× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b34459b573637cb5e6fc938f989a24d79d0b83e9cb3fac272e5f7ecaad90519a
File name: downHa.exe
Detection ratio: 31 / 47
Analysis date: 2013-09-26 05:39:59 UTC ( 6 months, 3 weeks ago )
Antivirus Result Update
AVG PSW.Generic11.CMPR 20130926
Agnitum TrojanSpy.Zbot!rq29jalwBWg 20130925
AntiVir TR/Rogue.1270183 20130926
Antiy-AVL Trojan/Win32.Zbot 20130926
Avast Win32:Malware-gen 20130926
Baidu-International Trojan.Win32.Kryptik.BKRO 20130925
BitDefender Trojan.GenericKD.1270183 20130926
Bkav HW32.Laneul.voiu 20130926
CAT-QuickHeal TrojanPWS.Zbot 20130926
Commtouch W32/Backdoor.UMDR-5684 20130926
Comodo TrojWare.Win32.Trojan.Agent.Gen 20130925
DrWeb Trojan.PWS.Panda.4379 20130926
ESET-NOD32 a variant of Win32/Kryptik.BKRO 20130925
Emsisoft Trojan-Spy.Win32.Zbot (A) 20130926
F-Secure Trojan.GenericKD.1270183 20130926
Fortinet W32/Zbot.PUOV!tr 20130926
GData Trojan.GenericKD.1270183 20130926
Ikarus Trojan-Spy.Win32.Zbot 20130926
Kaspersky Trojan-Spy.Win32.Zbot.puov 20130926
Malwarebytes Trojan.Backdoor.RV 20130926
McAfee PWS-Zbot.dx 20130926
McAfee-GW-Edition PWS-Zbot.dx 20130926
MicroWorld-eScan Trojan.GenericKD.1270183 20130926
Microsoft PWS:Win32/Zbot 20130926
Norman Troj_Generic.PTYRO 20130925
Panda Trj/Genetic.gen 20130925
Sophos Troj/Zbot-GHQ 20130926
Symantec WS.Reputation.1 20130926
TrendMicro TSPY_ZBOT.ULN 20130926
TrendMicro-HouseCall TSPY_ZBOT.ULN 20130926
VIPRE Trojan.Win32.Generic!BT 20130926
AhnLab-V3 20130925
ByteHero 20130924
ClamAV 20130926
F-Prot 20130926
Jiangmin 20130903
K7AntiVirus 20130925
K7GW 20130925
Kingsoft 20130829
NANO-Antivirus 20130925
PCTools 20130925
Rising 20130926
SUPERAntiSpyware 20130925
TheHacker 20130926
TotalDefense 20130925
VBA32 20130925
ViRobot 20130926
nProtect 20130926
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright © 2003-2011 Climbforce Corporation. All rights reserved.

Publisher Climbforce Corp.
Product Climbforce Thatonly
Version 9.3.419.286
Original name downHa.exe
Internal name downHa.exe
File version 9.3.419.286
Description Climbforce Thatonly
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-09-17 08:58:23
Entry Point 0x000077E3
Number of sections 4
PE sections
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetModuleFileNameW
GetOEMCP
LCMapStringA
HeapDestroy
HeapAlloc
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetEnvironmentStrings
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
SetSystemTimeAdjustment
HeapSize
SetStdHandle
SetFilePointer
RaiseException
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
CloseHandle
GetACP
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
TerminateProcess
InitializeCriticalSection
HeapCreate
VirtualFree
GetEnvironmentStringsW
InterlockedDecrement
Sleep
GetFileType
IsBadReadPtr
TlsSetValue
IsBadCodePtr
ExitProcess
GetVersion
LeaveCriticalSection
VirtualAlloc
SetLastError
InterlockedIncrement
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
ExifTool file metadata
SpecialBuild
Public

CodeSize
57344

SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
9.3.419.286

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Climbforce Thatonly

CharacterSet
Unicode

InitializedDataSize
557056

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Copyright 2003-2011 Climbforce Corporation. All rights reserved.

FileVersion
9.3.419.286

TimeStamp
2013:09:17 09:58:23+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
downHa.exe

FileAccessDate
2013:09:17 15:05:06+01:00

ProductVersion
9.3.419.286

UninitializedDataSize
0

OSVersion
4.0

FileCreateDate
2013:09:17 15:05:06+01:00

OriginalFilename
downHa.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Climbforce Corp.

LegalTrademarks
Copyright (C) 2004-2014 Climbforce Corporation. All rights reserved.

ProductName
Climbforce Thatonly

ProductVersionNumber
9.3.419.286

EntryPoint
0x77e3

ObjectFileType
Executable application

File identification
MD5 7b6332de90e25a5b26f7c75910a22e0c
SHA1 c8a77a2de19097c1a4c5cb830bd0025dcbd95528
SHA256 b34459b573637cb5e6fc938f989a24d79d0b83e9cb3fac272e5f7ecaad90519a
ssdeep
6144:muihiOgCd5GW6kKWHk4eyAD/bkxbdl6MgHQNb1VgJq/7UHzeRqwP27PtIVGGyuD:mu1Cd5G/5v4eyAD/bOdl/KqA3jIgx

File size 456.0 KB ( 466944 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe armadillo

VirusTotal metadata
First submission 2013-09-17 10:48:20 UTC ( 7 months ago )
Last submission 2013-09-24 03:20:36 UTC ( 6 months, 4 weeks ago )
File names about.exe
J.BIN
calc.exe
15165296
fyatguqwwydlrkticmi.bfg.exe
b34459b573637cb5e6fc938f989a24d79d0b83e9cb3fac272e5f7ecaad90519a
fyatguqwwydlrkticmi.bfg
J.bin
info.exe
readme.exe
90ebfaaca179a45d7b7655e599c83cf8cf6ff67b
downHa.exe
7B6332DE90E25A5B26F7C75910A22E0C.vir
contacts.exe
gmqapgvhwffbqenqqlj.bfg
output.15165296.txt
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Set keys
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
TCP connections
UDP communications