× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a85888c0f2bacd3043acea00d3631c1163cfaa764d551e16fd8dc8ff42f454c6
File name: CT_Special_Forces.exe
Detection ratio: 3 / 67
Analysis date: 2018-11-07 22:37:25 UTC ( 3 months, 1 week ago )
Antivirus Result Update
ClamAV Win.Trojan.Agent-39153 20181107
TheHacker Posible_Worm32 20181107
Zoner Probably RARAutorun 20181107
Ad-Aware 20181107
AegisLab 20181107
AhnLab-V3 20181107
Alibaba 20180921
ALYac 20181107
Antiy-AVL 20181107
Arcabit 20181107
Avast 20181107
Avast-Mobile 20181107
AVG 20181107
Avira (no cloud) 20181107
Babable 20180918
Baidu 20181107
BitDefender 20181107
Bkav 20181107
CAT-QuickHeal 20181105
CMC 20181107
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181107
Cyren 20181107
DrWeb 20181107
eGambit 20181107
Emsisoft 20181107
Endgame 20180730
ESET-NOD32 20181107
F-Prot 20181107
F-Secure 20181107
Fortinet 20181107
GData 20181107
Ikarus 20181107
Sophos ML 20180717
Jiangmin 20181107
K7AntiVirus 20181107
K7GW 20181107
Kaspersky 20181107
Kingsoft 20181107
Malwarebytes 20181107
MAX 20181107
McAfee 20181107
McAfee-GW-Edition 20181107
Microsoft 20181107
eScan 20181107
NANO-Antivirus 20181107
Palo Alto Networks (Known Signatures) 20181107
Panda 20181107
Qihoo-360 20181107
Rising 20181107
SentinelOne (Static ML) 20181011
Sophos AV 20181107
SUPERAntiSpyware 20181107
Symantec 20181107
Symantec Mobile Insight 20181105
TACHYON 20181107
Tencent 20181107
TrendMicro 20181107
TrendMicro-HouseCall 20181107
Trustlook 20181107
VBA32 20181106
VIPRE 20181107
ViRobot 20181107
Webroot 20181107
Yandex 20181107
Zillya 20181107
ZoneAlarm by Check Point 20181107
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT RAR, UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-01-22 13:36:06
Entry Point 0x00020AC0
Number of sections 3
PE sections
Overlays
MD5 625fc619a9eb556ba605ebc4aa4b4f09
File type application/x-rar
Offset 52736
Size 39983
Entropy 7.99
PE imports
RegCloseKey
GetOpenFileNameA
DeleteObject
LoadLibraryA
ExitProcess
GetProcAddress
OleInitialize
SHGetMalloc
SetMenu
Number of PE resources by type
RT_DIALOG 6
RT_STRING 4
RT_ICON 4
RT_RCDATA 1
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 17
NEUTRAL 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2004:01:22 14:36:06+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
5.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x20ac0

InitializedDataSize
8192

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
86016

File identification
MD5 17ec7354dadd3e09133e0ecd3721f0a8
SHA1 97ce47b39d228b7a81e2ceb944580dacd996e15c
SHA256 a85888c0f2bacd3043acea00d3631c1163cfaa764d551e16fd8dc8ff42f454c6
ssdeep
1536:3SUqVeh+CnQR2Rrs2kc937OOU9eu2YAiYfk103cMmVY6wS0:i7gYRRwOeubis0iG6v0

authentihash f0fea906c8127b5fdc679dc4061a0460e5f7aba1c7f314e3d66af6c0137d9ccc
imphash b602426ec706e7b23572160bb5b68285
File size 90.5 KB ( 92719 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID WinRAR Self Extracting archive (87.9%)
UPX compressed Win32 Executable (4.5%)
Win32 EXE Yoda's Crypter (4.5%)
Win32 Dynamic Link Library (generic) (1.1%)
Win32 Executable (generic) (0.7%)
Tags
peexe upx overlay

VirusTotal metadata
First submission 2016-09-13 20:31:13 UTC ( 2 years, 5 months ago )
Last submission 2018-11-07 22:37:25 UTC ( 3 months, 1 week ago )
File names CT_Special_Forces.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs