× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a95a19e51b920a80cd2d152ed1ee4c49c1ec7b108e042e9f95de5f8bdb07cc92
File name: c7cb498a21a7de3ba9369f7b61b657ff3a16aed3
Detection ratio: 32 / 57
Analysis date: 2016-09-23 13:39:08 UTC ( 2 years, 4 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.95495 20160923
AhnLab-V3 Trojan/Win32.Tuhkit.N2110098932 20160922
ALYac Gen:Variant.Razy.95495 20160922
Antiy-AVL Trojan[Banker]/Win32.Tuhkit 20160923
Arcabit Trojan.Razy.D17507 20160923
AVG Downloader.Generic14.BEWR 20160923
Avira (no cloud) TR/Crypt.ZPACK.pxrdf 20160923
AVware Trojan.Win32.Generic!BT 20160923
BitDefender Gen:Variant.Razy.95495 20160923
Bkav HW32.Packed.A05F 20160923
Cyren W32/Trojan.DJOZ-4486 20160923
DrWeb Trojan.Siggen6.58358 20160923
Emsisoft Gen:Variant.Razy.95495 (B) 20160923
ESET-NOD32 Win32/TrojanDownloader.Agent.CFH 20160923
F-Secure Gen:Variant.Razy.95495 20160923
Fortinet Malware_Generic.P0 20160923
GData Gen:Variant.Razy.95495 20160923
Ikarus Trojan-Downloader.Win32.Agent 20160923
Sophos ML trojan.win32.ramnit.a 20160917
Kaspersky Trojan-Banker.Win32.Tuhkit.bi 20160923
McAfee Artemis!73F27662A00B 20160923
McAfee-GW-Edition BehavesLike.Win32.VBObfus.cc 20160922
eScan Gen:Variant.Razy.95495 20160923
Panda Trj/GdSda.A 20160923
Qihoo-360 HEUR/QVM20.1.0000.Malware.Gen 20160923
Rising Malware.Generic!6aukseCqUgU@2 (thunder) 20160923
Sophos AV Mal/Generic-S 20160923
Symantec Heur.AdvML.C 20160923
Tencent Win32.Trojan-banker.Tuhkit.Ajlq 20160923
TrendMicro TROJ_GEN.R021C0GIN16 20160923
TrendMicro-HouseCall TROJ_GEN.R021C0GIN16 20160923
VIPRE Trojan.Win32.Generic!BT 20160923
AegisLab 20160923
Alibaba 20160923
Avast 20160923
Baidu 20160923
CAT-QuickHeal 20160923
ClamAV 20160922
CMC 20160921
Comodo 20160923
CrowdStrike Falcon (ML) 20160725
F-Prot 20160923
Jiangmin 20160923
K7AntiVirus 20160923
K7GW 20160923
Kingsoft 20160923
Malwarebytes 20160923
Microsoft 20160923
NANO-Antivirus 20160923
nProtect 20160923
SUPERAntiSpyware 20160923
TheHacker 20160922
VBA32 20160922
ViRobot 20160923
Yandex 20160923
Zillya 20160922
Zoner 20160923
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Ste@lth PE 1.01 -> BGCorp
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-07-14 10:54:05
Entry Point 0x00003002
Number of sections 3
PE sections
PE imports
AuthzFreeResourceManager
AuthzFreeAuditEvent
GetStdHandle
WaitForSingleObject
GetTickCount
CreateMailslotA
RemoveDirectoryA
LoadLibraryA
GetACP
GetVolumeInformationW
DeleteFileW
GetProcAddress
CreateWaitableTimerW
GetFileTime
SetEndOfFile
ReleaseSemaphore
MapViewOfFile
GlobalAddAtomA
GetProcessVersion
GetCompressedFileSizeA
FindNextFileA
lstrcmpW
GetStringTypeW
GetGeoInfoW
CreateEventW
OpenJobObjectW
InterlockedDecrement
GetFullPathNameW
CreateFileA
GetCurrentThreadId
lstrcpyn
InterlockedIncrement
CPEncrypt
CPDecrypt
UrlCreateFromPathA
PathCompactPathA
PathAppendA
UrlIsA
UrlGetLocationW
UrlIsNoHistoryA
UrlCombineW
UrlUnescapeA
UrlCanonicalizeW
UrlHashA
Number of PE resources by type
KURS 9
RT_DIALOG 1
Number of PE resources by language
NEUTRAL 10
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:07:14 11:54:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
125440

LinkerVersion
7.0

FileTypeExtension
exe

InitializedDataSize
33280

SubsystemVersion
4.0

EntryPoint
0x3002

OSVersion
5.1

ImageVersion
5.1

UninitializedDataSize
0

File identification
MD5 73f27662a00b3310c1c839e7e321e325
SHA1 c7cb498a21a7de3ba9369f7b61b657ff3a16aed3
SHA256 a95a19e51b920a80cd2d152ed1ee4c49c1ec7b108e042e9f95de5f8bdb07cc92
ssdeep
3072:cnnnnLRcFTTXZ+CBEI6lUx8smdZzwgqd23HgHBofLfmumMSBFan/n/n/n/n/n/nv:cnnnnL+b+COlc8tZ/H3Hgh4L7DHn/n/P

authentihash f95bd7db08cbc431a6411f3cc4ce2a5447cbb4cc521bf228d6a09e3856548fa1
imphash 5cc97e7f3b1804e66a20e0df119a6a94
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.5%)
Tags
peexe stealth

VirusTotal metadata
First submission 2016-09-23 13:39:08 UTC ( 2 years, 4 months ago )
Last submission 2016-09-23 13:39:08 UTC ( 2 years, 4 months ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications