× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: abcb1fe46082db37edd34527f00be99cc1a3dda008c8f7810c5a1c8e4c3b59ff
File name: fattura 3918399.exe
Detection ratio: 55 / 68
Analysis date: 2018-07-26 00:07:45 UTC ( 5 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware Trojan.Ransom.Spora.Gen.1 20180726
AegisLab Uds.Dangerousobject.Multi!c 20180725
AhnLab-V3 Trojan/Win32.Cerber.R194758 20180725
ALYac Trojan.Ransom.Spora.Gen.1 20180725
Antiy-AVL Trojan[Ransom]/Win32.Locky 20180726
Avast Win32:Malware-gen 20180725
AVG Win32:Malware-gen 20180725
Avira (no cloud) TR/Crypt.XPACK.Gen8 20180725
AVware Trojan.Win32.Generic!BT 20180725
Baidu Win32.Trojan.Kryptik.bjl 20180725
BitDefender Trojan.Ransom.Spora.Gen.1 20180725
Bkav W32.eHeur.Malware08 20180725
CAT-QuickHeal Ransom.Exxroute.A3 20180725
Comodo UnclassifiedMalware 20180726
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.4b4eb1 20180225
Cylance Unsafe 20180726
Cyren W32/Trojan.WUUQ-4541 20180725
DrWeb Trojan.Encoder.10250 20180725
Emsisoft Trojan.Ransom.Spora.Gen.1 (B) 20180725
Endgame malicious (high confidence) 20180711
ESET-NOD32 Win32/Filecoder.Cerber.F 20180725
F-Secure Trojan.Ransom.Spora.Gen.1 20180725
Fortinet W32/Kryptik.FONH!tr 20180726
GData Trojan.Ransom.Spora.Gen.1 20180725
Ikarus Trojan.Win32.Filecoder 20180725
Sophos ML heuristic 20180717
Jiangmin Trojan.Zerber.aot 20180726
K7AntiVirus Trojan ( 005190011 ) 20180725
K7GW Trojan ( 005190011 ) 20180726
Kaspersky HEUR:Trojan.Win32.Generic 20180725
Malwarebytes Ransom.Cerber 20180725
MAX malware (ai score=100) 20180726
McAfee Ransomware-FMFE!311B7684B4EB 20180725
McAfee-GW-Edition BehavesLike.Win32.Ransomware.dc 20180726
eScan Trojan.Ransom.Spora.Gen.1 20180725
NANO-Antivirus Trojan.Win32.Zerber.eljdro 20180725
Palo Alto Networks (Known Signatures) generic.ml 20180726
Panda Trj/CerberCrypto.A 20180725
Qihoo-360 Win32/Trojan.2ff 20180726
Rising Trojan.Kryptik!1.A8CF (CLOUD) 20180725
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Troj/Cerber-AFJ 20180725
Symantec Trojan.Gen.2 20180725
Tencent Win32.Trojan.Raas.Auto 20180726
TheHacker Trojan/Filecoder.Cerber.f 20180725
TrendMicro Ransom_CERBER.VSAFL 20180725
TrendMicro-HouseCall Ransom_CERBER.VSAFL 20180725
VBA32 Hoax.Zerber 20180725
VIPRE Trojan.Win32.Generic!BT 20180725
Webroot W32.Trojan.Gen 20180726
Yandex Trojan.Zerber! 20180725
Zillya Trojan.Zerber.Win32.929 20180725
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180725
Zoner Trojan.Razy 20180725
Alibaba 20180713
Arcabit 20180725
Avast-Mobile 20180725
Babable 20180725
ClamAV 20180725
CMC 20180725
eGambit 20180726
F-Prot 20180725
Kingsoft 20180726
Microsoft 20180725
SUPERAntiSpyware 20180725
TACHYON 20180725
TotalDefense 20180722
Trustlook 20180726
ViRobot 20180725
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-09-02 10:01:36
Entry Point 0x000032B7
Number of sections 4
PE sections
Overlays
MD5 1237a48b6af288454523d727b003d40f
File type data
Offset 258048
Size 768
Entropy 7.04
PE imports
CoRegCleanup
DowngradeAPL
CDBuildVect
MD5Init
MD5Update
GetLastError
SetCurrentDirectoryW
CreateJobObjectA
ReleaseMutex
WaitForSingleObject
ReplaceFileA
HeapAlloc
GetLocalTime
UpdateResourceA
GetDateFormatA
CreateDirectoryA
OpenFileMappingA
OpenWaitableTimerW
GetProcAddress
GetPrivateProfileIntW
GetProcessHeap
SetVolumeLabelW
CreateMutexA
GetGeoInfoA
InitializeCriticalSection
CreateThread
SetEnvironmentVariableW
MoveFileExW
SetFilePointer
OpenMutexW
FindAtomW
GetFullPathNameA
lstrcmpi
GetLogicalDriveStringsA
GetNumberFormatA
ReadConsoleW
CreateFileA
GetTickCount
GetModuleHandleA
ClusWorkerStart
ResUtilDupString
StrStrA
ShellMessageBoxW
StrChrW
SHEmptyRecycleBinW
SHFileOperationW
DragQueryFileA
DragQueryPoint
FindExecutableW
SHGetDataFromIDListA
ExtractIconW
SHGetMalloc
ShellExecuteA
Number of PE resources by type
COPY 2
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2013:09:02 11:01:36+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
5.12

EntryPoint
0x32b7

InitializedDataSize
237568

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 311b7684b4eb185ba9962947c8223769
SHA1 482dd7c4105919fe6cace3874a345b9d24f505ee
SHA256 abcb1fe46082db37edd34527f00be99cc1a3dda008c8f7810c5a1c8e4c3b59ff
ssdeep
6144:0Bgd/RLCJgSyGQ9ikA7W+6LTb+ZUgEMot7e+orBru/423t:bGgNik6W+62cebE

authentihash 6e3a4361cc18fb8249b553ac22aea89952bda62a47c6bccef2adc0e05289ad07
imphash 2799fc44b63c972187493db1f4b97c73
File size 252.8 KB ( 258816 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe suspicious-udp overlay

VirusTotal metadata
First submission 2017-02-06 10:59:32 UTC ( 1 year, 11 months ago )
Last submission 2017-05-18 17:53:10 UTC ( 1 year, 8 months ago )
File names fattura 3918399.exe
fattura 3918399.exe-2017-02-06.20-00-02.txt
Win32.Ransom.Spora@abcb1fe46082db37edd34527f00be99cc1a3dda008c8f7810c5a1c8e4c3b59ff.bin
c17d9d11020d29bb4be50235d90b283ed38aa283
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
UDP communications