× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bc5534f1f7cc6cd4c60d03cd43632cc7392dcfcbde6d9b70dd7425c7bd2fb481
File name: 9d147f824baabedeedb23268d1cbc620.vir
Detection ratio: 53 / 65
Analysis date: 2018-05-22 06:28:38 UTC ( 7 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Zusy.146473 20180522
AegisLab Troj.W32.Startserv!c 20180522
AhnLab-V3 Backdoor/Win32.Zegost.R117606 20180521
ALYac Gen:Variant.Zusy.146473 20180522
Antiy-AVL Trojan/Win32.AGeneric 20180522
Arcabit Trojan.Zusy.D23C29 20180522
Avast Win32:MrBlack-D [Trj] 20180521
AVG Win32:MrBlack-D [Trj] 20180521
AVware Trojan.Win32.Generic!BT 20180522
Baidu Win32.Trojan.ServStart.aj 20180522
BitDefender Gen:Variant.Zusy.146473 20180522
Bkav W32.RansomwareTQB.Trojan 20180522
CAT-QuickHeal Trojan.ServStart.A 20180521
CMC Trojan.Win32.StartServ!O 20180522
Cylance Unsafe 20180522
DrWeb Trojan.Mrblack.3 20180522
Emsisoft Gen:Variant.Zusy.146473 (B) 20180522
Endgame malicious (high confidence) 20180507
ESET-NOD32 Win32/ServStart.IO 20180522
F-Prot W32/Heuristic-131!Eldorado 20180522
F-Secure Gen:Variant.Zusy.146473 20180522
Fortinet W32/StartServ.VIK!tr 20180522
GData Gen:Variant.Zusy.146473 20180522
Ikarus Trojan.Win32.ServStart 20180521
Sophos ML heuristic 20180503
Jiangmin Trojan/Generic.bamdh 20180522
K7AntiVirus Trojan ( 0000000c1 ) 20180521
K7GW Trojan ( 0000000c1 ) 20180522
Kaspersky Trojan.Win32.StartServ.xer 20180522
Malwarebytes Trojan.Agent.PDD 20180522
MAX malware (ai score=87) 20180522
McAfee GenericRXAE-XG!9D147F824BAA 20180522
McAfee-GW-Edition BehavesLike.Win32.Derdero.ch 20180522
Microsoft Trojan:Win32/ServStart.gen!A 20180522
eScan Gen:Variant.Zusy.146473 20180522
NANO-Antivirus Trojan.Win32.Heuristic131.dcnfpc 20180522
Palo Alto Networks (Known Signatures) generic.ml 20180522
Panda Trj/Genetic.gen 20180521
Qihoo-360 Win32/Trojan.779 20180522
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/Generic-S 20180522
SUPERAntiSpyware Trojan.Agent/Gen-Jaik 20180522
Symantec Trojan.Gen 20180522
Tencent Win32.Trojan.Startserv.Htvo 20180522
TheHacker Trojan/ServStart.io 20180516
TrendMicro TROJ_SERVSTART_GJ1000AC.UVPN 20180522
TrendMicro-HouseCall TROJ_SERVSTART_GJ1000AC.UVPN 20180522
VBA32 BScope.Trojan.Downloader 20180521
VIPRE Trojan.Win32.Generic!BT 20180522
Webroot Trojan.Gen 20180522
Yandex Backdoor.Agent!W+qsqWX+TeU 20180518
Zillya Backdoor.PePatch.Win32.44306 20180521
ZoneAlarm by Check Point Trojan.Win32.StartServ.xer 20180522
Alibaba 20180522
Avast-Mobile 20180520
Babable 20180406
ClamAV 20180521
Comodo 20180522
CrowdStrike Falcon (ML) 20180202
Cybereason None
Cyren 20180522
eGambit 20180522
Kingsoft 20180522
nProtect 20180522
Rising 20180522
Symantec Mobile Insight 20180522
TotalDefense 20180520
Trustlook 20180522
ViRobot 20180522
Zoner 20180521
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-07-18 05:48:33
Entry Point 0x0000DFB0
Number of sections 3
PE sections
Overlays
MD5 e8ba2ddc4890214ef119228878fcffe1
File type data
Offset 196608
Size 101
Entropy 4.82
PE imports
CloseServiceHandle
RegOpenKeyA
RegCloseKey
StartServiceCtrlDispatcherA
OpenServiceA
SetServiceStatus
CreateServiceA
RegQueryValueExA
RegSetValueExA
StartServiceA
RegOpenKeyExA
OpenSCManagerA
RegisterServiceCtrlHandlerA
GetSystemTime
GetLastError
HeapFree
GetStdHandle
LCMapStringW
OpenProcess
GetSystemInfo
lstrlenA
GetFileAttributesA
WaitForSingleObject
GetOEMCP
LCMapStringA
CopyFileA
GetTickCount
IsBadWritePtr
GetVersionExA
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
HeapSize
RtlUnwind
LoadLibraryA
GetShortPathNameA
GetACP
FreeEnvironmentStringsA
HeapAlloc
GetCurrentProcess
GetEnvironmentStrings
GetFileType
SetThreadPriority
lstrcatA
SetFilePointer
DuplicateHandle
GetCPInfo
UnhandledExceptionFilter
MultiByteToWideChar
GetLocalTime
FreeEnvironmentStringsW
ExitThread
GetProcAddress
GetCurrentThread
SetFileAttributesA
CreateMutexA
CompareStringW
RaiseException
CreateThread
GetStringTypeA
GetModuleHandleA
CreatePipe
SetUnhandledExceptionFilter
lstrcpyA
GetStartupInfoA
CloseHandle
SetStdHandle
GetCommandLineA
TerminateProcess
GetSystemDirectoryA
HeapReAlloc
GetStringTypeW
SetEnvironmentVariableA
SetPriorityClass
GetExitCodeProcess
GlobalMemoryStatus
ResumeThread
CreateProcessA
GetTimeZoneInformation
WideCharToMultiByte
SetHandleCount
GetEnvironmentVariableA
HeapCreate
WriteFile
VirtualFree
HeapDestroy
Sleep
IsBadReadPtr
SetConsoleCtrlHandler
IsBadCodePtr
ExitProcess
GetVersion
VirtualAlloc
CompareStringA
wsprintfA
__WSAFDIsSet
WSASocketA
gethostname
socket
setsockopt
closesocket
ntohl
inet_addr
send
WSACleanup
WSAStartup
gethostbyname
WSAGetLastError
select
sendto
inet_ntoa
htons
recv
WSAIoctl
connect
GetFileTitleA
GetIfTable
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2014:07:18 06:48:33+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
94208

LinkerVersion
6.0

EntryPoint
0xdfb0

InitializedDataSize
9609216

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 9d147f824baabedeedb23268d1cbc620
SHA1 e680fc8b8c673696465967668da4b32c2ad52dbf
SHA256 bc5534f1f7cc6cd4c60d03cd43632cc7392dcfcbde6d9b70dd7425c7bd2fb481
ssdeep
3072:2POKWROAEATTiczEJToGGhKW9o+SALvH/n2w52YGLzY:2POKWRPTDEJMhKJaf2uyLzY

authentihash 77aa2eb985b8e160d7d981b6028417629e826f34e25830229833fe80edca0c56
imphash 3ad350f14c2e450686dbd3fbcbe807a6
File size 192.1 KB ( 196709 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2014-12-16 04:12:09 UTC ( 4 years ago )
Last submission 2018-05-22 06:28:38 UTC ( 7 months ago )
File names 9d147f824baabedeedb23268d1cbc620.virobj
9d147f824baabedeedb23268d1cbc620.vir
taskhost.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Copied files
Created processes
Opened mutexes
Opened service managers
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
TCP connections