× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a0dae271317055803ad183bfdea2a56b3d817ae8c6fc3e2bf6226f73e5c1de8c
File name: file-5001033_
Detection ratio: 57 / 67
Analysis date: 2017-12-06 18:31:58 UTC ( 1 year, 1 month ago )
Antivirus Result Update
Ad-Aware Trojan.Generic.KDZ.4216 20171206
AegisLab Backdoor.W32.ZAccess.bauw!c 20171206
AhnLab-V3 Trojan/Win32.PornoAsset.R46538 20171206
ALYac Trojan.Generic.KDZ.4216 20171206
Antiy-AVL Trojan[Backdoor]/Win32.ZAccess 20171206
Arcabit Trojan.Generic.KDZ.D1078 20171206
Avast Win32:MalOb-IJ [Cryp] 20171206
AVG Win32:MalOb-IJ [Cryp] 20171206
Avira (no cloud) TR/Crypt.ZPACK.Gen7 20171206
AVware Lookslike.Win32.Sirefef.x (v) 20171206
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9687 20171206
BitDefender Trojan.Generic.KDZ.4216 20171206
ClamAV Win.Trojan.Zaccess-821 20171206
CMC Backdoor.Win32.ZAccess!O 20171206
Comodo TrojWare.Win32.UMal.~A 20171206
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cybereason malicious.1b8fb7 20171103
Cylance Unsafe 20171206
Cyren W32/Trojan.PKSZ-2686 20171206
DrWeb Trojan.Inject1.16709 20171206
Emsisoft Trojan.Generic.KDZ.4216 (B) 20171206
Endgame malicious (high confidence) 20171130
ESET-NOD32 Win32/Sirefef.EV 20171206
F-Secure Trojan.Generic.KDZ.4216 20171206
Fortinet W32/ZeroAccess.B!tr 20171206
GData Trojan.Generic.KDZ.4216 20171206
Ikarus Backdoor.Win32.PMax 20171206
Sophos ML heuristic 20170914
Jiangmin Backdoor/ZAccess.ill 20171206
K7AntiVirus Riskware ( 0040eff71 ) 20171205
K7GW Riskware ( 0040eff71 ) 20171206
Kaspersky HEUR:Trojan.Win32.Generic 20171206
Malwarebytes Spyware.Zbot.USBV 20171206
MAX malware (ai score=88) 20171206
McAfee ZeroAccess-FALQ!FE1E6410AAC2 20171206
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.cc 20171206
Microsoft TrojanDropper:Win32/Sirefef.gen!B 20171206
eScan Trojan.Generic.KDZ.4216 20171206
NANO-Antivirus Trojan.Win32.ZAccess.bergbv 20171206
nProtect Trojan/W32.Agent.148480.NQ 20171206
Palo Alto Networks (Known Signatures) generic.ml 20171206
Panda Trj/Genetic.gen 20171206
Qihoo-360 HEUR/Malware.QVM20.Gen 20171206
Rising Malware.XPACK-LNR/Heur!1.5594 (CLASSIC) 20171206
SentinelOne (Static ML) static engine - malicious 20171113
Sophos AV Mal/ZboCheMan-D 20171206
Symantec Trojan.Gen 20171206
Tencent Suspicious.Heuristic.Gen.b.0 20171206
TheHacker Trojan/Kryptik.aryv 20171205
TrendMicro TROJ_SPNR.15BD13 20171206
TrendMicro-HouseCall TROJ_SPNR.15BD13 20171206
VBA32 Backdoor.ZAccess 20171206
VIPRE Lookslike.Win32.Sirefef.x (v) 20171206
Webroot W32.Trojan.Gen 20171206
Yandex Backdoor.ZAccess!PZM91aPZ+O8 20171205
Zillya Backdoor.ZAccess.Win32.11276 20171206
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20171206
Alibaba 20171206
Avast-Mobile 20171206
Bkav 20171206
CAT-QuickHeal 20171206
eGambit 20171206
F-Prot 20171206
Kingsoft 20171206
SUPERAntiSpyware 20171206
Symantec Mobile Insight 20171206
Trustlook 20171206
ViRobot 20171206
WhiteArmor 20171204
Zoner 20171206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-06-17 11:16:13
Entry Point 0x00002A31
Number of sections 7
PE sections
PE imports
TlsAlloc
GetAsyncKeyState
PE exports
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:06:17 12:16:13+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
112640

LinkerVersion
13.6

Warning
Error processing PE data dictionary

FileTypeExtension
exe

InitializedDataSize
34816

SubsystemVersion
5.1

EntryPoint
0x2a31

OSVersion
5.1

ImageVersion
0.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 fe1e6410aac2b6af1ab92d1301f0c4ff
SHA1 0d35c49859405a0e286fe38ced286fcb109855ed
SHA256 a0dae271317055803ad183bfdea2a56b3d817ae8c6fc3e2bf6226f73e5c1de8c
ssdeep
3072:ZB3CMPB8RfwkHSS7OlW/v0PPDAeSfLQjU5Mj3Ye:ZHPB8CkHOggW6H7t

authentihash 91dfd882ab1ca113977fb0d9132c69f9e9fcbf42e2bb5652b3eb2a1b55baabbd
imphash 005a081bcd7b0ade2ebaf7cabd0d6571
File size 145.0 KB ( 148480 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
Clipper DOS Executable (11.7%)
Generic Win/DOS Executable (11.7%)
DOS Executable Generic (11.6%)
Tags
corrupt peexe

VirusTotal metadata
First submission 2013-01-11 11:09:02 UTC ( 6 years ago )
Last submission 2017-12-06 18:31:58 UTC ( 1 year, 1 month ago )
File names file-5001033_
fe1e6410aac2b6af1ab92d1301f0c4ff
fe1e6410aac2b6af1ab92d1301f0c4ff
TbIYjv.dotm
aa
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!