× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c1c7c679ede8064459c1d7b95cdbbf1a5b05d514ab5b8104adac080f92f0621c
File name: Gecko iPhone Toolkit.exe
Detection ratio: 0 / 67
Analysis date: 2018-08-16 03:51:52 UTC ( 3 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware 20180816
AegisLab 20180816
AhnLab-V3 20180816
Alibaba 20180713
ALYac 20180816
Antiy-AVL 20180816
Arcabit 20180816
Avast 20180816
Avast-Mobile 20180816
AVG 20180816
Avira (no cloud) 20180815
AVware 20180816
Babable 20180725
Baidu 20180816
BitDefender 20180816
Bkav 20180816
CAT-QuickHeal 20180814
ClamAV 20180816
CMC 20180812
Comodo 20180815
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180816
Cyren 20180816
DrWeb 20180816
eGambit 20180816
Emsisoft 20180816
Endgame 20180730
ESET-NOD32 20180816
F-Prot 20180816
F-Secure 20180816
Fortinet 20180816
GData 20180816
Ikarus 20180815
Sophos ML 20180717
Jiangmin 20180815
K7AntiVirus 20180815
K7GW 20180815
Kaspersky 20180816
Kingsoft 20180816
Malwarebytes 20180815
MAX 20180816
McAfee 20180816
McAfee-GW-Edition 20180816
Microsoft 20180815
eScan 20180816
NANO-Antivirus 20180816
Palo Alto Networks (Known Signatures) 20180816
Panda 20180815
Qihoo-360 20180816
Rising 20180816
SentinelOne (Static ML) 20180701
Sophos AV 20180816
SUPERAntiSpyware 20180816
Symantec 20180816
Symantec Mobile Insight 20180814
TACHYON 20180816
Tencent 20180816
TheHacker 20180815
TrendMicro 20180816
TrendMicro-HouseCall 20180816
Trustlook 20180816
VBA32 20180815
VIPRE 20180816
ViRobot 20180815
Webroot 20180816
Yandex 20180815
Zillya 20180815
ZoneAlarm by Check Point 20180816
Zoner 20180815
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT appended, 7Z
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-06-27 07:06:38
Entry Point 0x00011DEF
Number of sections 4
PE sections
Overlays
MD5 a4149ab0832a39c9cc89cd5039d31030
File type data
Offset 186880
Size 54358222
Entropy 8.00
PE imports
GetDeviceCaps
GetCurrentObject
DeleteDC
CreateFontIndirectW
SelectObject
StretchBlt
GetObjectW
SetStretchBltMode
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetUserDefaultUILanguage
SetThreadLocale
GetLastError
InitializeCriticalSection
GetStdHandle
GetDriveTypeW
ReadFile
TerminateThread
lstrlenA
lstrcmpiA
GlobalFree
WaitForSingleObject
GetVersionExW
SetEvent
ExitProcess
SystemTimeToFileTime
lstrcpyW
LoadLibraryA
GetCommandLineW
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetStartupInfoA
EnterCriticalSection
SizeofResource
CompareFileTime
GetDiskFreeSpaceExW
GetFileSize
SetLastError
LockResource
SetFileTime
lstrlenW
CreateThread
GetSystemDefaultLCID
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetLocaleInfoW
SuspendThread
GetModuleFileNameW
SetFilePointer
FindResourceExA
SetFileAttributesW
GetSystemDirectoryW
WideCharToMultiByte
RemoveDirectoryW
ExpandEnvironmentStringsW
GetSystemDefaultUILanguage
FindNextFileW
WriteFile
MulDiv
GetSystemTimeAsFileTime
FindFirstFileW
GlobalMemoryStatusEx
lstrcmpW
WaitForMultipleObjects
GetModuleHandleW
LocalFree
FormatMessageW
ResumeThread
CreateEventW
GetExitCodeThread
ResetEvent
lstrcmpiW
SetCurrentDirectoryW
LoadResource
GetTempPathW
CreateFileW
GlobalAlloc
VirtualFree
FindClose
lstrcatW
Sleep
IsBadReadPtr
SetEndOfFile
LeaveCriticalSection
VirtualAlloc
GetEnvironmentVariableW
GetModuleHandleA
CloseHandle
strncmp
__p__fmode
malloc
??1type_info@@UAE@XZ
memset
_wcsnicmp
__dllonexit
_controlfp
_except_handler3
??2@YAPAXI@Z
_onexit
_wtol
exit
_XcptFilter
memcmp
__setusermatherr
_adjust_fdiv
_acmdln
_CxxThrowException
__p__commode
??3@YAXPAX@Z
memcpy
free
__getmainargs
_purecall
_initterm
memmove
_beginthreadex
_exit
_EH_prolog
__set_app_type
OleLoadPicture
VariantClear
SysAllocString
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
ShellExecuteExW
SHGetFileInfoW
SHGetSpecialFolderPathW
SHGetMalloc
SetFocus
ClientToScreen
GetParent
EndDialog
SystemParametersInfoW
DefWindowProcW
KillTimer
GetMessageW
ShowWindow
MessageBeep
SetWindowPos
GetClassNameA
wvsprintfW
GetSystemMetrics
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
EnableWindow
GetDC
CharUpperW
MessageBoxA
LoadIconW
GetWindowDC
GetWindow
GetSysColor
DispatchMessageW
GetKeyState
ReleaseDC
GetMenu
GetWindowLongW
DrawIconEx
GetClientRect
GetDlgItem
DrawTextW
CallWindowProcW
EnableMenuItem
ScreenToClient
wsprintfA
SetTimer
LoadImageW
DialogBoxIndirectParamW
SetWindowTextW
GetWindowTextW
GetSystemMenu
GetWindowTextLengthW
CreateWindowExW
wsprintfW
CopyImage
DestroyWindow
CreateStreamOnHGlobal
CoCreateInstance
CoInitialize
Number of PE resources by type
RT_ICON 5
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
RUSSIAN 6
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2010:06:27 08:06:38+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
70656

LinkerVersion
8.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x11def

InitializedDataSize
115712

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 d2ce7511ea637ba5318b50e23e378eb8
SHA1 7b0eb810d3bacb1dec45d992f6006f9f294186dd
SHA256 c1c7c679ede8064459c1d7b95cdbbf1a5b05d514ab5b8104adac080f92f0621c
ssdeep
1572864:XPLe06pavtmXhBoCD506o4oUexiLJ+RRJX:XTB1tY2y0k7sRJX

authentihash f62146a27b3afa914d601363d6b6b62dbd126821553229a1e642320219720997
imphash b5a014d7eeb4c2042897567e1288a095
File size 52.0 MB ( 54545102 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2013-04-10 00:27:04 UTC ( 5 years, 8 months ago )
Last submission 2018-07-09 21:39:45 UTC ( 5 months ago )
File names Gecko+iPhone+Toolkit.exe
Gecko iPhone Toolkit_2_mobilestan.net.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit(1).exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit_REV01.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit.exe
Gecko iPhone Toolkit (1).exe
Gecko+iPhone+Toolkit.exe
Gecko iPhone Toolkit_2.exe
Gecko iPhone Toolkit.exe
GiT.exe
Gecko iPhone Toolkit.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!