× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bdd816b9d85947b9bd7f2462d6b177dd6dadfe83723fd4dde4eded130177b218
File name: smb-jqtjw8w8.tmp
Detection ratio: 61 / 64
Analysis date: 2017-07-27 04:19:50 UTC ( 18 hours, 14 minutes ago )
Antivirus Result Update
Ad-Aware Worm.Generic.230976 20170727
AegisLab Troj.Spy.W32.Agent.bbel!c 20170727
AhnLab-V3 Trojan/Win32.Npkon.R1489 20170727
ALYac Trojan.Spammer.57344 20170727
Antiy-AVL Trojan[Spy]/Win32.Agent 20170727
Arcabit Worm.Generic.D38640 20170727
Avast Win32:Virut 20170727
AVG Win32:Virut 20170727
Avira (no cloud) TR/Agent.grpm 20170726
AVware Trojan.Win32.Generic!BT 20170721
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9997 20170727
BitDefender Worm.Generic.230976 20170727
Bkav W32.TBrambulA.Trojan 20170726
CAT-QuickHeal Trojan.Brambul.S11407 20170727
ClamAV Win.Spyware.78857-1 20170727
CMC Trojan-Spy.Win32.Agent!O 20170727
Comodo Worm.Win32.Pepex.E0 20170727
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170710
Cylance Unsafe 20170727
Cyren W32/Agent.IX.gen!Eldorado 20170727
DrWeb Win32.HLLW.Bumble 20170727
Emsisoft Worm.Generic.230976 (B) 20170727
Endgame malicious (high confidence) 20170721
ESET-NOD32 Win32/Pepex.F 20170727
F-Prot W32/Agent.IX.gen!Eldorado 20170727
F-Secure Worm.Generic.230976 20170727
Fortinet W32/Bagz.E!worm 20170727
GData Win32.Worm.Pepex.A 20170727
Ikarus Trojan-Spy.Win32.Agent 20170726
Sophos ML heuristic 20170607
Jiangmin TrojanSpy.Agent.lvw 20170727
K7AntiVirus Backdoor ( 04c4f2671 ) 20170727
K7GW Backdoor ( 04c4f2671 ) 20170727
Kaspersky Trojan.Win32.Brambul.bp 20170727
Kingsoft Win32.Troj.Agent.(kcloud) 20170727
Malwarebytes Trojan.Agent 20170727
McAfee Downloader-CUZ 20170727
McAfee-GW-Edition BehavesLike.Win32.Downloader.km 20170726
Microsoft Trojan:Win32/Brambul.A!dha 20170727
eScan Worm.Generic.230976 20170727
NANO-Antivirus Trojan.Win32.Agent.bmgds 20170727
nProtect Trojan-Spy/W32.Agent.65814 20170726
Palo Alto Networks (Known Signatures) generic.ml 20170727
Panda Generic Malware 20170725
Qihoo-360 Win32/Trojan.Spy.f64 20170727
Rising Trojan.Generic (cloud:wOYa3PoQ3mM) 20170727
SentinelOne (Static ML) static engine - malicious 20170718
Sophos AV Mal/Spy-Y 20170727
Symantec Trojan Horse 20170727
Tencent Win32.Trojan.Brambul.Bnu 20170727
TheHacker Trojan/Spy.Agent.bbel 20170724
TotalDefense Win32/Tnega.WW 20170727
TrendMicro WORM_PEPEX.AD 20170727
TrendMicro-HouseCall WORM_PEPEX.AD 20170727
VBA32 TrojanSpy.Agent 20170725
VIPRE Trojan.Win32.Generic!BT 20170727
ViRobot Trojan.Win32.Agent.57344.UI 20170727
Webroot W32.Malware.Gen 20170727
Yandex Trojan.Brambul!5VxMLp6YrUQ 20170726
Zillya Trojan.Agent.Win32.80264 20170726
ZoneAlarm by Check Point Trojan.Win32.Brambul.bp 20170727
Alibaba 20170727
MAX 20170727
SUPERAntiSpyware 20170727
Symantec Mobile Insight 20170727
Trustlook 20170727
Zoner 20170727
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-10-14 12:45:54
Entry Point 0x0000369E
Number of sections 4
PE sections
PE imports
CloseServiceHandle
RegCloseKey
OpenServiceA
GetUserNameA
CreateServiceA
RegSetValueExA
StartServiceA
DeleteService
RegOpenKeyExA
OpenSCManagerA
GetSystemTime
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
HeapCreate
TerminateThread
lstrlenA
lstrcmpiA
WaitForSingleObject
FreeLibrary
LCMapStringA
CopyFileA
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
GetACP
FreeEnvironmentStringsA
GetStartupInfoA
GetEnvironmentStrings
SetHandleCount
LockResource
GetCPInfo
ExitProcess
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetProcessHeap
UnhandledExceptionFilter
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetCurrentProcess
CloseHandle
lstrcpynA
GetSystemDirectoryA
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
HeapDestroy
GetOEMCP
TerminateProcess
CreateProcessA
InitializeCriticalSection
LoadResource
VirtualFree
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetVersion
FindResourceA
VirtualAlloc
SetLastError
LeaveCriticalSection
rand
srand
_strupr
_beginthreadex
sprintf
_endthreadex
wsprintfA
gethostname
socket
closesocket
inet_addr
send
ioctlsocket
WSAStartup
gethostbyname
select
ntohs
connect
sendto
htons
recv
WSAGetLastError
Number of PE resources by type
RT_RCDATA 2
Number of PE resources by language
KOREAN 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2009:10:14 13:45:54+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
6.0

EntryPoint
0x369e

InitializedDataSize
32768

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 022aeb126d2d80e683f7f2a3ee920874
SHA1 b71b6d9af65c6afc4af9d546a330c097aafe3592
SHA256 bdd816b9d85947b9bd7f2462d6b177dd6dadfe83723fd4dde4eded130177b218
ssdeep
768:2W8+9FisiTZdz4HLCLTRnVuwGiJTPpfl6dW6WsyqAgg8RCW+jl2WDMrL4:2sisiTuLCLTRVuwZp5l/lsyqFg8B+RP

authentihash 76856dd5509970251cab3ed1233893975d0a8b695c1aa65189cec9ee653eb2ed
imphash 2b018f96d7cda0b915d2c1dcb16595c4
File size 64.3 KB ( 65814 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Petite compressed Win32 executable (89.3%)
Win32 Executable (generic) (5.6%)
Generic Win/DOS Executable (2.5%)
DOS Executable Generic (2.4%)
Tags
peexe armadillo via-tor

VirusTotal metadata
First submission 2010-10-07 05:42:26 UTC ( 6 years, 9 months ago )
Last submission 2017-07-14 07:35:28 UTC ( 1 week, 6 days ago )
File names 2011-10-13-001032.bin
022aeb126d2d80e683f7f2a3ee920874
022aeb126d2d80e683f7f2a3ee920874
smb-0ya4_td3.tmp
file-4403460_exe
022aeb126d2d80e683f7f2a3ee920874
csrss.exe
022aeb126d2d80e683f7f2a3ee920874
bdd816b9d85947b9bd7f2462d6b177dd6dadfe83723fd4dde4eded130177b218
022aeb126d2d80e683f7f2a3ee920874.exe
b71b6d9af65c6afc4af9d546a330c097aafe3592
smb-0ya4_td3.tmp
B2701.exe
smb-jqtjw8w8.tmp
b71b6d9af65c6afc4af9d546a330c097aafe3592
2011-10-13-001032.bi
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!