× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cd3610dfbdf23606010fe5705ea6ef3af230f16d5e1256c0109ecbf421c2f89a
File name: 8fafa0d85de203b30015774b37b815d6.virus
Detection ratio: 32 / 57
Analysis date: 2016-09-18 18:22:55 UTC ( 2 years, 6 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.91687 20160918
AegisLab Troj.Downloader.W32.Agent.l2pS 20160918
AhnLab-V3 Malware/Win32.Generic.N2107894885 20160918
ALYac Gen:Variant.Razy.91687 20160918
Arcabit Trojan.Razy.D16627 20160917
Avast Win32:Malware-gen 20160918
AVG Crypt5.CMJG 20160918
Avira (no cloud) TR/Crypt.Xpack.yoscc 20160918
Baidu Win32.Trojan.WisdomEyes.151026.9950.9999 20160914
BitDefender Gen:Variant.Razy.91687 20160918
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20160725
DrWeb Trojan.Inject2.27922 20160918
Emsisoft Gen:Variant.Razy.91687 (B) 20160918
ESET-NOD32 a variant of Win32/Kryptik.FFLU 20160918
F-Secure Gen:Variant.Razy.91687 20160918
Fortinet W32/Generic.AP.1A13A!tr 20160918
GData Gen:Variant.Razy.91687 20160918
Ikarus Trojan-Downloader.Win32.Agent 20160918
Sophos ML generic.a 20160917
Kaspersky UDS:DangerousObject.Multi.Generic 20160918
Malwarebytes Trojan.Crypt 20160918
McAfee Artemis!8FAFA0D85DE2 20160918
McAfee-GW-Edition BehavesLike.Win32.Backdoor.ch 20160918
Microsoft TrojanDownloader:Win32/Talalpek.A 20160918
eScan Gen:Variant.Razy.91687 20160918
Panda Trj/GdSda.A 20160918
Qihoo-360 HEUR/QVM20.1.0000.Malware.Gen 20160918
Rising Malware.Generic!Ok1SHy0yGSE@2 (thunder) 20160918
Symantec Trojan.Gen 20160918
Tencent Win32.Trojan.Kryptik.Efbr 20160918
TrendMicro TROJ_GEN.R0C1C0DI316 20160918
TrendMicro-HouseCall TROJ_GEN.R0C1C0DI316 20160918
Alibaba 20160918
Antiy-AVL 20160918
AVware 20160918
Bkav 20160917
CAT-QuickHeal 20160917
ClamAV 20160916
CMC 20160916
Comodo 20160916
Cyren 20160918
F-Prot 20160918
Jiangmin 20160918
K7AntiVirus 20160918
K7GW 20160918
Kingsoft 20160918
NANO-Antivirus 20160918
nProtect 20160918
Sophos AV 20160918
SUPERAntiSpyware 20160918
TheHacker 20160918
VBA32 20160917
VIPRE 20160918
ViRobot 20160918
Yandex 20160917
Zillya 20160915
Zoner 20160918
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Ste@lth PE 1.01 -> BGCorp
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-07-14 10:54:05
Entry Point 0x0000A43A
Number of sections 3
PE sections
PE imports
CoCreateActivity
RecycleSurrogate
CoLoadServices
CoEnterServiceDomain
SafeRef
CryptUnprotectData
CertGetNameStringA
CertDuplicateStore
CryptMsgUpdate
CertNameToStrW
CertControlStore
CertFindChainInStore
CryptMsgClose
CryptEncodeObject
CryptEncryptMessage
CertOpenSystemStoreA
CertSetStoreProperty
CryptSignMessage
CryptFormatObject
CertGetStoreProperty
GetStdHandle
CreateWaitableTimerW
GetFileAttributesA
WaitForSingleObject
GetTickCount
RemoveDirectoryA
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryA
CreateDirectoryW
DeleteFileW
GetProcAddress
lstrcpynW
MapViewOfFile
GetModuleHandleA
GetSystemDirectoryW
WriteFile
EnumResourceNamesA
CloseHandle
FindNextFileA
HeapReAlloc
GetStringTypeW
GetBinaryTypeA
GetFullPathNameA
GetExpandedNameW
GetEnvironmentVariableA
CreateEventA
InterlockedDecrement
CreateFileA
GetNumberFormatW
SetLastError
GetVolumeNameForVolumeMountPointW
InvokeControlPanel
drvSetDefaultCommConfigA
drvCommConfigDialogA
CPEncrypt
CPDeriveKey
CPDecrypt
CPCreateHash
SHGetFileInfoA
SHGetFolderPathW
DragFinish
SHDefExtractIconA
ExtractIconA
DragQueryFileA
ExtractIconExW
SHOpenFolderAndSelectItems
FindExecutableW
SHInvokePrinterCommandA
SHSetLocalizedName
SHGetDesktopFolder
ShellAboutA
SHGetSpecialFolderPathW
SHFileOperationA
SHGetFolderLocation
SHBrowseForFolderW
UrlCreateFromPathA
UrlCombineA
UrlCompareA
UrlGetLocationW
PathCombineA
UrlEscapeW
UrlIsNoHistoryA
PathCommonPrefixA
PathIsRootA
UrlGetPartA
UrlCanonicalizeW
Chkdsk
FormatEx
Extend
Format
GetThemeRect
DrawThemeIcon
GetThemeIntList
SetThemeAppProperties
GetThemeTextExtent
EnableThemeDialogTexture
OpenThemeData
DrawThemeParentBackground
DrawThemeBackground
GetThemePartSize
GetThemeTextMetrics
Number of PE resources by type
RT_DIALOG 1
Number of PE resources by language
NEUTRAL 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:07:14 11:54:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
129536

LinkerVersion
7.0

FileTypeExtension
exe

InitializedDataSize
45056

SubsystemVersion
5.1

EntryPoint
0xa43a

OSVersion
5.1

ImageVersion
5.1

UninitializedDataSize
0

File identification
MD5 8fafa0d85de203b30015774b37b815d6
SHA1 d49222420477570e1f339efd9dfb2c0b47649814
SHA256 cd3610dfbdf23606010fe5705ea6ef3af230f16d5e1256c0109ecbf421c2f89a
ssdeep
3072:QHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHu0W1lV+bZPquyA9UEzsbhyPNHznv8U5:QHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHr

authentihash 312a613e3fb0928fc8b5388d06d75e141cec0f523d137e175ba23b83cf5b9edf
imphash a7b39106d6b6bf4b94cc53feb0e0d101
File size 171.5 KB ( 175616 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.5%)
Tags
peexe stealth

VirusTotal metadata
First submission 2016-09-18 18:22:55 UTC ( 2 years, 6 months ago )
Last submission 2016-09-18 18:22:55 UTC ( 2 years, 6 months ago )
File names 8fafa0d85de203b30015774b37b815d6.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications