× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c01ead04d9a4aabeca56feba7905b64e7a6c2b924cbfe38ac25806143cf668a5
File name: f3ddc736a4db1b23f3cd149923879617
Detection ratio: 37 / 59
Analysis date: 2017-03-03 05:38:15 UTC ( 1 year, 11 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.140334 20170303
AhnLab-V3 Trojan/Win32.Cerber.R195956 20170302
ALYac Gen:Variant.Razy.140334 20170303
Arcabit Trojan.Razy.D2242E 20170303
Avast Win32:Malware-gen 20170303
AVG Ransomer.NCE 20170302
Avira (no cloud) TR/Crypt.Xpack.dkvye 20170303
AVware Trojan.Win32.Generic!BT 20170303
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170302
BitDefender Gen:Variant.Razy.140334 20170303
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170130
DrWeb Trojan.PWS.Sphinx.2 20170303
Emsisoft Gen:Variant.Razy.140334 (B) 20170303
Endgame malicious (high confidence) 20170222
ESET-NOD32 a variant of Win32/Kryptik.FOZP 20170303
F-Secure Gen:Variant.Razy.140334 20170303
Fortinet W32/GenKryptik.WDP!tr 20170303
GData Gen:Variant.Razy.140334 20170303
Sophos ML trojandropper.win32.sality.au 20170203
Jiangmin Trojan.Zerber.aum 20170301
K7AntiVirus Trojan ( 005071111 ) 20170302
K7GW Trojan ( 005071111 ) 20170303
Kaspersky Trojan-Ransom.Win32.Zerber.coli 20170303
Malwarebytes Ransom.Spora 20170303
McAfee Ransomware-FMJ!F3DDC736A4DB 20170303
McAfee-GW-Edition BehavesLike.Win32.Generic.dc 20170303
eScan Gen:Variant.Razy.140334 20170303
NANO-Antivirus Trojan.Win32.Zerber.elyzpc 20170303
Panda Trj/GdSda.A 20170302
Qihoo-360 Win32/Trojan.83c 20170303
Sophos AV Mal/Elenoocka-E 20170303
SUPERAntiSpyware Ransom.Spora/Variant 20170303
Symantec Packed.Generic.493 20170302
TrendMicro Ransom_CERBER.VSAGM 20170303
TrendMicro-HouseCall Ransom_CERBER.VSAGM 20170303
VIPRE Trojan.Win32.Generic!BT 20170303
Webroot Malicious 20170303
AegisLab 20170303
Alibaba 20170228
Antiy-AVL 20170303
Bkav 20170302
CAT-QuickHeal 20170302
ClamAV 20170302
CMC 20170302
Comodo 20170303
Cyren 20170303
F-Prot 20170303
Ikarus 20170302
Kingsoft 20170303
Microsoft 20170303
nProtect 20170303
Rising None
Tencent 20170303
TheHacker 20170302
TotalDefense 20170302
Trustlook 20170303
VBA32 20170302
ViRobot 20170303
WhiteArmor 20170222
Yandex 20170225
Zillya 20170302
Zoner 20170303
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-10-04 16:08:32
Entry Point 0x00006948
Number of sections 3
PE sections
Overlays
MD5 9617e1ecafd65d151690deb76c498e92
File type data
Offset 258048
Size 186
Entropy 6.94
PE imports
CreateFileMappingW
TlsGetValue
GetProcAddress
LoadLibraryW
SetCurrentDirectoryA
SetEvent
CopyFileA
GetProfileStringA
IsBadWritePtr
OpenMutexW
TlsSetValue
FindFirstFileW
CreateMailslotA
LoadLibraryA
HeapReAlloc
CreateNamedPipeA
SleepEx
GetPrivateProfileStringW
ResetEvent
TraceSQLFetch
TraceSQLConnect
ClusWorkerStart
ClusWorkerCreate
ResUtilDupString
ClusWorkerTerminate
ExtractIconA
StrChrW
SHBrowseForFolderW
SHGetFolderPathW
SHChangeNotify
ShellMessageBoxW
DragQueryPoint
FindExecutableW
SHGetDiskFreeSpaceA
SHGetFileInfoW
DragQueryFileA
ShellAboutA
ShellExecuteA
SHFileOperationA
IsCharAlphaW
LoadCursorA
GetPropW
DrawStateA
CreateDesktopW
DialogBoxParamW
LoadBitmapA
LoadIconW
GetMonitorInfoA
PostMessageW
IsChild
GetClassLongA
CharToOemA
Number of PE resources by type
RT_GROUP_CURSOR 8
RT_MANIFEST 1
MIKL 1
Number of PE resources by language
NEUTRAL 10
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2015:10:04 17:08:32+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
243712

LinkerVersion
5.5

FileTypeExtension
exe

InitializedDataSize
13312

SubsystemVersion
4.0

EntryPoint
0x6948

OSVersion
5.1

ImageVersion
5.1

UninitializedDataSize
0

File identification
MD5 f3ddc736a4db1b23f3cd149923879617
SHA1 dc8c4b57cf787a655668e0da7ffa4ee5cfbbae20
SHA256 c01ead04d9a4aabeca56feba7905b64e7a6c2b924cbfe38ac25806143cf668a5
ssdeep
6144:u7j5msjsQxpW0KQwIK1QHVjhBdoQEkFw34BWJA76B55:u7j5msjsZ9IKy1lPoQEkq3UG55

authentihash 7961632da5ccd0312636855275d7e85b8ede916aef1a9e19f3adcb080ce9df1a
imphash bfea4db99e9bfb329cc9d3049c664487
File size 252.2 KB ( 258234 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe suspicious-udp overlay

VirusTotal metadata
First submission 2017-03-02 15:55:59 UTC ( 1 year, 11 months ago )
Last submission 2017-03-02 15:55:59 UTC ( 1 year, 11 months ago )
File names c01ead04d9a4aabeca56feba7905b64e7a6c2b924cbfe38ac25806143cf668a5
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
UDP communications