× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c1c7c679ede8064459c1d7b95cdbbf1a5b05d514ab5b8104adac080f92f0621c
File name: Gecko iPhone Toolkit.exe
Detection ratio: 0 / 66
Analysis date: 2017-11-28 16:37:05 UTC ( 1 month, 3 weeks ago )
Antivirus Result Update
Ad-Aware 20171128
AegisLab 20171128
AhnLab-V3 20171128
Alibaba 20171128
ALYac 20171128
Antiy-AVL 20171128
Arcabit 20171128
Avast 20171128
Avast-Mobile 20171128
AVG 20171128
Avira (no cloud) 20171128
AVware 20171128
Baidu 20171127
BitDefender 20171128
Bkav 20171128
CAT-QuickHeal 20171127
ClamAV 20171128
CMC 20171126
Comodo 20171128
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171128
Cyren 20171128
DrWeb 20171128
eGambit 20171128
Emsisoft 20171128
Endgame 20171024
ESET-NOD32 20171128
F-Prot 20171128
F-Secure 20171128
Fortinet 20171128
GData 20171128
Ikarus 20171128
Sophos ML 20170914
Jiangmin 20171128
K7AntiVirus 20171128
K7GW 20171128
Kaspersky 20171128
Kingsoft 20171128
Malwarebytes 20171128
MAX 20171128
McAfee 20171128
McAfee-GW-Edition 20171128
Microsoft 20171128
eScan 20171128
NANO-Antivirus 20171128
nProtect 20171128
Palo Alto Networks (Known Signatures) 20171128
Panda 20171128
Qihoo-360 20171128
Rising 20171128
SentinelOne (Static ML) 20171113
Sophos AV 20171128
SUPERAntiSpyware 20171128
Symantec 20171128
Symantec Mobile Insight 20171124
Tencent 20171128
TheHacker 20171126
TrendMicro 20171128
TrendMicro-HouseCall 20171128
Trustlook 20171128
VBA32 20171128
VIPRE 20171128
ViRobot 20171128
Webroot 20171128
WhiteArmor 20171104
Yandex 20171120
Zillya 20171128
ZoneAlarm by Check Point 20171128
Zoner 20171128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT appended, 7Z
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-06-27 07:06:38
Entry Point 0x00011DEF
Number of sections 4
PE sections
Overlays
MD5 a4149ab0832a39c9cc89cd5039d31030
File type data
Offset 186880
Size 54358222
Entropy 8.00
PE imports
GetDeviceCaps
GetCurrentObject
DeleteDC
CreateFontIndirectW
SelectObject
StretchBlt
GetObjectW
SetStretchBltMode
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetUserDefaultUILanguage
SetThreadLocale
GetLastError
InitializeCriticalSection
GetStdHandle
GetDriveTypeW
ReadFile
TerminateThread
lstrlenA
lstrcmpiA
GlobalFree
WaitForSingleObject
GetVersionExW
SetEvent
ExitProcess
SystemTimeToFileTime
lstrcpyW
LoadLibraryA
GetCommandLineW
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetStartupInfoA
EnterCriticalSection
SizeofResource
CompareFileTime
GetDiskFreeSpaceExW
GetFileSize
SetLastError
LockResource
SetFileTime
lstrlenW
CreateThread
GetSystemDefaultLCID
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetLocaleInfoW
SuspendThread
GetModuleFileNameW
SetFilePointer
FindResourceExA
SetFileAttributesW
GetSystemDirectoryW
WideCharToMultiByte
RemoveDirectoryW
ExpandEnvironmentStringsW
GetSystemDefaultUILanguage
FindNextFileW
WriteFile
MulDiv
GetSystemTimeAsFileTime
FindFirstFileW
GlobalMemoryStatusEx
lstrcmpW
WaitForMultipleObjects
GetModuleHandleW
LocalFree
FormatMessageW
ResumeThread
CreateEventW
GetExitCodeThread
ResetEvent
lstrcmpiW
SetCurrentDirectoryW
LoadResource
GetTempPathW
CreateFileW
GlobalAlloc
VirtualFree
FindClose
lstrcatW
Sleep
IsBadReadPtr
SetEndOfFile
LeaveCriticalSection
VirtualAlloc
GetEnvironmentVariableW
GetModuleHandleA
CloseHandle
strncmp
__p__fmode
malloc
??1type_info@@UAE@XZ
memset
_wcsnicmp
__dllonexit
_controlfp
_except_handler3
??2@YAPAXI@Z
_onexit
_wtol
exit
_XcptFilter
memcmp
__setusermatherr
_adjust_fdiv
_acmdln
_CxxThrowException
__p__commode
??3@YAXPAX@Z
memcpy
free
__getmainargs
_purecall
_initterm
memmove
_beginthreadex
_exit
_EH_prolog
__set_app_type
OleLoadPicture
VariantClear
SysAllocString
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
ShellExecuteExW
SHGetFileInfoW
SHGetSpecialFolderPathW
SHGetMalloc
SetFocus
ClientToScreen
GetParent
EndDialog
SystemParametersInfoW
DefWindowProcW
KillTimer
GetMessageW
ShowWindow
MessageBeep
SetWindowPos
GetClassNameA
wvsprintfW
GetSystemMetrics
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
EnableWindow
GetDC
CharUpperW
MessageBoxA
LoadIconW
GetWindowDC
GetWindow
GetSysColor
DispatchMessageW
GetKeyState
ReleaseDC
GetMenu
GetWindowLongW
DrawIconEx
GetClientRect
GetDlgItem
DrawTextW
CallWindowProcW
EnableMenuItem
ScreenToClient
wsprintfA
SetTimer
LoadImageW
DialogBoxIndirectParamW
SetWindowTextW
GetWindowTextW
GetSystemMenu
GetWindowTextLengthW
CreateWindowExW
wsprintfW
CopyImage
DestroyWindow
CreateStreamOnHGlobal
CoCreateInstance
CoInitialize
Number of PE resources by type
RT_ICON 5
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 6
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2010:06:27 08:06:38+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
70656

LinkerVersion
8.0

FileTypeExtension
exe

InitializedDataSize
115712

SubsystemVersion
4.0

EntryPoint
0x11def

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 d2ce7511ea637ba5318b50e23e378eb8
SHA1 7b0eb810d3bacb1dec45d992f6006f9f294186dd
SHA256 c1c7c679ede8064459c1d7b95cdbbf1a5b05d514ab5b8104adac080f92f0621c
ssdeep
1572864:XPLe06pavtmXhBoCD506o4oUexiLJ+RRJX:XTB1tY2y0k7sRJX

authentihash f62146a27b3afa914d601363d6b6b62dbd126821553229a1e642320219720997
imphash b5a014d7eeb4c2042897567e1288a095
File size 52.0 MB ( 54545102 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Generic Win/DOS Executable (50.0%)
DOS Executable Generic (49.9%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2013-04-10 00:27:04 UTC ( 4 years, 9 months ago )
Last submission 2017-11-28 16:37:05 UTC ( 1 month, 3 weeks ago )
File names Gecko+iPhone+Toolkit.exe
Gecko iPhone Toolkit_2_mobilestan.net.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit(1).exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit_REV01.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit (1).exe
Gecko+iPhone+Toolkit.exe
Gecko iPhone Toolkit_2.exe
Gecko iPhone Toolkit.exe
GiT.exe
Gecko iPhone Toolkit.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!