× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c09afd6672e29e6788a63f405395fd8c143884b57d6a3e2b6b7a06d8508e59bd
File name: 869a070a940fb3e26111f66c79887f356b9b9560.exe
Detection ratio: 48 / 57
Analysis date: 2015-09-10 11:03:07 UTC ( 8 months, 3 weeks ago )
Antivirus Result Update
ALYac Gen:Variant.Kazy.61489 20150910
AVG PSW.Agent.AWCS 20150910
AVware Trojan.Win32.Fareit.gi (v) 20150910
Ad-Aware Gen:Variant.Kazy.61489 20150910
Yandex Trojan.PWS.Tepfer!b+47dGYuSsc 20150909
AhnLab-V3 Trojan/Win32.Tepfer 20150910
Antiy-AVL Trojan[PSW]/Win32.Tepfer 20150910
Arcabit Trojan.Kazy.DF031 20150910
Avast Sf:Nuclear-D [Trj] 20150910
Avira (no cloud) TR/PSW.Fareit.iloen 20150910
Baidu-International Trojan.Win32.Agent.NTM 20150910
BitDefender Gen:Variant.Kazy.61489 20150910
CAT-QuickHeal TrojanPSW.Tepfer.08998 20150910
ClamAV Win.Trojan.Tepfer-271 20150910
Comodo TrojWare.Win32.PWS.Fareit.GS 20150910
Cyren W32/Tepfer.R.gen!Eldorado 20150910
DrWeb Trojan.PWS.Multi.origin 20150910
ESET-NOD32 a variant of Win32/PSW.Fareit.A 20150910
Emsisoft Gen:Variant.Kazy.61489 (B) 20150910
F-Prot W32/Tepfer.R.gen!Eldorado 20150910
F-Secure Gen:Variant.Kazy.61489 20150910
Fortinet W32/Tepfer.NTM!tr 20150910
GData Gen:Variant.Kazy.61489 20150910
Ikarus Trojan-PWS.Win32.Fareit 20150910
Jiangmin Trojan/PSW.Tepfer.cfp 20150909
K7AntiVirus Password-Stealer ( 002f7a301 ) 20150910
K7GW Password-Stealer ( 002f7a301 ) 20150910
Kaspersky Trojan-PSW.Win32.Tepfer.gen 20150910
Kingsoft Win32.PSWTroj.Tepfer.(kcloud) 20150910
Malwarebytes PasswordStealer.Agent 20150910
McAfee Artemis!923324A0282D 20150910
McAfee-GW-Edition BehavesLike.Win32.Generic.nc 20150910
eScan Gen:Variant.Kazy.61489 20150910
Microsoft PWS:Win32/Fareit 20150910
NANO-Antivirus Trojan.Win32.Multi.uszwh 20150910
Panda Trj/Genetic.gen 20150910
Qihoo-360 Malware.Radar01.Gen 20150910
Rising PE:Malware.Generic/QRS!1.9E2D[F1] 20150909
Sophos Mal/Generic-L 20150910
Symantec Trojan.Gen 20150909
Tencent Win32.Init.QQRob.cdjn 20150910
TheHacker Posible_Worm32 20150910
TrendMicro TSPY_FAREIT.CT 20150910
TrendMicro-HouseCall TSPY_FAREIT.CT 20150910
VBA32 TrojanPSW.Tepfer 20150909
VIPRE Trojan.Win32.Fareit.gi (v) 20150910
ViRobot Trojan.Win32.A.PSW-Tepfer.30720.E[h] 20150910
Zillya Trojan.Tepfer.Win32.1568 20150909
AegisLab 20150910
Alibaba 20150902
Bkav 20150910
ByteHero 20150910
CMC 20150910
SUPERAntiSpyware 20150910
TotalDefense 20150910
Zoner 20150910
nProtect 20150910
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-06-11 12:53:38
Entry Point 0x00017020
Number of sections 3
PE sections
PE imports
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
RegCloseKey
CoCreateGuid
StrStrA
wsprintfA
LoadUserProfileA
InternetCrackUrlA
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:06:11 13:53:38+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
32768

LinkerVersion
2.5

EntryPoint
0x17020

InitializedDataSize
4096

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
61440

File identification
MD5 923324a0282dd92c383f8043cec96d2d
SHA1 869a070a940fb3e26111f66c79887f356b9b9560
SHA256 c09afd6672e29e6788a63f405395fd8c143884b57d6a3e2b6b7a06d8508e59bd
ssdeep
768:VejIT1N3qaGNo246WpiPSW5Iix3undA2etUdtwl:gjetq546SvW5ZP2QUd+

authentihash f8394c3728abe33f08908b1ff855653e5f75b6d6b5543c235b9f92d75b965187
imphash fd3adc5077b3a19a8142a087013e6a1b
File size 30.0 KB ( 30720 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2012-06-12 11:09:41 UTC ( 3 years, 11 months ago )
Last submission 2015-09-10 11:03:07 UTC ( 8 months, 3 weeks ago )
File names info.pe
96945aefea9f91c0b1e6bbeb04541841ffd8d08aebf7401b2c69d242d37664c2fe6bd2b9a5c6345e06e6ae8a3d9b19a9dee8dca7578b3e8382dc54b606fb9441
w.php
"calc.exe"
1cc38f2.exe
923324a0282dd92c383f8043cec96d2d_ww2.taylorgram.com_97d19
c09afd6672e29e6788a63f405395fd8c143884b57d6a3e2b6b7a06d8508e59bd
923324a0282dd92c383f8043cec96d2d
smona_c09afd6672e29e6788a63f405395fd8c143884b57d6a3e2b6b7a06d8508e59bd.bin
869a070a940fb3e26111f66c79887f356b9b9560.exe
c09afd6672e29e6788a63f405395fd8c143884b57d6a3e2b6b7a06d8508e59bd.bin
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!