
Ord(631)
Ord(606)
Ord(525)
Ord(618)
EVENT_SINK_Release
Ord(616)
EVENT_SINK_AddRef
Number of PE resources by type
RT_ICON 5
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 6
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
LIPECTOMY

InitializedDataSize
32768

ImageVersion
1.9

FileSubtype
0

FileVersionNumber
1.9.0.9

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

LinkerVersion
6.0

EntryPoint
0x10b0

OriginalFileName
unrealness.exe

MIMEType
application/octet-stream

FileVersion
1.09.0009

TimeStamp
2015:05:04 15:45:41+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
unrealness

ProductVersion
1.09.0009

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
598016

ProductName
irretractile

ProductVersionNumber
1.9.0.9

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e1b641a9b1902925974fcce6c36618e0
SHA1 5932635499a2660bae240f590aa72cc31ac65ed0
SHA256 8ebdf780ba006188e03bc571a25fd5948c78518788a1084a55d64ac853597b8d
ssdeep
6144:heZeUfDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD7:0c5LGC9Vjv93b1FOP7cDZuJs034a

authentihash 26f693d128bab79a0f9fd02116fcd3ca26862e33a4098f5e4b9146b98cc90624
imphash 5002e9b875baf28d02e9d97d5ed6b2a7
File size 620.8 KB ( 635744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (82.7%)
Win32 Dynamic Link Library (generic) (6.6%)
Win32 Executable (generic) (4.5%)
OS/2 Executable (generic) (2.0%)
Generic Win/DOS Executable (2.0%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-02-21 21:34:09 UTC ( 2 months, 4 weeks ago )
Last submission 2019-02-24 00:07:38 UTC ( 2 months, 3 weeks ago )
File names jofb
unrealness
jofb.exe
unrealness.exe
8ebdf780ba006188e03bc571a25fd5948c78518788a1084a55d64ac853597b8d.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.