× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b124a9ddd31931ab6d1929a69faacfe81910b7634a88a7ce6e380a718a4ce4c1
File name: _1FA4875866988E751F621D09030921AC._
Detection ratio: 6 / 57
Analysis date: 2017-02-22 05:40:41 UTC ( 2 years, 1 month ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_88% (D) 20170130
Endgame malicious (moderate confidence) 20170217
Sophos ML trojan.win32.dorv.a 20170203
McAfee-GW-Edition BehavesLike.Win32.Downloader.dc 20170222
Qihoo-360 HEUR/QVM18.1.0000.Malware.Gen 20170222
Symantec ML.Attribute.HighConfidence 20170221
Ad-Aware 20170222
AegisLab 20170222
AhnLab-V3 20170221
Alibaba 20170222
ALYac 20170222
Arcabit 20170222
Avast 20170222
AVG 20170222
Avira (no cloud) 20170222
AVware 20170222
Baidu 20170222
BitDefender 20170222
CAT-QuickHeal 20170222
ClamAV 20170222
CMC 20170221
Comodo 20170222
Cyren 20170222
DrWeb 20170221
Emsisoft 20170222
ESET-NOD32 20170222
F-Prot 20170222
F-Secure 20170222
Fortinet 20170222
GData 20170222
Ikarus 20170221
Jiangmin 20170222
K7AntiVirus 20170222
K7GW 20170222
Kaspersky 20170222
Kingsoft 20170222
Malwarebytes 20170222
McAfee 20170222
Microsoft 20170222
eScan 20170222
NANO-Antivirus 20170222
nProtect 20170222
Panda 20170221
Rising 20170221
Sophos AV 20170222
SUPERAntiSpyware 20170222
Tencent 20170222
TheHacker 20170221
TotalDefense 20170221
TrendMicro 20170222
TrendMicro-HouseCall 20170222
Trustlook 20170222
VBA32 20170221
VIPRE 20170222
ViRobot 20170222
Webroot 20170222
WhiteArmor 20170222
Yandex 20170221
Zillya 20170220
Zoner 20170222
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT UPX_LZMA
PEiD UPX 2.93 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-02-21 23:57:21
Entry Point 0x0003D4E0
Number of sections 3
PE sections
Overlays
MD5 ba6ed77bfc3c7133d53906ce8b0c0264
File type data
Offset 92160
Size 143823
Entropy 8.00
PE imports
CreateProcessAsUserA
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
Number of PE resources by type
RT_RIBBON_XML 1
Number of PE resources by language
FRENCH 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2017:02:22 00:57:21+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
94208

LinkerVersion
9.0

EntryPoint
0x3d4e0

InitializedDataSize
4096

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
159744

File identification
MD5 1fa4875866988e751f621d09030921ac
SHA1 66e83a926fc6e0f7d9be533dd55d861d49cf1f88
SHA256 b124a9ddd31931ab6d1929a69faacfe81910b7634a88a7ce6e380a718a4ce4c1
ssdeep
6144:Yqx6zq1OlkMoSm7r9KsxEXE+CX+vil8rH:YtiMoSmn9KGEXAuvB7

authentihash b90da9d5156211139a265d7277a8d3758e42e42688f1fa339a77b9fa02e20028
imphash 10ca904578d85fa0b70bf101ae0ecacf
File size 230.5 KB ( 235983 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (39.3%)
Win32 EXE Yoda's Crypter (38.6%)
Win32 Dynamic Link Library (generic) (9.5%)
Win32 Executable (generic) (6.5%)
Generic Win/DOS Executable (2.9%)
Tags
peexe upx overlay

VirusTotal metadata
First submission 2017-02-22 05:40:41 UTC ( 2 years, 1 month ago )
Last submission 2017-02-22 05:40:41 UTC ( 2 years, 1 month ago )
File names wusa.exe
_1FA4875866988E751F621D09030921AC._
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs