× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cdb7b330cc3919f29a517cbf46ac5e1fd4a2554003a5ba4a74fd1dff616be817
File name: 004960568
Detection ratio: 50 / 56
Analysis date: 2015-07-27 16:03:01 UTC ( 1 week, 1 day ago )
Antivirus Result Update
ALYac Trojan.Agent.AYWT 20150727
AVG Downloader.Generic13.WTY 20150727
AVware Trojan.Win32.Generic!BT 20150727
Ad-Aware Trojan.Agent.AYWT 20150727
Agnitum Trojan.DL.Zortob!HScL7Ih7HXc 20150727
AhnLab-V3 Win-Trojan/Wildcoe.32768 20150727
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20150727
Arcabit Trojan.Agent.AYWT 20150727
Avast Win32:Trojan-gen 20150727
Avira TR/Graftor.62708.1 20150727
Baidu-International Trojan.Win32.Kuluoz.afx 20150727
BitDefender Trojan.Agent.AYWT 20150727
CAT-QuickHeal TrojanDownloader.Kuluoz.rw3 20150727
Comodo TrojWare.Win32.Trojan.Agent.Gen 20150727
Cyren W32/Kuluoz.VNDL-3956 20150727
DrWeb BackDoor.Kuluoz.3 20150727
ESET-NOD32 Win32/TrojanDownloader.Zortob.B 20150727
Emsisoft Trojan.Agent.AYWT (B) 20150727
F-Prot W32/Kuluoz.I 20150727
F-Secure Trojan.Agent.AYWT 20150727
Fortinet W32/Kuluoz.AFX!tr.dldr 20150727
GData Trojan.Agent.AYWT 20150727
Ikarus Trojan-Downloader.Win32.Kuluoz 20150727
Jiangmin TrojanDownloader.Kuluoz.fx 20150726
K7AntiVirus Riskware ( 0040eff71 ) 20150727
K7GW Riskware ( 0040eff71 ) 20150727
Kaspersky Trojan-Downloader.Win32.Kuluoz.afx 20150727
Kingsoft Win32.Malware.Generic.a.(kcloud) 20150727
Malwarebytes Email.FakeMS 20150727
McAfee Generic.oa 20150727
McAfee-GW-Edition Generic.oa 20150726
MicroWorld-eScan Trojan.Agent.AYWT 20150727
Microsoft TrojanDownloader:Win32/Kuluoz.B 20150727
NANO-Antivirus Trojan.Win32.Kuluoz.bghnwg 20150727
Panda Trj/OCJ.C 20150727
Qihoo-360 HEUR/Malware.QVM11.Gen 20150727
Rising PE:Trojan.Win32.Generic.13F170C0!334590144 20150722
Sophos Mal/EncPk-ABL 20150727
Symantec Trojan.Smoaler 20150727
Tencent Win32.Trojan-downloader.Kuluoz.Hsit 20150727
TheHacker Posible_Worm32 20150723
TotalDefense Win32/Kuluoz.EJ 20150727
TrendMicro TROJ_KULUOZ.GA 20150727
TrendMicro-HouseCall TROJ_KULUOZ.GA 20150727
VBA32 BScope.Trojan-Dropper.8612 20150727
VIPRE Trojan.Win32.Generic!BT 20150727
ViRobot Trojan.Win32.A.Downloader.32768.CCD[UPX][h] 20150727
Zillya Downloader.Kuluoz.Win32.163 20150727
Zoner Trojan.Zortob.B 20150727
nProtect Trojan-Downloader/W32.Kuluoz.32768.B 20150727
AegisLab 20150727
Alibaba 20150727
Bkav 20150727
ByteHero 20150727
ClamAV 20150727
SUPERAntiSpyware 20150727
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-28 07:33:00
Link date 8:33 AM 12/28/2012
Entry Point 0x00022350
Number of sections 3
PE sections
PE imports
RegCreateKeyA
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
DeleteMenu
Ord(269)
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 2
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:12:28 08:33:00+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
32768

LinkerVersion
7.1

EntryPoint
0x22350

InitializedDataSize
4096

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
106496

Compressed bundles
File identification
MD5 25c3f5406f88bc64d3652f2446cd39be
SHA1 b951ea96d4bf451c5f1e8ba6f14dbe1b361be767
SHA256 cdb7b330cc3919f29a517cbf46ac5e1fd4a2554003a5ba4a74fd1dff616be817
ssdeep
768:Uy5Eu1m5ACV2P0V04jZXbIEtL3OXo62IWXDL:bFoV4ijFhtOtrKf

authentihash c0b18658d0f73c8e4b48f522a90ecc36991a504a3bb0d1374d842760494a19ad
imphash a46e277f4ae4ef1079f20abdad0cb0cb
File size 32.0 KB ( 32768 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2012-12-28 08:58:11 UTC ( 2 years, 7 months ago )
Last submission 2015-06-12 09:48:45 UTC ( 1 month, 3 weeks ago )
File names 25c3f5406f88bc64d3652f2446cd39be
1373502.malware
file-4989923_exe
25c3f5406f88bc64d3652f2446cd39be.exe
CV .exe
smona_cdb7b330cc3919f29a517cbf46ac5e1fd4a2554003a5ba4a74fd1dff616be817.bin
PostalReceipt.exe
822546.malware
004960568
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!