× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: abd2cc8d056dd4a3717d236683719594cd31ae4a852cbc2d8944c4df99f23187
File name: android.exe
Detection ratio: 33 / 56
Analysis date: 2015-08-09 04:29:28 UTC ( 2 weeks, 6 days ago )
Antivirus Result Update
ALYac Adware.Agent.OBK 20150809
AVG BackDoor.Generic18.ABBI 20150809
AVware Trojan.Win32.Generic!BT 20150809
Ad-Aware Adware.Agent.OBK 20150809
Agnitum Riskware.Agent! 20150808
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20150808
Arcabit Adware.Agent.OBK 20150809
Avast Win32:Adware-gen [Adw] 20150809
Baidu-International PUA.MSIL.Tuguu.B 20150808
BitDefender Adware.Agent.OBK 20150809
Comodo UnclassifiedMalware 20150809
DrWeb Trojan.DownLoad3.33252 20150809
ESET-NOD32 MSIL/Tuguu.B potentially unwanted 20150808
Emsisoft Adware.Agent.OBK (B) 20150809
F-Secure Adware.Agent.OBK 20150807
Fortinet Adware/Fam.NB 20150809
GData Adware.Agent.OBK 20150809
Ikarus AdWare.Agent 20150809
K7AntiVirus Trojan ( 700000121 ) 20150809
K7GW Trojan ( 700000121 ) 20150808
Malwarebytes Backdoor.Bot 20150808
McAfee Generic BackDoor.u 20150809
McAfee-GW-Edition Generic BackDoor.u 20150809
MicroWorld-eScan Adware.Agent.OBK 20150809
NANO-Antivirus Trojan.Win32.DownLoad3.cyeyth 20150809
Panda Trj/CI.A 20150808
Sophos Generic PUA NM (PUA) 20150809
Symantec WS.Reputation.1 20150809
TotalDefense Win32/Tnega.AXTRdBB 20150808
TrendMicro TROJ_GEN.R0C1C0PB915 20150809
VIPRE Trojan.Win32.Generic!BT 20150809
Zillya Trojan.PolyCrypt.Win32.3550 20150808
nProtect Adware.Agent.OBK 20150807
AegisLab 20150808
AhnLab-V3 20150808
Alibaba 20150803
Avira 20150808
Bkav 20150807
ByteHero 20150809
CAT-QuickHeal 20150808
ClamAV 20150808
Cyren 20150809
F-Prot 20150809
Jiangmin 20150807
Kaspersky 20150809
Kingsoft 20150809
Microsoft 20150809
Qihoo-360 20150809
Rising 20150807
SUPERAntiSpyware 20150809
Tencent 20150812
TheHacker 20150807
TrendMicro-HouseCall 20150809
VBA32 20150807
ViRobot 20150809
Zoner 20150809
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2014

Product android
Original name android.exe
Internal name android.exe
File version 1.0.0.0
Description android
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-02-04 16:19:25
Link date 5:19 PM 2/4/2014
Entry Point 0x00006C6E
Number of sections 3
.NET details
Module Version ID 808c2c60-d4af-4192-8bc6-9e3464c86c98
TypeLib ID e25dce10-291c-4991-bc50-9de9cf93039d
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
4608

EntryPoint
0x6c6e

OriginalFileName
android.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2014

FileVersion
1.0.0.0

TimeStamp
2014:02:04 17:19:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
android.exe

ProductVersion
1.0.0.0

FileDescription
android

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
19968

ProductName
android

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 f19b37bddd81b527667742e73257ac05
SHA1 dcb97cc5b1977bb49df05c165c63bf54550916e9
SHA256 abd2cc8d056dd4a3717d236683719594cd31ae4a852cbc2d8944c4df99f23187
ssdeep
384:XXvNjmaLj7NrnPfWaixulQcq4Jar8u0KNtxuy4nRtOtHY9Rpmguc9uRLqSXMfYc4:XfBQtAlQNXoKHYTphn9kLqSXoYcq02

authentihash 2930dcdc78785359231f28740f9c6d9844ab528d14bdaa911cb208bbd1a568f8
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 24.5 KB ( 25088 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (72.2%)
Windows screen saver (12.9%)
Win32 Dynamic Link Library (generic) (6.4%)
Win32 Executable (generic) (4.4%)
Generic Win/DOS Executable (1.9%)
Tags
peexe assembly

VirusTotal metadata
First submission 2014-02-05 10:14:56 UTC ( 1 year, 6 months ago )
Last submission 2015-07-22 14:06:07 UTC ( 1 month, 1 week ago )
File names android (2).exe
android.exe
file-7165138_exe
ee24fd5609373f49839c73903da99787_android.exe.safe
android.exe
android.exe
android.exe
vti-rescan
android.exe
android.exe
android.virus
File_1.exe
android.exe.VIRUS
android (1).exe
android_(1).exe
Advanced heuristic and reputation engines
Sophos
Possibly Unwanted Application labelled as Generic PUA NM. This is a term used to describe applications that, while not malicious, are generally considered unsuitable for business networks. More details about Sophos PUA classifications can be found at: https://www.sophos.com/en-us/support/knowledgebase/14887.aspx .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R0C1C0PB915.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
DNS requests
UDP communications