× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9a29fee16cf1382f9f650a8a29a34f5968079c91b59865b17cec02123af6fe70
File name: Samp (39)(3).vir.rename
Detection ratio: 54 / 68
Analysis date: 2019-02-14 14:25:53 UTC ( 3 months, 1 week ago )
Antivirus Result Update
Acronis suspicious 20190213
Ad-Aware Trojan.VBRan.Gen.2 20190214
AegisLab Trojan.Win32.Buzus.4!c 20190214
ALYac Trojan.VBRan.Gen.2 20190214
Antiy-AVL Trojan/Win32.Buzus 20190214
Arcabit Trojan.VBRan.Gen.2 20190213
Avast Win32:Injector-CMH [Trj] 20190214
AVG Win32:Injector-CMH [Trj] 20190214
Avira (no cloud) HEUR/AGEN.1009049 20190214
BitDefender Trojan.VBRan.Gen.2 20190214
CAT-QuickHeal Worm.Gamarue.WR3 20190214
Comodo Malware@#3d58viumdm5sd 20190214
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.d7a858 20190109
Cylance Unsafe 20190214
Cyren W32/Buzus.XTRB-6646 20190214
DrWeb BackDoor.Andromeda.22 20190214
eGambit Unsafe.AI_Score_99% 20190214
Emsisoft Trojan.VBRan.Gen.2 (B) 20190214
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Injector.BSRU 20190214
F-Prot W32/Buzus.VZ 20190214
F-Secure Heuristic.HEUR/AGEN.1009049 20190214
Fortinet W32/Injector.BVHB!tr 20190214
GData Trojan.VBRan.Gen.2 20190214
Ikarus Trojan-Spy.Kronos 20190214
Sophos ML heuristic 20181128
Jiangmin Trojan/Buzus.boqi 20190214
K7AntiVirus Trojan ( 0001140e1 ) 20190214
K7GW Trojan ( 004b64251 ) 20190214
Kaspersky Trojan.Win32.Buzus.xilx 20190214
Malwarebytes Spyware.Zbot.VXGen 20190214
McAfee Injector-FMZ!D02568CD7A85 20190214
McAfee-GW-Edition BehavesLike.Win32.Expiro.fc 20190214
Microsoft Ransom:Win32/Critroni 20190214
eScan Trojan.VBRan.Gen.2 20190214
NANO-Antivirus Trojan.Win32.Buzus.dmhdon 20190214
Palo Alto Networks (Known Signatures) generic.ml 20190214
Qihoo-360 HEUR/QVM03.0.Malware.Gen 20190214
Rising Malware.Undefined!8.C (TFE:3:lcPTFfhbflT) 20190214
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Troj/VBInj-KG 20190214
SUPERAntiSpyware Trojan.Agent/Gen-Falcomp 20190213
Symantec ML.Attribute.HighConfidence 20190214
TACHYON Trojan/W32.VB-Buzus.1040384 20190214
Tencent Win32.Trojan.Bp-generic.Wpav 20190214
Trapmine malicious.high.ml.score 20190123
TrendMicro TROJ_INJECT.YYYG 20190214
TrendMicro-HouseCall TROJ_INJECT.YYYG 20190214
VBA32 Trojan.Buzus 20190214
Webroot W32.Injector.Gen 20190214
Yandex Trojan.Buzus!c576MBrmvNk 20190213
Zillya Trojan.Buzus.Win32.123425 20190213
ZoneAlarm by Check Point Trojan.Win32.Buzus.xilx 20190214
AhnLab-V3 20190214
Alibaba 20180921
Avast-Mobile 20190214
Babable 20180918
Baidu 20190202
Bkav 20190214
ClamAV 20190214
CMC 20190214
Kingsoft 20190214
MAX 20190214
Panda 20190214
Symantec Mobile Insight 20190207
TheHacker 20190212
Trustlook 20190214
ViRobot 20190214
Zoner 20190214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-01-12 13:19:49
Entry Point 0x0000110C
Number of sections 3
PE sections
PE imports
CreateFileA
EVENT_SINK_QueryInterface
Ord(535)
Ord(516)
EVENT_SINK_AddRef
Ord(681)
Ord(300)
Ord(717)
__vbaExceptHandler
MethCallEngine
DllFunctionCall
Ord(578)
Ord(542)
Ord(599)
Ord(608)
Ord(556)
Ord(100)
ProcCallEngine
EVENT_SINK_Release
Ord(616)
Ord(306)
Ord(669)
Ord(644)
Ord(631)
Ord(598)
Ord(545)
Number of PE resources by type
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
CHINESE TRADITIONAL 1
NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
1285

InitializedDataSize
937984

ImageVersion
4.4

ProductName
bgynhubgyk

FileVersionNumber
4.4.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

OriginalFileName
cfrdce.exe

MIMEType
application/octet-stream

FileVersion
4.04

TimeStamp
2015:01:12 14:19:49+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
cfrdce

ProductVersion
4.04

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
njikjhbhym

CodeSize
110592

FileSubtype
0

ProductVersionNumber
4.4.0.0

Warning
Error processing PE data dictionary

EntryPoint
0x110c

ObjectFileType
Executable application

Compressed bundles
PCAP parents
File identification
MD5 d02568cd7a85822a47dba55d2051a5a5
SHA1 8f136ca38a2b563442eac3a9183f09dbbeea3b1c
SHA256 9a29fee16cf1382f9f650a8a29a34f5968079c91b59865b17cec02123af6fe70
ssdeep
24576:aXUgcR+GVPBOJFB1DX7ctgxaq0Mfy02raETz+2d0d:ag+GVPAzX1xadL02zYd

authentihash 9ec33cda25c063264fccd2b0da40b98621eae97b33dd6e738ab700d94d92eb6c
imphash 8e8dfac031113d1814ae67e487aa032d
File size 1016.0 KB ( 1040384 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (88.6%)
Win32 Executable (generic) (4.8%)
OS/2 Executable (generic) (2.1%)
Generic Win/DOS Executable (2.1%)
DOS Executable Generic (2.1%)
Tags
peexe

VirusTotal metadata
First submission 2015-01-12 16:39:55 UTC ( 4 years, 4 months ago )
Last submission 2018-10-23 20:41:31 UTC ( 7 months ago )
File names D02568CD7A85822A47DBA55D2051A5A5
d02568cd7a85822a47dba55d2051a5a5
8f136ca38a2b563442eac3a9183f09dbbeea3b1c
9a29fee16cf1382f9f650a8a29a34f5968079c91b59865b17cec02123af6fe70
D02568CD7A85822A47DBA55D2051A5A5.EXE
Samp (39)(3).vir.rename
2015-01-12-wireandwoods.ru-042.exe.txt
wireandwoods.ru-042.exe
2015-01-12-wireandwoods.ru-042.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Hooking activity
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.