× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d0431537537c9c73f5a1b90b46b560cac4be82feb5ac14d47163a9f4b4fa1a41
File name: LOCKY_EXE (64)
Detection ratio: 58 / 66
Analysis date: 2018-01-19 08:50:55 UTC ( 1 day, 15 hours ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.3055845 20180119
AegisLab W32.W.Palevo.mCAk 20180119
AhnLab-V3 Trojan/Win32.Locky.C1328255 20180119
ALYac Trojan.Ransom.LockyCrypt 20180119
Antiy-AVL Trojan/Win32.Reconyc 20180119
Arcabit Trojan.Generic.D2EA0E5 20180119
Avast Win32:Locky-F [Trj] 20180119
AVG Win32:Locky-F [Trj] 20180119
Avira (no cloud) TR/ATRAPS.odiyd 20180119
AVware Trojan.Win32.Generic!BT 20180119
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180118
BitDefender Trojan.GenericKD.3055845 20180119
Bkav HW32.Packed.ECC7 20180119
CAT-QuickHeal Ransom.Locky.AV6 20180118
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cybereason malicious.1b8fb7 20171103
Cylance Unsafe 20180119
Cyren W32/Locky.EBQZ-1178 20180119
DrWeb Trojan.Encoder.3988 20180119
Emsisoft Trojan.GenericKD.3055845 (B) 20180119
Endgame malicious (high confidence) 20171130
ESET-NOD32 Win32/Filecoder.Locky.A 20180119
F-Prot W32/Locky.O 20180119
F-Secure Trojan.GenericKD.3055845 20180119
GData Win32.Trojan.Agent.68ZSC1 20180119
Ikarus Trojan.Win32.Filecoder 20180118
Sophos ML heuristic 20170914
Jiangmin Trojan.Reconyc.cfl 20180119
K7AntiVirus Trojan ( 004de8651 ) 20180119
K7GW Trojan ( 004de8651 ) 20180118
Kaspersky Trojan.Win32.Reconyc.ffqk 20180119
Malwarebytes Ransom.Locky 20180119
MAX malware (ai score=100) 20180119
McAfee Generic.yc 20180119
McAfee-GW-Edition BehavesLike.Win32.Downloader.nh 20180118
Microsoft Ransom:Win32/Locky.A 20180119
eScan Trojan.GenericKD.3055845 20180119
NANO-Antivirus Trojan.Win32.Encoder.efhbdd 20180119
nProtect Trojan/W32.Reconyc.93975 20180119
Palo Alto Networks (Known Signatures) generic.ml 20180119
Panda Trj/WLT.B 20180118
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20180119
Rising Trojan.Spy.Win32.Locky.c (CLASSIC) 20180119
SentinelOne (Static ML) static engine - malicious 20180115
Sophos AV Troj/Ransom-CHZ 20180119
SUPERAntiSpyware Trojan.Agent/Gen 20180119
Symantec Ransom.Locky 20180118
Tencent Win32.Trojan.Filecoder.Htvs 20180119
TheHacker Trojan/Filecoder.Locky.a 20180115
TrendMicro Ransom_LOCKY.SM2 20180119
TrendMicro-HouseCall Ransom_LOCKY.SM2 20180119
VBA32 Trojan.Reconyc 20180118
VIPRE Trojan.Win32.Generic!BT 20180119
ViRobot Trojan.Win32.A.Reconyc.93975 20180119
Webroot W32.Adware.Gen 20180119
Yandex Trojan.Reconyc! 20180112
ZoneAlarm by Check Point Trojan.Win32.Reconyc.ffqk 20180119
Zoner Trojan.Locky 20180119
Alibaba 20180118
Avast-Mobile 20180118
ClamAV 20180119
CMC 20180116
Comodo 20180119
eGambit 20180119
Fortinet 20180119
Kingsoft 20180119
Symantec Mobile Insight 20180119
Trustlook 20180119
Zillya 20180118
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-11-12 15:09:13
Entry Point 0x00001B01
Number of sections 6
PE sections
Overlays
MD5 71f553dde5d9c867fedbd34fc53b1705
File type ASCII text
Offset 93696
Size 279
Entropy 1.00
PE imports
TerminateProcess
SwitchToThread
CreateThread
GetModuleHandleA
LoadLibraryW
WriteFile
WaitForSingleObject
GetCommandLineW
GetTempPathW
ExitProcess
CreateFileW
DeleteFileW
FlushFileBuffers
LoadLibraryA
lstrcpyA
GetProcAddress
CommandLineToArgvW
GetActiveWindow
EndPagePrinter
StartPagePrinter
StartDocPrinterA
OpenPrinterA
WritePrinter
Ord(201)
EndDocPrinter
ClosePrinter
NtClose
CoInitialize
Number of PE resources by type
Struct(28) 1
Number of PE resources by language
RUSSIAN 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2008:11:12 16:09:13+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
4096

LinkerVersion
10.0

EntryPoint
0x1b01

InitializedDataSize
88576

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 91d8ab08a37f9c26a743380677aa200d
SHA1 e64e4617c8bdb5c6c3ae30e73d8211400651c8ba
SHA256 d0431537537c9c73f5a1b90b46b560cac4be82feb5ac14d47163a9f4b4fa1a41
ssdeep
1536:lf0kZhST9p9VTME6Pd+u7RVvGlhRuqeyyD+bNaI+/x8SHO532QhqyIucYqRbwKGc:lflhk9VwZP7RxUKXy/Z8x8oAsucZtz

authentihash 961df9dc8f44995ea6c40dccb24de8e48a548f3cfc2a6aff0f9b5d15850c49df
imphash 1b3d911a03eee509b0be588e6b5aac6b
File size 91.8 KB ( 93975 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.4%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe overlay via-tor

VirusTotal metadata
First submission 2016-02-19 16:57:58 UTC ( 1 year, 11 months ago )
Last submission 2018-01-19 08:50:55 UTC ( 1 day, 15 hours ago )
File names T2X4sx8C.scr
content
ransoware locky.exe
Kew2Sjgw.scr
56y4g45gh45h[1].txt.2600.dr
56Y4G45GH45H
91d8ab08a37f9c26a743380677aa200d
56y4g45gh45h.exe
eO0KSbnq.scr
56Y4G4~1
687e268a92dcf944bf78f343d0c1694785ea254e
56y4g45gh45h
7fAeESox.scr
LOCKY_56y4g45gh45h.tx_
Ransoware Locky.exe
56y4g45gh45h.exe
2T3HQedy.scr.2528.dr
LOCKY_EXE (64)
56y4g45gh45h[1].txt.3380.dr
56y4g45gh45h (1)
56y4g45gh45.exe
56y4g45gh45h.exe
56y4g45gh45h.1
test.txt
vir.data
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!