× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a7ebf5572e51fe7d5ba9969c77b3fa093b159c55b24d1b9963cf7187e9338678
File name: 005641805
Detection ratio: 50 / 57
Analysis date: 2015-06-12 10:54:19 UTC ( 3 weeks, 2 days ago )
Antivirus Result Update
ALYac Trojan.GenericKD.1013158 20150612
AVG Agent_r.BVF 20150612
AVware Trojan-Downloader.Win32.Dofoil 20150612
Ad-Aware Trojan.GenericKD.1013158 20150612
Agnitum Backdoor.Androm!bkprNnc7ELM 20150611
AhnLab-V3 Trojan/Win32.CProtection 20150612
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20150612
Arcabit Trojan.Generic.DF75A6 20150612
Avast Win32:Carberp-AQI [Cryp] 20150612
Avira TR/Spy.ZBot.HJ 20150612
Baidu-International Backdoor.Win32.Androm.sed 20150612
BitDefender Trojan.GenericKD.1013158 20150612
CAT-QuickHeal TrojanDownloader.Dofoil.rwa 20150612
Comodo TrojWare.Win32.Kryptik.BCBX 20150612
Cyren W32/Trojan.DRKD-6365 20150612
DrWeb BackDoor.Tishop.52 20150612
ESET-NOD32 Win32/TrojanDownloader.Zurgop.AW 20150612
Emsisoft Trojan.GenericKD.1013158 (B) 20150612
F-Prot W32/Trojan3.FIG 20150612
F-Secure Trojan.GenericKD.1013158 20150612
Fortinet W32/Zbot.LP 20150612
GData Trojan.GenericKD.1013158 20150612
Ikarus Trojan.Injector 20150612
Jiangmin Backdoor/Androm.oi 20150610
K7AntiVirus Trojan ( 0001140e1 ) 20150612
K7GW Trojan ( 0001140e1 ) 20150612
Kaspersky Backdoor.Win32.Androm.sed 20150612
Kingsoft Win32.Hack.Androm.s.(kcloud) 20150612
Malwarebytes Rootkit.0Access.ED 20150612
McAfee Generic.pn 20150612
McAfee-GW-Edition Generic.pn 20150612
MicroWorld-eScan Trojan.GenericKD.1013158 20150612
Microsoft TrojanDownloader:Win32/Dofoil.R 20150612
NANO-Antivirus Trojan.Win32.Androm.bstmeq 20150612
Panda Trj/Agent.IVN 20150612
Qihoo-360 HEUR/Malware.QVM20.Gen 20150612
Rising PE:Trojan.Win32.Generic.14AB5706!346773254 20150612
Sophos Mal/Zbot-LP 20150612
Symantec Trojan Horse 20150612
Tencent Trojan.Win32.YY.Gen.0 20150612
TheHacker Trojan/Downloader.Zurgop.aw 20150611
TotalDefense Win32/Dofoil.MQ 20150612
TrendMicro BKDR_ANDROM.AF 20150612
TrendMicro-HouseCall BKDR_ANDROM.AF 20150612
VBA32 BScope.Trojan.Skipe.3013 20150611
VIPRE Trojan-Downloader.Win32.Dofoil 20150612
ViRobot Trojan.Win32.Agent.62464.X[h] 20150612
Zillya Backdoor.Androm.Win32.756 20150611
Zoner Trojan.Zurgop.AW 20150612
nProtect Backdoor/W32.Androm.62464.B 20150612
AegisLab 20150612
Alibaba 20150611
Bkav 20150611
ByteHero 20150612
CMC 20150610
ClamAV 20150611
SUPERAntiSpyware 20150612
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-23 20:24:24
Link date 9:24 PM 12/23/2012
Entry Point 0x000043A9
Number of sections 10
PE sections
PE imports
CreatePatternBrush
GetTickCount
IsDBCSLeadByte
GetTempPathA
lstrcmpiA
PathIsNetworkPathW
PathIsFileSpecW
UrlCompareA
StrChrIW
StrStrW
PathIsRelativeW
PE exports
Number of PE resources by type
RT_ACCELERATOR 5
WEVT_TEMPLATE 1
Number of PE resources by language
ENGLISH US 6
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:12:23 21:24:24+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
29184

LinkerVersion
40.31

EntryPoint
0x43a9

InitializedDataSize
32256

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
13.6

UninitializedDataSize
0

File identification
MD5 4e148480749937acef8a7d9bc0b3c8b5
SHA1 f275e0e78c32992ba0ab5f25b15a887404be1848
SHA256 a7ebf5572e51fe7d5ba9969c77b3fa093b159c55b24d1b9963cf7187e9338678
ssdeep
1536:qFHZt2hESlZlV1spIM1GENghGoEzibJwErqlVYntL:QqNlZDG2M1GEbzzAJfrL

authentihash c0c5820e11198cc38a0381fe3befecbb2e92e0b1d02997ad11263eed8308e3d4
imphash 857ceb81eb0db2fc35661940b0942f45
File size 61.0 KB ( 62464 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2013-05-28 09:30:13 UTC ( 2 years, 1 month ago )
Last submission 2015-06-12 10:54:19 UTC ( 3 weeks, 2 days ago )
File names 005641805
IMG 9857648740.JPEG.exe
vt-upload-2QRTf
vti-rescan
file-5529420_
IMG.JPEG.exe
effdec4d00acd6cc3db029775badafd63dbcdfd6
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Opened mutexes
Runtime DLLs
UDP communications