× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bbe8049e5a0d0549a00b0439d934159f277cba741e03a60db4f37e32a390fcd6
File name: 49471219925f46460fdd64377648841a
Detection ratio: 50 / 69
Analysis date: 2018-12-10 10:04:54 UTC ( 1 week, 1 day ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40469061 20181210
AhnLab-V3 Malware/Gen.Generic.C2702060 20181210
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20181210
Arcabit Trojan.Generic.D2698245 20181210
Avast Win32:Malware-gen 20181210
AVG Win32:Malware-gen 20181210
Avira (no cloud) TR/Kryptik.yxyow 20181209
BitDefender Trojan.GenericKD.40469061 20181210
CAT-QuickHeal Trojan.Mauvaise.SL1 20181210
Comodo Packed.Win32.MUPX.Gen@24tbus 20181210
CrowdStrike Falcon (ML) malicious_confidence_60% (D) 20181022
Cylance Unsafe 20181210
Cyren W32/Downloader.PUTK-0085 20181210
DrWeb Trojan.PWS.Stealer.21240 20181210
Emsisoft Trojan.GenericKD.40469061 (B) 20181210
Endgame malicious (moderate confidence) 20181108
ESET-NOD32 Win32/PSW.Fareit.L 20181210
F-Prot W32/Downldr2.IZYN 20181210
F-Secure Trojan.GenericKD.40469061 20181210
Fortinet W32/Fareit.A 20181210
GData Win32.Trojan.Agent.56SIUN 20181210
Ikarus Trojan-PSW.Fareit 20181209
Sophos ML heuristic 20181128
Jiangmin Backdoor.Androm.absu 20181210
K7AntiVirus Trojan ( 0053c3ce1 ) 20181210
K7GW Trojan ( 0053c3ce1 ) 20181210
Kaspersky Backdoor.Win32.Androm.qhxi 20181210
Malwarebytes Trojan.Injector 20181210
McAfee RDN/Generic.hbg 20181210
McAfee-GW-Edition RDN/Generic.hbg 20181210
Microsoft PWS:Win32/Fareit!bit 20181210
eScan Trojan.GenericKD.40469061 20181210
NANO-Antivirus Trojan.Win32.Androm.fhnflq 20181210
Palo Alto Networks (Known Signatures) generic.ml 20181210
Panda Trj/WLT.D 20181209
Qihoo-360 Win32/Backdoor.0c0 20181210
Sophos AV Troj/Fareit-FQX 20181210
Symantec Trojan Horse 20181209
Tencent Win32.Backdoor.Androm.Pcst 20181210
Trapmine suspicious.low.ml.score 20181205
TrendMicro TrojanSpy.Win32.FAREIT.TIOIBOAM 20181210
TrendMicro-HouseCall TrojanSpy.Win32.FAREIT.TIOIBOAM 20181210
VBA32 BScope.TrojanSpy.Panda 20181207
VIPRE Trojan.Win32.Generic!BT 20181209
ViRobot Trojan.Win32.Z.Fareit.776192.A 20181209
Webroot W32.Trojan.GenKD 20181210
Yandex Backdoor.Androm!kAO6VYsr7SI 20181207
Zillya Backdoor.Androm.Win32.53396 20181208
ZoneAlarm by Check Point Backdoor.Win32.Androm.qhxi 20181210
Zoner Trojan.Fareit 20181207
AegisLab 20181210
Alibaba 20180921
Avast-Mobile 20181209
Babable 20180918
Baidu 20181207
Bkav 20181208
ClamAV 20181210
CMC 20181209
Cybereason 20180225
eGambit 20181210
Kingsoft 20181210
MAX 20181210
Rising 20181210
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181207
TACHYON 20181210
TheHacker 20181202
TotalDefense 20181209
Trustlook 20181210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2015 Ciklum

Product RobustEnfrces
File version 5.4.8.6
Description Signing Bcp Lympus Simplify Arcnet
Comments Signing Bcp Lympus Simplify Arcnet
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-09 21:57:44
Entry Point 0x001A9010
Number of sections 3
PE sections
PE imports
RegEnumKeyA
AuthzFreeContext
AVIFileOpenA
GetFileTitleA
LPtoDP
ImmGetContext
VirtualProtect
LoadLibraryA
ExitProcess
GetProcAddress
AlphaBlend
DsGetDcOpenA
LresultFromObject
OleTranslateColor
RasDeleteEntryW
RasEntryDlgW
DragFinish
PathIsUNCA
PlaySoundA
ClosePrinter
closesocket
SCardForgetReaderA
GdipFree
DoDragDrop
PdhOpenQueryA
Number of PE resources by type
RT_DIALOG 14
RT_STRING 14
RT_ICON 5
Struct(800) 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 40
PE resources
ExifTool file metadata
CodeSize
729088

SubsystemVersion
5.1

Comments
Signing Bcp Lympus Simplify Arcnet

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.4.8.6

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Signing Bcp Lympus Simplify Arcnet

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
49152

EntryPoint
0x1a9010

MIMEType
application/octet-stream

LegalCopyright
Copyright 2015 Ciklum

FileVersion
5.4.8.6

TimeStamp
2018:09:09 22:57:44+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
5.4.8.6

UninitializedDataSize
1011712

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Ciklum

LegalTrademarks
Copyright 2015 Ciklum

ProductName
RobustEnfrces

ProductVersionNumber
5.4.8.6

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 49471219925f46460fdd64377648841a
SHA1 908bb8c54e847dc0ac25be78baaa6d4f9d1309c2
SHA256 bbe8049e5a0d0549a00b0439d934159f277cba741e03a60db4f37e32a390fcd6
ssdeep
12288:PpaV0EVcvn2hfklwCWocDOaLfynaSZTVwbjDbxLSLYsygBdxCnB2EvnHDLl/nplV:4V7iUklVMOaWnaETVejDuygBdwnQEt/N

authentihash c24f90846e18e7dfbaf32fdad928264da080cbc813247b580e77d8c97b17b2ee
imphash 0da34736655987264189824fcbbc60d4
File size 758.0 KB ( 776192 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (38.4%)
UPX compressed Win32 Executable (37.6%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
OS/2 Executable (generic) (2.8%)
Tags
peexe upx

VirusTotal metadata
First submission 2018-09-10 01:49:02 UTC ( 3 months, 1 week ago )
Last submission 2018-11-15 23:09:17 UTC ( 1 month ago )
File names vsl_queen_ship_pdf.ex
49471219925f46460fdd64377648841a
cccc.exe
vsl_queen_ship_pdf.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.