× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: abd2cc8d056dd4a3717d236683719594cd31ae4a852cbc2d8944c4df99f23187
File name: android.exe.VIRUS
Detection ratio: 30 / 55
Analysis date: 2015-07-22 14:06:07 UTC ( 1 week, 6 days ago )
Antivirus Result Update
ALYac Adware.Agent.OBK 20150722
AVG BackDoor.Generic18.ABBI 20150721
AVware Trojan.Win32.Generic!BT 20150722
Ad-Aware Adware.Agent.OBK 20150722
Agnitum Riskware.Agent! 20150721
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20150722
Arcabit Adware.Agent.OBK 20150722
Avast Win32:Adware-gen [Adw] 20150722
Baidu-International PUA.MSIL.Tuguu.B 20150722
BitDefender Adware.Agent.OBK 20150722
Comodo UnclassifiedMalware 20150722
DrWeb Trojan.DownLoad3.33252 20150722
ESET-NOD32 MSIL/Tuguu.B potentially unwanted 20150722
Emsisoft Adware.Agent.OBK (B) 20150722
F-Secure Adware.Agent.OBK 20150722
Fortinet Adware/Fam.NB 20150722
GData Adware.Agent.OBK 20150722
Ikarus AdWare.Agent 20150722
K7AntiVirus Trojan ( 700000121 ) 20150722
K7GW Trojan ( 700000121 ) 20150722
Malwarebytes Backdoor.Bot 20150722
McAfee Generic BackDoor.u 20150722
McAfee-GW-Edition Generic BackDoor.u 20150722
MicroWorld-eScan Adware.Agent.OBK 20150722
NANO-Antivirus Trojan.Win32.DownLoad3.cyeyth 20150722
Panda Trj/CI.A 20150722
TrendMicro TROJ_GEN.R0C1C0PB915 20150722
VIPRE Trojan.Win32.Generic!BT 20150722
Zillya Trojan.PolyCrypt.Win32.3550 20150722
nProtect Adware.Agent.OBK 20150722
AegisLab 20150722
AhnLab-V3 20150722
Alibaba 20150722
Avira 20150722
Bkav 20150722
ByteHero 20150722
CAT-QuickHeal 20150722
ClamAV 20150721
Cyren 20150722
F-Prot 20150722
Jiangmin 20150720
Kaspersky 20150722
Kingsoft 20150722
Microsoft 20150722
Qihoo-360 20150722
Rising 20150722
SUPERAntiSpyware 20150722
Sophos 20150722
Symantec 20150722
Tencent 20150722
TheHacker 20150721
TrendMicro-HouseCall 20150722
VBA32 20150722
ViRobot 20150722
Zoner 20150722
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2014

Product android
Original name android.exe
Internal name android.exe
File version 1.0.0.0
Description android
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-02-04 16:19:25
Link date 5:19 PM 2/4/2014
Entry Point 0x00006C6E
Number of sections 3
.NET details
Module Version ID 808c2c60-d4af-4192-8bc6-9e3464c86c98
TypeLib ID e25dce10-291c-4991-bc50-9de9cf93039d
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
4608

ImageVersion
0.0

ProductName
android

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
android.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.0.0

TimeStamp
2014:02:04 17:19:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
android.exe

ProductVersion
1.0.0.0

FileDescription
android

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright 2014

MachineType
Intel 386 or later, and compatibles

CodeSize
19968

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0x6c6e

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 f19b37bddd81b527667742e73257ac05
SHA1 dcb97cc5b1977bb49df05c165c63bf54550916e9
SHA256 abd2cc8d056dd4a3717d236683719594cd31ae4a852cbc2d8944c4df99f23187
ssdeep
384:XXvNjmaLj7NrnPfWaixulQcq4Jar8u0KNtxuy4nRtOtHY9Rpmguc9uRLqSXMfYc4:XfBQtAlQNXoKHYTphn9kLqSXoYcq02

authentihash 2930dcdc78785359231f28740f9c6d9844ab528d14bdaa911cb208bbd1a568f8
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 24.5 KB ( 25088 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (72.2%)
Windows screen saver (12.9%)
Win32 Dynamic Link Library (generic) (6.4%)
Win32 Executable (generic) (4.4%)
Generic Win/DOS Executable (1.9%)
Tags
peexe assembly

VirusTotal metadata
First submission 2014-02-05 10:14:56 UTC ( 1 year, 6 months ago )
Last submission 2015-07-22 14:06:07 UTC ( 1 week, 6 days ago )
File names android (2).exe
android.exe
file-7165138_exe
ee24fd5609373f49839c73903da99787_android.exe.safe
android.exe
android.exe
android.exe
vti-rescan
android.exe
android.exe
android.virus
File_1.exe
android.exe.VIRUS
android (1).exe
android_(1).exe
Advanced heuristic and reputation engines
Sophos
Possibly Unwanted Application labelled as Generic PUA NM. This is a term used to describe applications that, while not malicious, are generally considered unsuitable for business networks. More details about Sophos PUA classifications can be found at: https://www.sophos.com/en-us/support/knowledgebase/14887.aspx .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R0C1C0PB915.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
DNS requests
UDP communications