× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b55e05d9a77889921a52037b811b493ac1c026b89fc24dc73ce88974ac77dfc1
File name: a8f5778b7c951d94da5fe96e58b9427d
Detection ratio: 44 / 68
Analysis date: 2018-08-10 09:54:11 UTC ( 7 months, 1 week ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40381828 20180810
AhnLab-V3 Worm/Win32.VBNA.C2044715 20180809
Arcabit Trojan.Generic.D2682D84 20180810
Avast Win32:VB-ABYT [Trj] 20180810
AVG Win32:VB-ABYT [Trj] 20180810
Avira (no cloud) TR/Dropper.Gen 20180810
AVware Trojan.Win32.Generic!BT 20180810
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9986 20180810
BitDefender Trojan.GenericKD.40381828 20180810
CAT-QuickHeal Trojan.VBCrypt.MF.1942 20180810
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.ae5eae 20180225
Cylance Unsafe 20180810
Cyren W32/Trojan.GNHP-3261 20180810
DrWeb BACKDOOR.Trojan 20180810
Emsisoft Trojan.GenericKD.40381828 (B) 20180810
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Ainslot.AA 20180810
F-Secure Trojan.GenericKD.40381828 20180810
Fortinet W32/VBNA.BH!worm 20180810
GData Trojan.GenericKD.40381828 20180810
Ikarus Trojan.Win32.VBKrypt 20180810
Sophos ML heuristic 20180717
K7AntiVirus NetWorm ( 700000151 ) 20180810
K7GW NetWorm ( 700000151 ) 20180810
Kaspersky Worm.Win32.VBNA.b 20180810
Malwarebytes Backdoor.Revcode 20180810
MAX malware (ai score=100) 20180810
McAfee W32/Generic!im 20180810
McAfee-GW-Edition BehavesLike.Win32.VBObfus.fm 20180810
Microsoft VirTool:Win32/VBInject 20180810
eScan Trojan.GenericKD.40381828 20180810
NANO-Antivirus Trojan.Win32.Ainslot.fgikch 20180810
Palo Alto Networks (Known Signatures) generic.ml 20180810
Panda Trj/GdSda.A 20180809
Qihoo-360 Win32/Worm.5d0 20180810
Rising Worm.Ainslot!8.53E (CLOUD) 20180810
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/Generic-S 20180810
Symantec ML.Attribute.HighConfidence 20180810
TrendMicro TROJ_GEN.R002C0DH918 20180810
TrendMicro-HouseCall TROJ_GEN.R002C0DH918 20180810
VIPRE Trojan.Win32.Generic!BT 20180810
ZoneAlarm by Check Point Worm.Win32.VBNA.b 20180810
AegisLab 20180810
Alibaba 20180713
ALYac 20180810
Antiy-AVL 20180810
Avast-Mobile 20180810
Babable 20180725
Bkav 20180807
ClamAV 20180810
CMC 20180810
Comodo 20180810
eGambit 20180810
F-Prot 20180810
Jiangmin 20180810
Kingsoft 20180810
SUPERAntiSpyware 20180810
Symantec Mobile Insight 20180809
TACHYON 20180810
Tencent 20180810
TheHacker 20180807
TotalDefense 20180810
Trustlook 20180810
VBA32 20180808
ViRobot 20180810
Webroot 20180810
Yandex 20180810
Zillya 20180809
Zoner 20180810
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-23 14:16:57
Entry Point 0x0000131C
Number of sections 3
PE sections
PE imports
EVENT_SINK_QueryInterface
Ord(712)
Ord(546)
Ord(518)
Ord(308)
Ord(521)
Ord(516)
Ord(616)
EVENT_SINK_Invoke
Ord(320)
Ord(527)
Ord(685)
Ord(697)
EVENT_SINK_AddRef
Ord(709)
Ord(594)
Ord(302)
Ord(681)
Ord(665)
Ord(592)
EVENT_SINK_GetIDsOfNames
Ord(717)
Ord(666)
Ord(702)
Ord(307)
Ord(632)
MethCallEngine
DllFunctionCall
Ord(547)
Zombie_GetTypeInfoCount
Ord(626)
Ord(648)
Ord(578)
Ord(543)
Ord(714)
Ord(100)
Zombie_GetTypeInfo
Ord(608)
Ord(544)
Ord(556)
Ord(618)
Ord(301)
Ord(519)
Ord(561)
Ord(520)
Ord(536)
Ord(517)
Ord(542)
Ord(526)
Ord(321)
Ord(319)
ProcCallEngine
Ord(711)
Ord(660)
EVENT_SINK_Release
Ord(713)
Ord(577)
Ord(617)
Ord(573)
Ord(593)
Ord(581)
Ord(528)
Ord(535)
Ord(601)
Ord(716)
__vbaExceptHandler
Ord(607)
Ord(522)
Ord(670)
Ord(644)
Ord(606)
Ord(631)
Ord(553)
Ord(572)
Ord(619)
Ord(537)
Ord(525)
Ord(598)
Ord(545)
Number of PE resources by type
DATA 2
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:07:23 15:16:57+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
344064

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x131c

InitializedDataSize
49152

SubsystemVersion
4.0

ImageVersion
1.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 a8f5778b7c951d94da5fe96e58b9427d
SHA1 0906da7ae5eaebfb31522146681238bce63057b5
SHA256 b55e05d9a77889921a52037b811b493ac1c026b89fc24dc73ce88974ac77dfc1
ssdeep
6144:+w+yTOLb12I+wsSMSCqC8uZXUEc+4Tkhwn4tn1bStMQC:Z1CbMPSMSChEEETR4t1etMQC

authentihash cf2c3378d3bc820c04c0af1952ac59f92e618ea57c52cc748b2f418e147f2709
imphash 2bcdfa5f4e1bef332cfd8af573ba6ddf
File size 376.0 KB ( 385024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (54.1%)
Win32 Executable MS Visual C++ (generic) (20.6%)
Win64 Executable (generic) (18.2%)
Win32 Executable (generic) (2.9%)
OS/2 Executable (generic) (1.3%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-09 00:40:46 UTC ( 7 months, 1 week ago )
Last submission 2018-08-09 00:40:46 UTC ( 7 months, 1 week ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
HTTP requests
DNS requests
TCP connections