× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d0431537537c9c73f5a1b90b46b560cac4be82feb5ac14d47163a9f4b4fa1a41
File name: 56y4g45gh45h
Detection ratio: 56 / 62
Analysis date: 2017-08-21 05:02:00 UTC ( 2 months ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.3055845 20170821
AegisLab W32.W.Palevo.mCAk 20170821
AhnLab-V3 Trojan/Win32.Locky.C1328255 20170821
ALYac Trojan.Ransom.LockyCrypt 20170820
Antiy-AVL Trojan/Win32.Reconyc 20170821
Arcabit Trojan.Generic.D2EA0E5 20170821
Avast Win32:Numeriq-BY [Trj] 20170821
AVG Win32:Numeriq-BY [Trj] 20170821
Avira (no cloud) TR/ATRAPS.odiyd 20170820
AVware Trojan.Win32.Generic!BT 20170821
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170817
BitDefender Trojan.GenericKD.3055845 20170821
CAT-QuickHeal Ransom.Locky.AV6 20170819
Comodo TrojWare.Win32.Agent.WQ 20170821
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170804
Cylance Unsafe 20170821
Cyren W32/Locky.EBQZ-1178 20170821
DrWeb Trojan.Encoder.3988 20170821
Emsisoft Trojan.GenericKD.3055845 (B) 20170821
Endgame malicious (high confidence) 20170721
ESET-NOD32 Win32/Filecoder.Locky.A 20170821
F-Prot W32/Locky.O 20170821
F-Secure Trojan.GenericKD.3055845 20170821
Fortinet W32/Malicious_Behavior.VEX 20170821
GData Win32.Trojan.Agent.68ZSC1 20170821
Ikarus Trojan.Win32.Filecoder 20170820
Sophos ML heuristic 20170818
Jiangmin Trojan.Reconyc.cfl 20170821
K7AntiVirus Trojan ( 004de8651 ) 20170820
K7GW Trojan ( 004de8651 ) 20170817
Kaspersky Trojan.Win32.Reconyc.ffqk 20170821
MAX malware (ai score=84) 20170821
McAfee Generic.yc 20170821
McAfee-GW-Edition BehavesLike.Win32.Downloader.nh 20170821
Microsoft Ransom:Win32/Locky.A 20170821
eScan Trojan.GenericKD.3055845 20170821
NANO-Antivirus Trojan.Win32.Encoder.efhbdd 20170821
nProtect Trojan/W32.Reconyc.93975 20170819
Palo Alto Networks (Known Signatures) generic.ml 20170821
Panda Trj/WLT.B 20170820
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20170821
Sophos AV Troj/Ransom-CHZ 20170821
SUPERAntiSpyware Trojan.Agent/Gen 20170820
Symantec Ransom.Locky 20170820
TheHacker Trojan/Filecoder.Locky.a 20170821
TrendMicro Ransom_LOCKY.SM2 20170821
TrendMicro-HouseCall Ransom_LOCKY.SM2 20170821
VBA32 Trojan.Reconyc 20170818
VIPRE Trojan.Win32.Generic!BT 20170821
ViRobot Trojan.Win32.A.Reconyc.93975 20170821
Webroot W32.Adware.Gen 20170821
WhiteArmor Malware.HighConfidence 20170817
Yandex Trojan.Reconyc! 20170818
Zillya Trojan.Locky.Win32.4 20170819
ZoneAlarm by Check Point Trojan.Win32.Reconyc.ffqk 20170821
Zoner Trojan.Locky 20170821
Alibaba 20170821
ClamAV 20170821
CMC 20170820
Kingsoft 20170821
SentinelOne (Static ML) 20170806
Symantec Mobile Insight 20170818
Tencent 20170821
TotalDefense 20170820
Trustlook 20170821
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-11-12 15:09:13
Entry Point 0x00001B01
Number of sections 6
PE sections
Overlays
MD5 71f553dde5d9c867fedbd34fc53b1705
File type ASCII text
Offset 93696
Size 279
Entropy 1.00
PE imports
TerminateProcess
SwitchToThread
CreateThread
GetModuleHandleA
LoadLibraryW
WriteFile
WaitForSingleObject
GetCommandLineW
GetTempPathW
ExitProcess
CreateFileW
DeleteFileW
FlushFileBuffers
LoadLibraryA
lstrcpyA
GetProcAddress
CommandLineToArgvW
GetActiveWindow
EndPagePrinter
StartPagePrinter
StartDocPrinterA
OpenPrinterA
WritePrinter
Ord(201)
EndDocPrinter
ClosePrinter
NtClose
CoInitialize
Number of PE resources by type
Struct(28) 1
Number of PE resources by language
RUSSIAN 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2008:11:12 16:09:13+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
4096

LinkerVersion
10.0

EntryPoint
0x1b01

InitializedDataSize
88576

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 91d8ab08a37f9c26a743380677aa200d
SHA1 e64e4617c8bdb5c6c3ae30e73d8211400651c8ba
SHA256 d0431537537c9c73f5a1b90b46b560cac4be82feb5ac14d47163a9f4b4fa1a41
ssdeep
1536:lf0kZhST9p9VTME6Pd+u7RVvGlhRuqeyyD+bNaI+/x8SHO532QhqyIucYqRbwKGc:lflhk9VwZP7RxUKXy/Z8x8oAsucZtz

authentihash 961df9dc8f44995ea6c40dccb24de8e48a548f3cfc2a6aff0f9b5d15850c49df
imphash 1b3d911a03eee509b0be588e6b5aac6b
File size 91.8 KB ( 93975 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.4%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe via-tor overlay

VirusTotal metadata
First submission 2016-02-19 16:57:58 UTC ( 1 year, 8 months ago )
Last submission 2017-08-21 05:02:00 UTC ( 2 months ago )
File names content
ransoware locky.exe
687e268a92dcf944bf78f343d0c1694785ea254e
56y4g45gh45h[1].txt.2600.dr
56Y4G45GH45H
91d8ab08a37f9c26a743380677aa200d
56y4g45gh45h.exe
eO0KSbnq.scr
56Y4G4~1
Kew2Sjgw.scr
56y4g45gh45h
7fAeESox.scr
LOCKY_56y4g45gh45h.tx_
Ransoware Locky.exe
56y4g45gh45h.exe
2T3HQedy.scr.2528.dr
T2X4sx8C.scr
56y4g45gh45h[1].txt.3380.dr
56y4g45gh45h (1)
56y4g45gh45.exe
56y4g45gh45h.exe
56y4g45gh45h.1
test.txt
vir.data
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!