× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a6111862a694b7ce39687e4b470e0447b08d30fb5c253cd9b307ad2a65f6f3e1
File name: mrd.exe_
Detection ratio: 23 / 66
Analysis date: 2018-09-25 12:07:38 UTC ( 6 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Ursu.302160 20180925
Arcabit Trojan.Ursu.D49C50 20180925
Avast FileRepMalware 20180925
AVG FileRepMalware 20180925
BitDefender Gen:Variant.Ursu.302160 20180925
Cylance Unsafe 20180925
Emsisoft Gen:Variant.Ursu.302160 (B) 20180925
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Injector.EAQA 20180925
F-Secure Gen:Variant.Ursu.302160 20180925
Fortinet W32/Injector.EAPJ!tr 20180925
GData Gen:Variant.Ursu.302160 20180925
Sophos ML heuristic 20180717
Kaspersky UDS:DangerousObject.Multi.Generic 20180925
Malwarebytes Trojan.MalPack.VB 20180925
MAX malware (ai score=81) 20180925
McAfee Artemis!6318EEAF7883 20180925
McAfee-GW-Edition Artemis 20180925
eScan Gen:Variant.Ursu.302160 20180925
Palo Alto Networks (Known Signatures) generic.ml 20180925
Qihoo-360 HEUR/QVM03.0.19D7.Malware.Gen 20180925
Rising Trojan.GenKryptik!8.AA55 (TFE:dGZlOgWuUQ2kAvPRxA) 20180925
Symantec ML.Attribute.HighConfidence 20180925
AegisLab 20180925
AhnLab-V3 20180925
Alibaba 20180921
ALYac 20180925
Antiy-AVL 20180925
Avast-Mobile 20180925
Avira (no cloud) 20180925
AVware 20180925
Babable 20180918
Baidu 20180925
Bkav 20180925
CAT-QuickHeal 20180923
ClamAV 20180924
CMC 20180925
Comodo 20180925
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cyren 20180925
DrWeb 20180925
eGambit 20180925
F-Prot 20180925
Ikarus 20180925
Jiangmin 20180925
K7AntiVirus 20180925
K7GW 20180925
Kingsoft 20180925
NANO-Antivirus 20180925
Panda 20180925
SentinelOne (Static ML) 20180830
Sophos AV 20180925
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180924
TACHYON 20180925
Tencent 20180925
TheHacker 20180924
TotalDefense 20180925
TrendMicro 20180925
TrendMicro-HouseCall 20180925
Trustlook 20180925
VBA32 20180925
VIPRE 20180925
ViRobot 20180924
Webroot 20180925
Yandex 20180924
Zillya 20180924
ZoneAlarm by Check Point 20180925
Zoner 20180924
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
pC TOOLs

Product EMSIsoft GMBH
Original name Inerrantly4.exe
Internal name Inerrantly4
File version 1.07.0006
Description ThUNDerbird
Comments STArAPp
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 1:56 AM 10/4/2018
Packers identified
F-PROT ZIP
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-25 03:10:58
Entry Point 0x00001364
Number of sections 3
PE sections
Overlays
MD5 ac1f05695aa203e0a2faa7caafca9fe6
File type data
Offset 966656
Size 5512
Entropy 7.55
PE imports
_adj_fdiv_m32
__vbaChkstk
__vbaPrintObj
EVENT_SINK_Release
__vbaRedim
__vbaVarDup
Ord(516)
_adj_fdivr_m64
_adj_fprem
__vbaFreeStrList
_adj_fpatan
EVENT_SINK_AddRef
__vbaGetOwner3
__vbaStrToUnicode
__vbaVarVargNofree
_adj_fdiv_m32i
__vbaStrCopy
__vbaFreeStr
__vbaExceptHandler
__vbaSetSystemError
__vbaFreeVarList
DllFunctionCall
__vbaFPException
__vbaFileClose
_adj_fdivr_m16i
__vbaStrMove
__vbaI4Cy
_adj_fdiv_r
Ord(100)
__vbaVarTstNe
__vbaFreeVar
Ord(570)
_adj_fprem1
__vbaLateMemCallLd
__vbaObjSetAddref
_CItan
__vbaFreeObj
__vbaFileOpen
_adj_fdiv_m64
__vbaStrBool
__vbaHresultCheckObj
_CIsqrt
_CIsin
__vbaR8Str
_CIlog
Ord(606)
__vbaVarTstGt
_allmul
_CIcos
Ord(616)
EVENT_SINK_QueryInterface
_adj_fptan
Ord(593)
__vbaVarMove
__vbaFPInt
__vbaErrorOverflow
_CIatan
__vbaNew2
_adj_fdivr_m32i
__vbaAryDestruct
_CIexp
__vbaInStrVar
__vbaStrToAnsi
__vbaStrI4
_adj_fdivr_m32
__vbaStrCat
__vbaFpR8
Ord(598)
Ord(698)
_adj_fdiv_m16i
Number of PE resources by type
RT_ICON 13
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 14
ENGLISH US 1
PE resources
ExifTool file metadata
CodeSize
925696

SubsystemVersion
4.0

Comments
STArAPp

LinkerVersion
6.0

ImageVersion
1.7

FileSubtype
0

FileVersionNumber
1.7.0.6

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
ThUNDerbird

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
40960

EntryPoint
0x1364

OriginalFileName
Inerrantly4.exe

MIMEType
application/octet-stream

LegalCopyright
pC TOOLs

FileVersion
1.07.0006

TimeStamp
2018:09:25 04:10:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Inerrantly4

ProductVersion
1.07.0006

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
the MASK PRODuctions

LegalTrademarks
DROPbox, INC.

ProductName
EMSIsoft GMBH

ProductVersionNumber
1.7.0.6

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 6318eeaf788333ec5105b0dd30a7e488
SHA1 44c7638ab20c0ad29110293615ec1406d0898e71
SHA256 a6111862a694b7ce39687e4b470e0447b08d30fb5c253cd9b307ad2a65f6f3e1
ssdeep
24576:O2Os9y3iP3P+4whSewXhSBjzU8q/a/dbt/ntU8RVWAOSak:POs9y3iP3P+4whSewXhSBjzU8Aa/dbtR

authentihash 9d6feecf95559ee2c5cf6aefc242778a06fc26397643058db5e0ccbb4b71ad75
imphash 3170fcc8755e2f30061ecb24683a9840
File size 949.4 KB ( 972168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (88.6%)
Win32 Executable (generic) (4.8%)
OS/2 Executable (generic) (2.1%)
Generic Win/DOS Executable (2.1%)
DOS Executable Generic (2.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-09-25 09:08:08 UTC ( 6 months ago )
Last submission 2018-09-25 09:08:08 UTC ( 6 months ago )
File names mrd.exe_
Inerrantly4
Inerrantly4.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.