× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d0431537537c9c73f5a1b90b46b560cac4be82feb5ac14d47163a9f4b4fa1a41
File name: 56y4g45gh45h
Detection ratio: 58 / 62
Analysis date: 2017-04-12 10:26:16 UTC ( 2 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.3055845 20170412
AegisLab W32.W.Palevo.mCAk 20170412
AhnLab-V3 Trojan/Win32.Locky.C1328255 20170412
ALYac Trojan.Ransom.LockyCrypt 20170412
Antiy-AVL Trojan/Win32.Reconyc 20170412
Arcabit Trojan.Generic.D2EA0E5 20170412
Avast Win32:Locky-F [Trj] 20170412
AVG Crypt_r.BAW 20170412
Avira (no cloud) TR/ATRAPS.odiyd 20170412
AVware Trojan.Win32.Generic!BT 20170410
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170411
BitDefender Trojan.GenericKD.3055845 20170412
Bkav HW32.Packed.ECC7 20170411
CAT-QuickHeal Ransom.Locky.AV6 20170411
Comodo TrojWare.Win32.Agent.WQ 20170412
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170130
Cyren W32/Locky.EBQZ-1178 20170412
DrWeb Trojan.Encoder.3988 20170412
Emsisoft Trojan.GenericKD.3055845 (B) 20170412
Endgame malicious (high confidence) 20170411
ESET-NOD32 Win32/Filecoder.Locky.A 20170412
F-Prot W32/Locky.O 20170412
F-Secure Trojan.GenericKD.3055845 20170412
Fortinet W32/Malicious_Behavior.VEX 20170412
GData Win32.Trojan.Agent.68ZSC1 20170412
Ikarus Trojan.Win32.Filecoder 20170412
Invincea ransom.win32.locky.a 20170203
Jiangmin Trojan.Reconyc.cfl 20170412
K7AntiVirus Trojan ( 004de8651 ) 20170412
K7GW Trojan ( 004de8651 ) 20170412
Kaspersky Trojan.Win32.Reconyc.ffqk 20170412
Malwarebytes Ransom.Locky 20170412
McAfee Generic.yc 20170412
McAfee-GW-Edition BehavesLike.Win32.Backdoor.nh 20170412
Microsoft Ransom:Win32/Locky.A 20170412
eScan Trojan.GenericKD.3055845 20170412
NANO-Antivirus Trojan.Win32.Encoder.efhbdd 20170412
nProtect Trojan/W32.Reconyc.93975 20170412
Palo Alto Networks (Known Signatures) generic.ml 20170412
Panda Trj/WLT.B 20170411
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20170412
Rising Trojan.Generic (cloud:vpjNi60eWoC) 20170412
SentinelOne (Static ML) static engine - malicious 20170330
Sophos Troj/Ransom-CHZ 20170412
SUPERAntiSpyware Trojan.Agent/Gen 20170412
Symantec Ransom.Locky 20170411
Tencent Win32.Trojan.Filecoder.Htvs 20170412
TheHacker Trojan/Filecoder.Locky.a 20170410
TrendMicro Ransom_LOCKY.SM2 20170412
TrendMicro-HouseCall Ransom_LOCKY.SM2 20170412
VBA32 Trojan.Reconyc 20170412
VIPRE Trojan.Win32.Generic!BT 20170412
ViRobot Trojan.Win32.A.Reconyc.93975[h] 20170412
Webroot W32.Adware.Gen 20170412
Yandex Trojan.Reconyc! 20170411
Zillya Trojan.Locky.Win32.4 20170411
ZoneAlarm by Check Point Trojan.Win32.Reconyc.ffqk 20170412
Zoner Trojan.Locky 20170412
Alibaba 20170412
ClamAV 20170412
CMC 20170412
Kingsoft 20170412
Symantec Mobile Insight 20170412
TotalDefense 20170410
Trustlook 20170412
WhiteArmor 20170409
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-11-12 15:09:13
Entry Point 0x00001B01
Number of sections 6
PE sections
Overlays
MD5 71f553dde5d9c867fedbd34fc53b1705
File type ASCII text
Offset 93696
Size 279
Entropy 1.00
PE imports
TerminateProcess
SwitchToThread
CreateThread
GetModuleHandleA
LoadLibraryW
WriteFile
WaitForSingleObject
GetCommandLineW
GetTempPathW
ExitProcess
CreateFileW
DeleteFileW
FlushFileBuffers
LoadLibraryA
lstrcpyA
GetProcAddress
CommandLineToArgvW
GetActiveWindow
EndPagePrinter
StartPagePrinter
StartDocPrinterA
OpenPrinterA
WritePrinter
Ord(201)
EndDocPrinter
ClosePrinter
NtClose
CoInitialize
Number of PE resources by type
Struct(28) 1
Number of PE resources by language
RUSSIAN 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2008:11:12 16:09:13+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
4096

LinkerVersion
10.0

EntryPoint
0x1b01

InitializedDataSize
88576

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 91d8ab08a37f9c26a743380677aa200d
SHA1 e64e4617c8bdb5c6c3ae30e73d8211400651c8ba
SHA256 d0431537537c9c73f5a1b90b46b560cac4be82feb5ac14d47163a9f4b4fa1a41
ssdeep
1536:lf0kZhST9p9VTME6Pd+u7RVvGlhRuqeyyD+bNaI+/x8SHO532QhqyIucYqRbwKGc:lflhk9VwZP7RxUKXy/Z8x8oAsucZtz

authentihash 961df9dc8f44995ea6c40dccb24de8e48a548f3cfc2a6aff0f9b5d15850c49df
imphash 1b3d911a03eee509b0be588e6b5aac6b
File size 91.8 KB ( 93975 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.4%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe via-tor overlay

VirusTotal metadata
First submission 2016-02-19 16:57:58 UTC ( 1 year, 4 months ago )
Last submission 2016-09-27 19:08:39 UTC ( 9 months ago )
File names content
ransoware locky.exe
687e268a92dcf944bf78f343d0c1694785ea254e
56y4g45gh45h[1].txt.2600.dr
56Y4G45GH45H
91d8ab08a37f9c26a743380677aa200d
56y4g45gh45h.exe
eO0KSbnq.scr
56Y4G4~1
Kew2Sjgw.scr
56y4g45gh45h
7fAeESox.scr
LOCKY_56y4g45gh45h.tx_
Ransoware Locky.exe
56y4g45gh45h.exe
2T3HQedy.scr.2528.dr
T2X4sx8C.scr
56y4g45gh45h[1].txt.3380.dr
56y4g45gh45h (1)
56y4g45gh45.exe
56y4g45gh45h.exe
56y4g45gh45h.1
test.txt
vir.data
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!