× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b7ad996132de4f379dc58267b91b6c075a625ab3b7c29099fb79ce289abd5121
File name: 2017-12-27-Zeus-Panda-Banker-818200132aebmoouht.exe
Detection ratio: 53 / 67
Analysis date: 2018-01-09 07:41:00 UTC ( 1 week, 2 days ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.6330282 20180109
AegisLab Uds.Dangerousobject.Multi!c 20180109
AhnLab-V3 Trojan/Win32.Hermesran.C2320490 20180109
ALYac Spyware.Banker.panda 20180109
Antiy-AVL RiskWare[RiskTool]/Win32.BitCoinMiner 20180109
Arcabit Trojan.Generic.D6097AA 20180109
Avast Win32:Malware-gen 20180109
AVG Win32:Malware-gen 20180109
Avira (no cloud) TR/Crypt.Xpack.ejoxk 20180109
AVware Trojan.Win32.Generic!BT 20180103
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20180109
BitDefender Trojan.GenericKD.6330282 20180109
Bkav W32.DozokaDFK.Trojan 20180106
CAT-QuickHeal Trojan.Horse 20180109
Comodo UnclassifiedMalware 20180109
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cylance Unsafe 20180109
Cyren W32/Trojan.PZDN-7449 20180109
DrWeb Trojan.MulDrop7.55102 20180109
Emsisoft Trojan.GenericKD.6330282 (B) 20180109
Endgame malicious (high confidence) 20171130
ESET-NOD32 a variant of Win32/Kryptik.GAZI 20180109
F-Secure Trojan.GenericKD.6330282 20180109
Fortinet Generik.LMGNWTQ!tr 20180109
GData Trojan.GenericKD.6330282 20180109
Ikarus Trojan-Spy.Zbot 20180108
Sophos ML heuristic 20170914
Jiangmin Trojan.IRCBot.vz 20180109
K7AntiVirus Trojan ( 00521b981 ) 20180109
K7GW Trojan ( 00521b981 ) 20180109
Kaspersky Trojan-Downloader.Win32.Agent.silswe 20180109
Malwarebytes Trojan.MalPack 20180109
MAX malware (ai score=99) 20180109
McAfee RDN/Generic.grp 20180109
McAfee-GW-Edition BehavesLike.Win32.Ransom.dc 20180109
Microsoft PWS:Win32/Zbot 20180109
eScan Trojan.GenericKD.6330282 20180109
NANO-Antivirus Trojan.Win32.IRCbot.ewmixj 20180109
Palo Alto Networks (Known Signatures) generic.ml 20180109
Panda Trj/CI.A 20180108
Rising Malware.Obscure/Heur!1.A89E (CLASSIC) 20180106
Sophos AV Mal/Generic-S 20180109
SUPERAntiSpyware Trojan.Agent/Gen-Kryptik 20180109
Symantec Trojan Horse 20180109
Tencent Suspicious.Heuristic.Gen.b.0 20180109
TrendMicro TROJ_GEN.R002C0WLS17 20180109
TrendMicro-HouseCall TSPY_EMOTET.SMD3 20180109
VIPRE Trojan.Win32.Generic!BT 20180109
ViRobot Trojan.Win32.Globelmposter.235520 20180109
Webroot W32.Trojan.Gen 20180109
Yandex Riskware.BitCoinMiner! 20171229
Zillya Downloader.Agent.Win32.347854 20180108
ZoneAlarm by Check Point Trojan-Downloader.Win32.Agent.silswe 20180109
Alibaba 20180109
Avast-Mobile 20180108
ClamAV 20180109
CMC 20180108
Cybereason 20171103
eGambit 20180109
F-Prot 20180109
Kingsoft 20180109
nProtect 20180109
Qihoo-360 20180109
SentinelOne (Static ML) 20171224
Symantec Mobile Insight 20180109
TheHacker 20180108
Trustlook 20180109
VBA32 20180108
WhiteArmor 20171226
Zoner 20180109
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2017

File version 1.0.0.1
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-12-27 09:22:18
Entry Point 0x0000B9E0
Number of sections 5
PE sections
PE imports
CloseHandle
FreeEnvironmentStringsW
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
GetConsoleOutputCP
GetStartupInfoA
LoadLibraryW
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
HeapAlloc
TlsAlloc
IsValidLocale
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
DeleteCriticalSection
LeaveCriticalSection
EnumSystemLocalesA
GetEnvironmentStrings
GetFileType
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
AddAtomA
SetHandleCount
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
GetTickCount
GetFileInformationByHandle
GetCommandLineA
GetProcAddress
AddAtomW
GetLocaleInfoW
SetStdHandle
LCMapStringW
SetFilePointer
RaiseException
InitializeCriticalSection
GetCPInfo
GetStringTypeA
GetModuleHandleA
GetExitCodeThread
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
ReadFile
GetSystemTimeAsFileTime
TerminateProcess
GetACP
HeapReAlloc
GetStringTypeW
GetUserDefaultLCID
TlsFree
GlobalMemoryStatus
QueryPerformanceCounter
WriteConsoleA
IsValidCodePage
HeapCreate
GlobalAlloc
VirtualFree
InterlockedDecrement
Sleep
SetLastError
SetEndOfFile
TlsSetValue
CreateFileA
ExitProcess
GetCurrentThreadId
GetProcessHeap
VirtualAlloc
WriteConsoleW
InterlockedIncrement
GetMenuInfo
UpdateWindow
LoadMenuA
CallMsgFilterW
PrivateExtractIconsA
GetNextDlgGroupItem
GetRegisteredRawInputDevices
GetDialogBaseUnits
LoadBitmapA
PeekMessageA
LookupIconIdFromDirectoryEx
LoadCursorFromFileW
LoadKeyboardLayoutA
DispatchMessageW
GetDlgCtrlID
GetRawInputDeviceInfoW
TranslateMessage
LoadStringW
RegisterRawInputDevices
LoadMenuIndirectA
LoadImageW
LoadIconA
GetRawInputBuffer
LoadCursorW
LoadIconW
TranslateAcceleratorW
OpenClipboard
Number of PE resources by type
RT_ICON 2
KAEMAILA 1
VIRALUJAXIVE 1
ZUMUXIBOMOWEZEKEYIVAMABEZUWU 1
RT_ACCELERATOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 6
ENGLISH UK 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
1.0.0.1

LanguageCode
English (British)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
893440

EntryPoint
0xb9e0

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.0.1

TimeStamp
2017:12:27 10:22:18+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0.0.1

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright (C) 2017

MachineType
Intel 386 or later, and compatibles

CodeSize
132608

FileSubtype
0

ProductVersionNumber
1.0.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 5d906f57044c03f234def2bbfb345f44
SHA1 fa59dae64135d8a8a6770ae06ad1169891a3cd6c
SHA256 b7ad996132de4f379dc58267b91b6c075a625ab3b7c29099fb79ce289abd5121
ssdeep
6144:3hlODSc2b0FJ0i6j/1HG6CHoCTI9eiLkm:3hUDxzGi6jdHeoI4eiA

authentihash 48c2f27e25f03d5c29a9ed25984e71a2a18b85531194324bc97af25ab2da937a
imphash 5ed8be01db1fd19323a8b9c5700ac84c
File size 260.0 KB ( 266240 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2017-12-27 14:46:59 UTC ( 3 weeks, 1 day ago )
Last submission 2017-12-28 21:12:14 UTC ( 3 weeks ago )
File names Wc8OFXy5.exe
Zeus-Panda-Banker-818200132aebmoouht.exe
yt.exe
2017-12-27-Zeus-Panda-Banker-818200132aebmoouht.exe
Document4.exe
.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs