× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b7ad996132de4f379dc58267b91b6c075a625ab3b7c29099fb79ce289abd5121
File name: 2017-12-27-Zeus-Panda-Banker-818200132aebmoouht.exe.rename
Detection ratio: 55 / 67
Analysis date: 2018-04-25 17:52:10 UTC ( 37 minutes ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.6330282 20180425
AegisLab Uds.Dangerousobject.Multi!c 20180425
AhnLab-V3 Trojan/Win32.RansomCrypt.R220586 20180425
ALYac Spyware.Banker.panda 20180425
Antiy-AVL RiskWare[RiskTool]/Win32.BitCoinMiner 20180418
Arcabit Trojan.Generic.D6097AA 20180425
Avast Win32:Malware-gen 20180425
AVG Win32:Malware-gen 20180425
Avira (no cloud) TR/Crypt.Xpack.ejoxk 20180425
AVware Trojan.Win32.Generic!BT 20180425
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20180425
BitDefender Trojan.GenericKD.6330282 20180425
Bkav W32.DozokaDFK.Trojan 20180424
CAT-QuickHeal Trojan.Horse 20180425
ClamAV Win.Trojan.Emotet-6416442-0 20180425
Comodo UnclassifiedMalware 20180425
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180418
Cybereason malicious.7044c0 20180225
Cylance Unsafe 20180425
Cyren W32/Trojan.PZDN-7449 20180425
DrWeb Trojan.MulDrop7.55102 20180425
Emsisoft Trojan.GenericKD.6330282 (B) 20180425
Endgame malicious (high confidence) 20180403
ESET-NOD32 a variant of Win32/Kryptik.GAZI 20180425
F-Secure Trojan.GenericKD.6330282 20180425
Fortinet W32/Kryptik.GBFP!tr 20180425
GData Trojan.GenericKD.6330282 20180425
Ikarus Trojan-Spy.Zbot 20180425
Sophos ML heuristic 20180121
Jiangmin Trojan.IRCBot.vz 20180425
K7AntiVirus Trojan ( 00521b981 ) 20180425
K7GW Trojan ( 00521b981 ) 20180425
Kaspersky Trojan-Downloader.Win32.Agent.silswe 20180425
Malwarebytes Trojan.MalPack 20180425
MAX malware (ai score=99) 20180425
McAfee PWS-FCKC!5D906F57044C 20180425
McAfee-GW-Edition BehavesLike.Win32.MultiPlug.dc 20180425
Microsoft PWS:Win32/Zbot 20180424
eScan Trojan.GenericKD.6330282 20180425
NANO-Antivirus Trojan.Win32.IRCbot.ewmixj 20180425
Palo Alto Networks (Known Signatures) generic.ml 20180425
Panda Trj/CI.A 20180425
Sophos AV Troj/Kryptik-IJ 20180425
SUPERAntiSpyware Trojan.Agent/Gen-Kryptik 20180425
Symantec Trojan Horse 20180425
Tencent Win32.Trojan-downloader.Agent.Szbs 20180425
TrendMicro TROJ_GEN.R002C0WLS17 20180425
TrendMicro-HouseCall TSPY_EMOTET.SMD3 20180425
VBA32 Trojan.Inject 20180425
VIPRE Trojan.Win32.Generic!BT 20180425
ViRobot Trojan.Win32.Globelmposter.235520 20180425
Webroot W32.Trojan.Gen 20180425
Yandex Riskware.BitCoinMiner! 20180425
Zillya Downloader.Agent.Win32.347854 20180425
ZoneAlarm by Check Point Trojan-Downloader.Win32.Agent.silswe 20180425
Alibaba 20180425
Avast-Mobile 20180425
Babable 20180406
CMC 20180425
eGambit 20180425
F-Prot 20180425
Kingsoft 20180425
nProtect 20180425
Rising 20180425
SentinelOne (Static ML) 20180225
Symantec Mobile Insight 20180424
TheHacker 20180425
TotalDefense 20180425
Trustlook 20180425
Zoner 20180425
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2017

File version 1.0.0.1
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-12-27 09:22:18
Entry Point 0x0000B9E0
Number of sections 5
PE sections
PE imports
CloseHandle
FreeEnvironmentStringsW
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
GetConsoleOutputCP
GetStartupInfoA
LoadLibraryW
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
HeapAlloc
TlsAlloc
IsValidLocale
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
DeleteCriticalSection
LeaveCriticalSection
EnumSystemLocalesA
GetEnvironmentStrings
GetFileType
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
AddAtomA
SetHandleCount
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
GetTickCount
GetFileInformationByHandle
GetCommandLineA
GetProcAddress
AddAtomW
GetLocaleInfoW
SetStdHandle
LCMapStringW
SetFilePointer
RaiseException
InitializeCriticalSection
GetCPInfo
GetStringTypeA
GetModuleHandleA
GetExitCodeThread
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
ReadFile
GetSystemTimeAsFileTime
TerminateProcess
GetACP
HeapReAlloc
GetStringTypeW
GetUserDefaultLCID
TlsFree
GlobalMemoryStatus
QueryPerformanceCounter
WriteConsoleA
IsValidCodePage
HeapCreate
GlobalAlloc
VirtualFree
InterlockedDecrement
Sleep
SetLastError
SetEndOfFile
TlsSetValue
CreateFileA
ExitProcess
GetCurrentThreadId
GetProcessHeap
VirtualAlloc
WriteConsoleW
InterlockedIncrement
GetMenuInfo
UpdateWindow
LoadMenuA
CallMsgFilterW
PrivateExtractIconsA
GetNextDlgGroupItem
GetRegisteredRawInputDevices
GetDialogBaseUnits
LoadBitmapA
PeekMessageA
LookupIconIdFromDirectoryEx
LoadCursorFromFileW
LoadKeyboardLayoutA
DispatchMessageW
GetDlgCtrlID
GetRawInputDeviceInfoW
TranslateMessage
LoadStringW
RegisterRawInputDevices
LoadMenuIndirectA
LoadImageW
LoadIconA
GetRawInputBuffer
LoadCursorW
LoadIconW
TranslateAcceleratorW
OpenClipboard
Number of PE resources by type
RT_ICON 2
KAEMAILA 1
VIRALUJAXIVE 1
ZUMUXIBOMOWEZEKEYIVAMABEZUWU 1
RT_ACCELERATOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 6
ENGLISH UK 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
1.0.0.1

LanguageCode
English (British)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
893440

EntryPoint
0xb9e0

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.0.1

TimeStamp
2017:12:27 10:22:18+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0.0.1

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright (C) 2017

MachineType
Intel 386 or later, and compatibles

CodeSize
132608

FileSubtype
0

ProductVersionNumber
1.0.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 5d906f57044c03f234def2bbfb345f44
SHA1 fa59dae64135d8a8a6770ae06ad1169891a3cd6c
SHA256 b7ad996132de4f379dc58267b91b6c075a625ab3b7c29099fb79ce289abd5121
ssdeep
6144:3hlODSc2b0FJ0i6j/1HG6CHoCTI9eiLkm:3hUDxzGi6jdHeoI4eiA

authentihash 48c2f27e25f03d5c29a9ed25984e71a2a18b85531194324bc97af25ab2da937a
imphash 5ed8be01db1fd19323a8b9c5700ac84c
File size 260.0 KB ( 266240 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2017-12-27 14:46:59 UTC ( 3 months, 4 weeks ago )
Last submission 2018-04-25 17:52:10 UTC ( 37 minutes ago )
File names Wc8OFXy5.exe
Zeus-Panda-Banker-818200132aebmoouht.exe
yt.exe
2017-12-27-Zeus-Panda-Banker-818200132aebmoouht.exe
Document4.exe
2017-12-27-Zeus-Panda-Banker-818200132aebmoouht.exe.rename
.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs