× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a07aa84fdaca977bf5926b7a1210f5e009213cf67e4dcc15b5934da23b87b816
File name: oW9yXCbG
Detection ratio: 47 / 54
Analysis date: 2015-10-15 15:02:43 UTC ( 1 year, 7 months ago )
Antivirus Result Update
Ad-Aware Trojan.Dropper.Agent.VLZ 20151015
Yandex TrojanSpy.Zbot!7bcbTazWxaY 20151014
AhnLab-V3 Trojan/Win32.Graftor 20151015
Antiy-AVL Trojan[:HEUR]/Win32.Unknown 20151015
Arcabit Trojan.Dropper.Agent.VLZ 20151015
Avast Win32:GenMalicious-JYE [Trj] 20151014
AVG Generic9_c.BEDY 20151015
Avira (no cloud) BDS/ZAccess.2730191 20151015
Baidu-International Trojan.Win32.Injector.AOPB 20151015
BitDefender Trojan.Dropper.Agent.VLZ 20151015
Bkav W32.MancamiLTR.Trojan 20151015
CAT-QuickHeal TrojanSpy.SpyEyes.r3 20151015
CMC Trojan-Spy.Win32.Zbot!O 20151014
Comodo TrojWare.Win32.Kryptik.BNDD 20151015
Cyren W32/Trojan.XHIO-2249 20151015
DrWeb BackDoor.Bulknet.1150 20151015
Emsisoft Trojan.Dropper.Agent.VLZ (B) 20151015
ESET-NOD32 Win32/Injector.AOPB 20151015
F-Prot W32/Trojan2.OBDD 20151015
F-Secure Trojan.Dropper.Agent.VLZ 20151015
Fortinet W32/Kryptik.ADF!tr 20151015
GData Trojan.Dropper.Agent.VLZ 20151015
Ikarus Trojan-Spy.Win32.Zbot 20151015
Jiangmin TrojanSpy.Zbot.fneg 20151014
K7AntiVirus Trojan ( 0048c83f1 ) 20151015
K7GW Trojan ( 0048c83f1 ) 20151015
Kaspersky HEUR:Trojan.Win32.Generic 20151015
Kingsoft Win32.Troj.Generic.a.(kcloud) 20151015
Malwarebytes Trojan.ModUPX 20151015
McAfee Generic-FANR!F3B1A6D64C7D 20151015
McAfee-GW-Edition Generic-FANR!F3B1A6D64C7D 20151015
Microsoft PWS:Win32/Zbot 20151015
eScan Trojan.Dropper.Agent.VLZ 20151015
NANO-Antivirus Trojan.Win32.ZAccess.ddwllc 20151015
nProtect Trojan-Spy/W32.Spyeye.199290 20151015
Panda Trj/Genetic.gen 20151015
Qihoo-360 HEUR/Malware.QVM18.Gen 20151015
Rising PE:Trojan.Crypto!1.9C6D[F1] 20151014
Sophos Troj/Agent-ADBJ 20151015
SUPERAntiSpyware Trojan.Agent/Gen-Injector 20151015
Symantec Infostealer 20151014
Tencent Win32.Trojan-spy.Spyeyes.Ednd 20151015
TheHacker Trojan/Injector.aopb 20151012
TrendMicro TROJ_SPNR.14KL13 20151015
TrendMicro-HouseCall TROJ_SPNR.14KL13 20151015
VBA32 TrojanSpy.Zbot 20151014
Zillya Trojan.SpyEyes.Win32.10748 20151014
AegisLab 20151015
Alibaba 20151015
ByteHero 20151015
ClamAV 20151015
TotalDefense 20151015
ViRobot 20151015
Zoner 20151015
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD UPX 2.93 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-10-15 08:40:00
Entry Point 0x0001D2B0
Number of sections 3
PE sections
Overlays
MD5 91725526d355c9d5b13322d9b41f68e6
File type data
Offset 51712
Size 147578
Entropy 8.00
PE imports
CreateBitmap
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
LoadIconA
Number of PE resources by type
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2013:10:15 09:40:00+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
49152

LinkerVersion
2.5

Warning
Possibly corrupt Version resource

EntryPoint
0x1d2b0

InitializedDataSize
4096

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
69632

File identification
MD5 f3b1a6d64c7d72818a7db40cc5ca399a
SHA1 fd5033c97bc279eb53d0cb7d156eaa8b26721f75
SHA256 a07aa84fdaca977bf5926b7a1210f5e009213cf67e4dcc15b5934da23b87b816
ssdeep
6144:V5gxAfoSXDMogkbkTBEVHaQA32nGy+OsHkqvz82g1R:VbfoSXDBJY+xAmGusEq78HT

authentihash aa0d9f02409968f022a12c78850dd60f42d8d074a6e2091eb42cb1a563969a8e
imphash 47b0dbd5815986614acc7ec8cf457779
File size 194.6 KB ( 199290 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 EXE Yoda's Crypter (63.7%)
Win32 Dynamic Link Library (generic) (15.7%)
Win32 Executable (generic) (10.8%)
Generic Win/DOS Executable (4.8%)
DOS Executable Generic (4.7%)
Tags
peexe upx overlay

VirusTotal metadata
First submission 2013-10-16 02:56:07 UTC ( 3 years, 7 months ago )
Last submission 2013-10-16 02:56:07 UTC ( 3 years, 7 months ago )
File names oW9yXCbG
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Terminated processes
Opened mutexes
Runtime DLLs