× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b1daaf6893d03d310706304212c021593471b6da70016b97a5575ea1ac1218f4
File name: micro-robot-blast.exe
Detection ratio: 6 / 55
Analysis date: 2015-12-01 12:25:15 UTC ( 2 years, 7 months ago )
Antivirus Result Update
ByteHero Virus.Win32.Part.a 20151201
Jiangmin Adware/iBryte.gpdu 20151130
McAfee Artemis!39B16269E37C 20151201
McAfee-GW-Edition Artemis 20151201
TotalDefense Win32/Tnega.bXRKZUB 20151201
ViRobot Trojan.Win32.A.Downloader.309539[h] 20151201
Ad-Aware 20151130
AegisLab 20151201
Yandex 20151130
AhnLab-V3 20151130
Alibaba 20151201
ALYac 20151201
Antiy-AVL 20151201
Arcabit 20151201
Avast 20151201
AVG 20151130
Avira (no cloud) 20151201
AVware 20151201
Baidu-International 20151201
BitDefender 20151201
Bkav 20151201
CAT-QuickHeal 20151201
ClamAV 20151201
CMC 20151201
Comodo 20151201
Cyren 20151201
DrWeb 20151201
Emsisoft 20151201
ESET-NOD32 20151201
F-Prot 20151201
Fortinet 20151201
GData 20151201
Ikarus 20151201
K7AntiVirus 20151201
K7GW 20151201
Kaspersky 20151201
Malwarebytes 20151201
Microsoft 20151201
eScan 20151201
NANO-Antivirus 20151201
nProtect 20151201
Panda 20151130
Qihoo-360 20151201
Rising 20151129
Sophos AV 20151201
SUPERAntiSpyware 20151201
Symantec 20151130
Tencent 20151201
TheHacker 20151127
TrendMicro 20151201
TrendMicro-HouseCall 20151201
VBA32 20151130
VIPRE 20151201
Zillya 20151201
Zoner 20151201
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT CAB
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-05-23 07:41:48
Entry Point 0x0000950C
Number of sections 4
PE sections
Overlays
MD5 ff7b3bcf8df4c014f28a9541f7f6b40e
File type data
Offset 86016
Size 223523
Entropy 8.00
PE imports
GetLastError
HeapFree
GetStdHandle
LCMapStringW
SetHandleCount
WaitForSingleObject
GetOEMCP
LCMapStringA
HeapDestroy
HeapAlloc
GetVersionExA
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
RemoveDirectoryA
FreeEnvironmentStringsA
GetCurrentProcess
GetEnvironmentStrings
GetCurrentDirectoryA
CreateDirectoryA
WideCharToMultiByte
UnhandledExceptionFilter
MultiByteToWideChar
FreeEnvironmentStringsW
GetModuleFileNameA
GetProcAddress
SetStdHandle
GetModuleHandleA
GetTempPathA
GetCPInfo
GetStringTypeA
SetFilePointer
ReadFile
WriteFile
GetStartupInfoA
CloseHandle
GetCommandLineA
GetACP
HeapReAlloc
GetStringTypeW
SetEnvironmentVariableA
GetFullPathNameA
GetDriveTypeA
TerminateProcess
CreateProcessA
GetEnvironmentVariableA
HeapCreate
VirtualFree
GetFileType
SetEndOfFile
CreateFileA
ExitProcess
GetVersion
VirtualAlloc
SetCurrentDirectoryA
SHFileOperationA
DispatchMessageA
SetDlgItemTextA
SendMessageA
MessageBoxA
PeekMessageA
GetDlgItem
CreateDialogParamA
TranslateMessage
IsDialogMessageA
DestroyWindow
Number of PE resources by type
RT_ICON 1
RT_DIALOG 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 3
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2007:05:23 08:41:48+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
61440

LinkerVersion
6.0

EntryPoint
0x950c

InitializedDataSize
36864

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 39b16269e37c18aaa6fa67ec2e4af7bc
SHA1 abce76390200f2bb9b5d803bf06f16d943e1a507
SHA256 b1daaf6893d03d310706304212c021593471b6da70016b97a5575ea1ac1218f4
ssdeep
6144:1zW/KFKexXI7tRrKwyjg2ruu6rFxpSDg9SCN6fMwY2hLY:ltx4BRrKwyjg+uxYUAy6fMwrLY

authentihash e5289dfa4190cb5f4c70d8db50b4b5404fbdbdeb6007e84a4aa8b5aa49279206
imphash 2466f72df61f40db2ed3d0c0b780c7e1
File size 302.3 KB ( 309539 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe overlay

VirusTotal metadata
First submission 2014-06-17 11:21:42 UTC ( 4 years, 1 month ago )
Last submission 2015-12-01 12:25:15 UTC ( 2 years, 7 months ago )
File names micro-robot-blast.exe
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: Suspicious_GEN.F47V0603.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications