× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b1009564a7225cf3164bcb86a368cdd25b220a8e6d8584286cecc3db54b98c7e
File name: t.exe
Detection ratio: 27 / 68
Analysis date: 2018-07-27 09:03:05 UTC ( 7 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Graftor.504707 20180727
Arcabit Trojan.Graftor.D7B383 20180727
Avast FileRepMalware 20180727
AVG FileRepMalware 20180727
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9956 20180726
BitDefender Gen:Variant.Graftor.504707 20180727
Cylance Unsafe 20180727
DrWeb Trojan.PWS.Panda.13495 20180727
Emsisoft Gen:Variant.Graftor.504707 (B) 20180727
Endgame malicious (high confidence) 20180711
ESET-NOD32 a variant of Win32/Kryptik.GJGU 20180727
F-Secure Gen:Variant.Graftor.504707 20180727
GData Gen:Variant.Graftor.504707 20180727
Sophos ML heuristic 20180717
Kaspersky UDS:DangerousObject.Multi.Generic 20180727
Malwarebytes Trojan.MalPack 20180727
MAX malware (ai score=84) 20180727
Microsoft Trojan:Win32/Vigorf.A 20180727
eScan Gen:Variant.Graftor.504707 20180727
Palo Alto Networks (Known Signatures) generic.ml 20180727
Qihoo-360 HEUR/QVM10.2.C7A9.Malware.Gen 20180727
Rising Trojan.Vigorf!8.EAEA (TFE:dGZlOgX7V3u1ZUNm3w) 20180727
TrendMicro Mal_HPGen-37b 20180727
TrendMicro-HouseCall Mal_HPGen-37b 20180727
VBA32 BScope.Trojan.Zonidel 20180726
Webroot W32.Adware.Gen 20180727
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180727
AegisLab 20180727
AhnLab-V3 20180727
Alibaba 20180713
ALYac 20180727
Antiy-AVL 20180727
Avast-Mobile 20180727
Avira (no cloud) 20180727
AVware 20180727
Babable 20180725
Bkav 20180726
CAT-QuickHeal 20180725
ClamAV 20180727
CMC 20180727
Comodo 20180727
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cyren 20180727
eGambit 20180727
F-Prot 20180727
Fortinet 20180727
Ikarus 20180727
Jiangmin 20180727
K7AntiVirus 20180727
K7GW 20180727
Kingsoft 20180727
McAfee 20180727
McAfee-GW-Edition 20180727
NANO-Antivirus 20180727
Panda 20180726
SentinelOne (Static ML) 20180701
Sophos AV 20180727
SUPERAntiSpyware 20180727
Symantec 20180727
TACHYON 20180727
Tencent 20180727
TheHacker 20180726
TotalDefense 20180727
Trustlook 20180727
VIPRE 20180727
ViRobot 20180727
Yandex 20180725
Zillya 20180726
Zoner 20180726
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-26 16:28:55
Entry Point 0x00001FFE
Number of sections 6
PE sections
PE imports
SetMapMode
GetStdHandle
GetConsoleOutputCP
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
FindNextVolumeMountPointA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetThreadTimes
HeapReAlloc
GetStringTypeW
GetOEMCP
InterlockedDecrement
SetFileAttributesW
FindFirstVolumeMountPointA
SetLastError
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
EnumSystemLocalesA
SetConsoleCtrlHandler
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
FatalAppExitA
SetFilePointer
SetUnhandledExceptionFilter
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
FreeLibrary
QueryPerformanceCounter
CreateJobSet
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetProcAddress
AddAtomW
GetComputerNameExA
GetComputerNameW
CompareStringW
CompareStringA
IsValidLocale
GetUserDefaultLCID
WriteProfileSectionA
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetNativeSystemInfo
GetLastError
LCMapStringW
SetConsoleMode
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentProcessId
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
GetModuleHandleA
PulseEvent
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
GetTimeFormatA
AlphaBlend
DrawEdge
GetLastInputInfo
MapVirtualKeyW
DeviceCapabilitiesA
CoLoadLibrary
CreateAntiMoniker
Number of PE resources by type
RT_STRING 27
RT_ICON 3
SOSEPU 1
QFKQ 1
SUKAZERERACOSUGOBALIXI 1
RT_ACCELERATOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ESTONIAN NEUTRAL 35
ESTONIAN DEFAULT 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
94720

ImageVersion
0.0

FileVersionNumber
1.2.3.4

LanguageCode
Unknown (104E)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

LinkerVersion
9.0

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3.7.9

TimeStamp
2018:07:26 18:28:55+02:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright (C) 2017, hoslicum

MachineType
Intel 386 or later, and compatibles

CodeSize
118272

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0x1ffe

ObjectFileType
Executable application

File identification
MD5 07d9cbe17d5e19916f075c7d5c9dc994
SHA1 f2765a5210026f1905e66c009260c756ff583405
SHA256 b1009564a7225cf3164bcb86a368cdd25b220a8e6d8584286cecc3db54b98c7e
ssdeep
3072:B+gkAPlqW8mPJi4AO0SasCnxfQ5lFHA81pgA:B+gVPl58mbGQ

authentihash 61f87444968e2d0a279172b8c0fbbcf58ebed5d8a908b2197c1253ef1765064c
imphash 66b8c81a2111bdfa48efaceb371fc118
File size 201.0 KB ( 205824 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
suspicious-dns peexe nxdomain

VirusTotal metadata
First submission 2018-07-27 08:45:02 UTC ( 7 months, 3 weeks ago )
Last submission 2018-07-29 21:15:12 UTC ( 7 months, 3 weeks ago )
File names t.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Copied files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications