× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ccd42263588338e54dfb16cf77b066ec98f789453e0a9d2c74f7c03ec9555439
File name: ccd42263588338e54dfb16cf77b066ec98f789453e0a9d2c74f7c03ec9555439
Detection ratio: 49 / 68
Analysis date: 2018-01-14 11:42:30 UTC ( 1 year, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Agent.CSVT 20180114
AegisLab Troj.W32.Refinka!c 20180114
AhnLab-V3 Backdoor/Win32.Poison.R217323 20180114
ALYac Trojan.Agent.CSVT 20180114
Antiy-AVL Trojan/Win32.Refinka 20180114
Arcabit Trojan.Agent.CSVT 20180114
Avast Win32:Malware-gen 20180114
AVG Win32:Malware-gen 20180114
Avira (no cloud) TR/Crypt.XPACK.Gen 20180113
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180112
BitDefender Trojan.Agent.CSVT 20180114
Bkav HW32.Packed.333F 20180112
CAT-QuickHeal Trojan.Refinka 20180113
Comodo TrojWare.Win32.Refinka.G 20180114
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cylance Unsafe 20180114
DrWeb Trojan.MulDrop7.55102 20180114
Emsisoft Trojan.Agent.CSVT (B) 20180114
Endgame malicious (high confidence) 20171130
ESET-NOD32 a variant of Win32/Kryptik.GBHG 20180114
F-Secure Trojan.Agent.CSVT 20180114
Fortinet W32/GenKryptik.BJHM!tr 20180114
GData Trojan.Agent.CSVT 20180114
Ikarus Backdoor.Poison 20180114
Sophos ML heuristic 20170914
Jiangmin Trojan.Refinka.aps 20180114
K7AntiVirus Trojan ( 00522fec1 ) 20180114
K7GW Trojan ( 00522fec1 ) 20180112
Kaspersky Trojan.Win32.Refinka.ocw 20180114
Malwarebytes Trojan.MalPack 20180114
MAX malware (ai score=99) 20180114
McAfee Artemis!FE9FD8C3CBA0 20180114
McAfee-GW-Edition BehavesLike.Win32.Ransomware.cc 20180114
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180114
eScan Trojan.Agent.CSVT 20180114
NANO-Antivirus Trojan.Win32.Kryptik.ewsrku 20180114
Palo Alto Networks (Known Signatures) generic.ml 20180114
Panda Trj/Genetic.gen 20180114
Qihoo-360 Win32/Trojan.b57 20180114
Rising Trojan.Kryptik!1.AE8C (CLASSIC) 20180114
SentinelOne (Static ML) static engine - malicious 20171224
Sophos AV Mal/Generic-S 20180114
Symantec Packed.Generic.493 20180113
Tencent Win32.Trojan.Refinka.Egyh 20180114
TrendMicro TROJ_GEN.R004C0OAB18 20180114
TrendMicro-HouseCall TROJ_GEN.R004C0OAB18 20180114
VIPRE Trojan.Win32.Generic!BT 20180114
ViRobot Trojan.Win32.Z.Refinka.165888.S 20180113
ZoneAlarm by Check Point Trojan.Win32.Refinka.ocw 20180114
Alibaba 20180114
Avast-Mobile 20180114
AVware 20180103
ClamAV 20180114
CMC 20180114
Cybereason 20171103
Cyren 20180114
eGambit 20180114
F-Prot 20180114
Kingsoft 20180114
nProtect 20180114
SUPERAntiSpyware 20180114
Symantec Mobile Insight 20180112
TheHacker 20180114
TotalDefense 20180114
Trustlook 20180114
VBA32 20180112
Webroot 20180114
WhiteArmor 20180110
Yandex 20180112
Zillya 20180112
Zoner 20180114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-06-09 09:13:41
Entry Point 0x00001004
Number of sections 4
PE sections
PE imports
CADeleteCA
CAEnumNextCA
CACloseCA
CACloseCertType
CmMalloc
CmRealloc
MoveFileA
EnterCriticalSection
lstrlen
OpenFileMappingW
GetSystemDirectoryW
WaitForSingleObject
GetCommandLineW
lstrcat
SearchPathA
GetDateFormatW
LoadLibraryExW
CreateMailslotA
LoadLibraryA
GetProcAddress
GetShortPathNameA
GetCurrentThread
TraceSQLCancel
TraceSQLFetch
TraceSQLError
TraceSQLConnect
PathCompactPathW
UrlCreateFromPathA
UrlUnescapeW
PathCommonPrefixW
UrlIsA
PathIsRootA
UrlEscapeW
UrlHashA
UrlCanonicalizeW
UrlGetLocationA
UrlCompareW
InsertMenuA
wsprintfA
LoadIconA
CharToOemW
LoadMenuA
DrawStateA
GetDlgItemTextA
LoadCursorW
CreateWindowExW
DialogBoxParamA
FindWindowA
IsCharLowerW
GetPropA
LoadBitmapA
PeekMessageW
Number of PE resources by type
RT_DIALOG 1
Number of PE resources by language
NEUTRAL 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:06:09 10:13:41+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
145920

LinkerVersion
36.35

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x1004

InitializedDataSize
18944

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 fe9fd8c3cba07346ea65eef0655947a5
SHA1 1be770213f600e216248eb8e744fc70c5df2864d
SHA256 ccd42263588338e54dfb16cf77b066ec98f789453e0a9d2c74f7c03ec9555439
ssdeep
3072:01sTaMlxJXtfuNedZCc+RgQN9vxA71cOonptSd6E0JSp3XdVw9fd:1T6Ggc++QN9ve71J8pgd6E0JSpc

authentihash 48257cdab20602541e926ffe10c905b4eaae878fb7a11689d5826e46199f9f21
imphash 54de2cf4996a400a5d3c7aea077a2da1
File size 162.0 KB ( 165888 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-01-11 21:25:12 UTC ( 1 year, 3 months ago )
Last submission 2018-01-14 11:42:30 UTC ( 1 year, 3 months ago )
File names fe9fd8c3cba07346ea65eef0655947a5.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs