× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c1c7c679ede8064459c1d7b95cdbbf1a5b05d514ab5b8104adac080f92f0621c
File name: Gecko iPhone Toolkit.exe
Detection ratio: 0 / 66
Analysis date: 2018-07-09 21:39:45 UTC ( 5 days, 21 hours ago )
Antivirus Result Update
Ad-Aware 20180709
AegisLab 20180709
AhnLab-V3 20180709
Alibaba 20180709
ALYac 20180709
Antiy-AVL 20180709
Arcabit 20180709
Avast 20180709
Avast-Mobile 20180709
AVG 20180709
Avira (no cloud) 20180709
AVware 20180709
Babable 20180406
Baidu 20180709
BitDefender 20180709
Bkav 20180706
CAT-QuickHeal 20180709
ClamAV 20180709
CMC 20180709
Comodo 20180709
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180709
Cyren 20180709
DrWeb 20180709
eGambit 20180709
Emsisoft 20180709
Endgame 20180612
ESET-NOD32 20180709
F-Prot 20180709
F-Secure 20180709
Fortinet 20180709
GData 20180709
Ikarus 20180709
Sophos ML 20180601
Jiangmin 20180709
K7AntiVirus 20180709
K7GW 20180709
Kaspersky 20180709
Kingsoft 20180709
Malwarebytes 20180709
MAX 20180709
McAfee 20180709
McAfee-GW-Edition 20180709
Microsoft 20180709
eScan 20180709
NANO-Antivirus 20180709
Palo Alto Networks (Known Signatures) 20180709
Panda 20180709
Qihoo-360 20180709
Rising 20180709
SentinelOne (Static ML) 20180701
Sophos AV 20180709
SUPERAntiSpyware 20180709
Symantec 20180709
TACHYON 20180709
Tencent 20180709
TheHacker 20180709
TrendMicro 20180709
TrendMicro-HouseCall 20180709
Trustlook 20180709
VBA32 20180709
VIPRE 20180709
ViRobot 20180709
Webroot 20180709
Yandex 20180709
Zillya 20180709
ZoneAlarm by Check Point 20180709
Zoner 20180708
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT appended, 7Z
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-06-27 07:06:38
Entry Point 0x00011DEF
Number of sections 4
PE sections
Overlays
MD5 a4149ab0832a39c9cc89cd5039d31030
File type data
Offset 186880
Size 54358222
Entropy 8.00
PE imports
GetDeviceCaps
GetCurrentObject
DeleteDC
CreateFontIndirectW
SelectObject
StretchBlt
GetObjectW
SetStretchBltMode
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetUserDefaultUILanguage
SetThreadLocale
GetLastError
InitializeCriticalSection
GetStdHandle
GetDriveTypeW
ReadFile
TerminateThread
lstrlenA
lstrcmpiA
GlobalFree
WaitForSingleObject
GetVersionExW
SetEvent
ExitProcess
SystemTimeToFileTime
lstrcpyW
LoadLibraryA
GetCommandLineW
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetStartupInfoA
EnterCriticalSection
SizeofResource
CompareFileTime
GetDiskFreeSpaceExW
GetFileSize
SetLastError
LockResource
SetFileTime
lstrlenW
CreateThread
GetSystemDefaultLCID
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetLocaleInfoW
SuspendThread
GetModuleFileNameW
SetFilePointer
FindResourceExA
SetFileAttributesW
GetSystemDirectoryW
WideCharToMultiByte
RemoveDirectoryW
ExpandEnvironmentStringsW
GetSystemDefaultUILanguage
FindNextFileW
WriteFile
MulDiv
GetSystemTimeAsFileTime
FindFirstFileW
GlobalMemoryStatusEx
lstrcmpW
WaitForMultipleObjects
GetModuleHandleW
LocalFree
FormatMessageW
ResumeThread
CreateEventW
GetExitCodeThread
ResetEvent
lstrcmpiW
SetCurrentDirectoryW
LoadResource
GetTempPathW
CreateFileW
GlobalAlloc
VirtualFree
FindClose
lstrcatW
Sleep
IsBadReadPtr
SetEndOfFile
LeaveCriticalSection
VirtualAlloc
GetEnvironmentVariableW
GetModuleHandleA
CloseHandle
strncmp
__p__fmode
malloc
??1type_info@@UAE@XZ
memset
_wcsnicmp
__dllonexit
_controlfp
_except_handler3
??2@YAPAXI@Z
_onexit
_wtol
exit
_XcptFilter
memcmp
__setusermatherr
_adjust_fdiv
_acmdln
_CxxThrowException
__p__commode
??3@YAXPAX@Z
memcpy
free
__getmainargs
_purecall
_initterm
memmove
_beginthreadex
_exit
_EH_prolog
__set_app_type
OleLoadPicture
VariantClear
SysAllocString
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
ShellExecuteExW
SHGetFileInfoW
SHGetSpecialFolderPathW
SHGetMalloc
SetFocus
ClientToScreen
GetParent
EndDialog
SystemParametersInfoW
DefWindowProcW
KillTimer
GetMessageW
ShowWindow
MessageBeep
SetWindowPos
GetClassNameA
wvsprintfW
GetSystemMetrics
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
EnableWindow
GetDC
CharUpperW
MessageBoxA
LoadIconW
GetWindowDC
GetWindow
GetSysColor
DispatchMessageW
GetKeyState
ReleaseDC
GetMenu
GetWindowLongW
DrawIconEx
GetClientRect
GetDlgItem
DrawTextW
CallWindowProcW
EnableMenuItem
ScreenToClient
wsprintfA
SetTimer
LoadImageW
DialogBoxIndirectParamW
SetWindowTextW
GetWindowTextW
GetSystemMenu
GetWindowTextLengthW
CreateWindowExW
wsprintfW
CopyImage
DestroyWindow
CreateStreamOnHGlobal
CoCreateInstance
CoInitialize
Number of PE resources by type
RT_ICON 5
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 6
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2010:06:27 08:06:38+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
70656

LinkerVersion
8.0

FileTypeExtension
exe

InitializedDataSize
115712

SubsystemVersion
4.0

EntryPoint
0x11def

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 d2ce7511ea637ba5318b50e23e378eb8
SHA1 7b0eb810d3bacb1dec45d992f6006f9f294186dd
SHA256 c1c7c679ede8064459c1d7b95cdbbf1a5b05d514ab5b8104adac080f92f0621c
ssdeep
1572864:XPLe06pavtmXhBoCD506o4oUexiLJ+RRJX:XTB1tY2y0k7sRJX

authentihash f62146a27b3afa914d601363d6b6b62dbd126821553229a1e642320219720997
imphash b5a014d7eeb4c2042897567e1288a095
File size 52.0 MB ( 54545102 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2013-04-10 00:27:04 UTC ( 5 years, 3 months ago )
Last submission 2018-07-09 21:39:45 UTC ( 5 days, 21 hours ago )
File names Gecko+iPhone+Toolkit.exe
Gecko iPhone Toolkit_2_mobilestan.net.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit(1).exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit_REV01.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit (1).exe
Gecko+iPhone+Toolkit.exe
Gecko iPhone Toolkit_2.exe
Gecko iPhone Toolkit.exe
GiT.exe
Gecko iPhone Toolkit.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!