× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: abd2cc8d056dd4a3717d236683719594cd31ae4a852cbc2d8944c4df99f23187
File name: android.exe
Detection ratio: 36 / 55
Analysis date: 2016-06-22 15:26:53 UTC ( 1 month ago )
Antivirus Result Update
ALYac Adware.Agent.OBK 20160622
AVG BackDoor.Generic18.ABBI 20160622
AVware Trojan.Win32.Generic!BT 20160622
Ad-Aware Adware.Agent.OBK 20160622
AegisLab Adware.Agent.Obk!c 20160622
AhnLab-V3 Malware/Win32.Generic.N1091160679 20160622
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20160622
Arcabit Adware.Agent.OBK 20160622
Avast Win32:Adware-gen [Adw] 20160622
Baidu Win32.Trojan.WisdomEyes.151026.9950.9966 20160622
Baidu-International PUA.MSIL.Tuguu.B 20160614
BitDefender Adware.Agent.OBK 20160622
Comodo UnclassifiedMalware 20160622
ESET-NOD32 MSIL/Tuguu.B potentially unwanted 20160622
Emsisoft Adware.Agent.OBK (B) 20160622
F-Secure Adware.Agent.OBK 20160622
Fortinet Adware/Fam.NB 20160622
GData Adware.Agent.OBK 20160622
Ikarus AdWare.Agent 20160622
K7AntiVirus Trojan ( 700000121 ) 20160622
K7GW Trojan ( 700000121 ) 20160622
Kaspersky not-a-virus:RiskTool.MSIL.Tuguu.a 20160622
Malwarebytes Backdoor.Bot 20160622
McAfee Generic BackDoor.u 20160622
McAfee-GW-Edition BehavesLike.Win32.Backdoor.mm 20160622
eScan Adware.Agent.OBK 20160622
NANO-Antivirus Trojan.Win32.DownLoad3.cyeyth 20160622
Panda PUP/Downloadious 20160622
Sophos Generic PUA NM (PUA) 20160622
Symantec Suspicious.Cloud.9 20160622
Tencent Win32.Risk.Adw.Ecad 20160622
VIPRE Trojan.Win32.Generic!BT 20160622
ViRobot Trojan.Win32.Z.Agent.25088.BO[h] 20160622
Yandex Riskware.Agent! 20160621
Zillya Trojan.PolyCrypt.Win32.3550 20160622
nProtect Adware.Agent.OBK 20160622
Alibaba 20160622
Avira (no cloud) 20160622
Bkav 20160622
CAT-QuickHeal 20160622
CMC 20160620
ClamAV 20160622
Cyren 20160622
DrWeb 20160622
F-Prot 20160622
Jiangmin 20160622
Kingsoft 20160622
Microsoft 20160622
Qihoo-360 20160622
SUPERAntiSpyware 20160622
TheHacker 20160621
TrendMicro 20160624
TrendMicro-HouseCall 20160622
VBA32 20160621
Zoner 20160622
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2014

Product android
Original name android.exe
Internal name android.exe
File version 1.0.0.0
Description android
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-02-04 16:19:25
Entry Point 0x00006C6E
Number of sections 3
.NET details
Module Version ID 808c2c60-d4af-4192-8bc6-9e3464c86c98
TypeLib ID e25dce10-291c-4991-bc50-9de9cf93039d
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
4608

EntryPoint
0x6c6e

OriginalFileName
android.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2014

FileVersion
1.0.0.0

TimeStamp
2014:02:04 17:19:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
android.exe

ProductVersion
1.0.0.0

FileDescription
android

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
19968

ProductName
android

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 f19b37bddd81b527667742e73257ac05
SHA1 dcb97cc5b1977bb49df05c165c63bf54550916e9
SHA256 abd2cc8d056dd4a3717d236683719594cd31ae4a852cbc2d8944c4df99f23187
ssdeep
384:XXvNjmaLj7NrnPfWaixulQcq4Jar8u0KNtxuy4nRtOtHY9Rpmguc9uRLqSXMfYc4:XfBQtAlQNXoKHYTphn9kLqSXoYcq02

authentihash 2930dcdc78785359231f28740f9c6d9844ab528d14bdaa911cb208bbd1a568f8
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 24.5 KB ( 25088 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (72.2%)
Windows screen saver (12.9%)
Win32 Dynamic Link Library (generic) (6.4%)
Win32 Executable (generic) (4.4%)
Generic Win/DOS Executable (1.9%)
Tags
peexe assembly

VirusTotal metadata
First submission 2014-02-05 10:14:56 UTC ( 2 years, 5 months ago )
Last submission 2016-06-22 15:26:53 UTC ( 1 month ago )
File names android (2).exe
android.exe
file-7165138_exe
ee24fd5609373f49839c73903da99787_android.exe.safe
android.exe
android.exe
android.exe
vti-rescan
android.exe
android.exe
android.virus
File_1.exe
android.exe.VIRUS
android (1).exe
android_(1).exe
Advanced heuristic and reputation engines
Sophos
Possibly Unwanted Application labelled as Generic PUA NM. This is a term used to describe applications that, while not malicious, are generally considered unsuitable for business networks. More details about Sophos PUA classifications can be found at: https://www.sophos.com/en-us/support/knowledgebase/14887.aspx .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R0C2C0PI815.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
DNS requests
UDP communications