× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: da575d571f02e6aa5a24505b8e2690b3adcb0fad8dc99d9b3f5564e933ec98ef
File name: 775505
Detection ratio: 11 / 55
Analysis date: 2016-01-15 16:38:23 UTC ( 3 years, 3 months ago ) View latest
Antivirus Result Update
Avast Win32:Malware-gen 20160115
AVware Trojan.Win32.Generic!BT 20160111
DrWeb Tool.BtcMine.538 20160115
K7AntiVirus Unwanted-Program ( 004bc57f1 ) 20160115
K7GW Unwanted-Program ( 004bc57f1 ) 20160115
Malwarebytes PUP.Optional.BitCoinMiner 20160115
Sophos AV Bitcoin Miner (PUA) 20160115
Symantec Trojan.Gen.2 20160115
TotalDefense Heur/TrojanHorse.ZCIH!suspicious 20160115
VIPRE Trojan.Win32.Generic!BT 20160115
Zillya Trojan.InstallCore.Win32.2621 20160114
Ad-Aware 20160115
AegisLab 20160115
Yandex 20160114
AhnLab-V3 20160115
Alibaba 20160115
ALYac 20160115
Antiy-AVL 20160115
Arcabit 20160115
AVG 20160115
Avira (no cloud) 20160115
Baidu-International 20160115
BitDefender 20160115
Bkav 20160115
ByteHero 20160115
CAT-QuickHeal 20160115
ClamAV 20160115
CMC 20160111
Comodo 20160115
Cyren 20160115
Emsisoft 20160115
ESET-NOD32 20160115
F-Prot 20160115
F-Secure 20160115
Fortinet 20160115
GData 20160115
Ikarus 20160115
Jiangmin 20160115
Kaspersky 20160115
McAfee 20160115
McAfee-GW-Edition 20160115
Microsoft 20160115
eScan 20160115
NANO-Antivirus 20160115
nProtect 20160115
Panda 20160115
Qihoo-360 20160115
Rising 20160115
SUPERAntiSpyware 20160115
TheHacker 20160114
TrendMicro 20160115
TrendMicro-HouseCall 20160115
VBA32 20160115
ViRobot 20160115
Zoner 20160115
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
F-PROT appended, 7Z, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-03-30 17:38:24
Entry Point 0x00004B5F
Number of sections 4
PE sections
Overlays
MD5 29050d4988bd57616683ce9d81ad93c8
File type data
Offset 22016
Size 3725527
Entropy 8.00
PE imports
RegDeleteValueW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
GetLastError
GetModuleFileNameW
WaitForSingleObject
ExitProcess
GetFileAttributesW
GetCurrentProcess
GetCurrentDirectoryW
FindNextFileW
LocalAlloc
SetFileTime
GetCommandLineW
GetWindowsDirectoryW
MultiByteToWideChar
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetTempFileNameW
RemoveDirectoryW
SetEnvironmentVariableW
SetFilePointer
GetSystemDirectoryW
ReadFile
GetTempPathW
CloseHandle
GetCommandLineA
FindFirstFileW
GetModuleHandleW
LocalFree
SetCurrentDirectoryW
WriteFile
CreateFileW
CreateProcessW
FindClose
Sleep
SendMessageW
UpdateWindow
RegisterClassW
MessageBoxA
DefWindowProcW
GetDesktopWindow
UnregisterClassW
GetClientRect
CreateWindowExW
ShowWindow
DestroyWindow
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 2
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2015:03:30 17:38:24+00:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
14.0

ImageFileCharacteristics
No relocs, Executable, Large address aware, 32-bit

EntryPoint
0x4b5f

InitializedDataSize
7168

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 bc0f341b0a6be3bbd9030c8a3005e1b6
SHA1 5b2a27dcd7505afe7a82eae088608a13f4d6248d
SHA256 da575d571f02e6aa5a24505b8e2690b3adcb0fad8dc99d9b3f5564e933ec98ef
ssdeep
49152:P5ok7yTvLHsyy5KzZjSh09XUVSQ+pKVEyU735IxDI7q5FgoGZsYNxvuAGkoAJgqG:H7yLM75KzVESIYec7q5nyNunpqHU8XE

authentihash c62fcb3da696e96fef63e54d432cd820520e77d1c9c5b602c70fd37d78f349ba
imphash d4812014bffbe22bffef2cee286f26dd
File size 3.6 MB ( 3747543 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe via-tor overlay

VirusTotal metadata
First submission 2015-04-23 12:00:02 UTC ( 3 years, 12 months ago )
Last submission 2019-02-21 04:05:08 UTC ( 1 month, 3 weeks ago )
File names bc0f341b0a6be3bbd9030c8a3005e1b6
output.83578224.txt
ufasoft_sockschain-4.221.exe
DA575D571F02E6AA5A24505B8E2690B3ADCB0FAD8DC99D9B3F5564E933EC98EF.dat
output.97129508.txt
ufasoft_sockschain_4.221.exe.infected
ufasoft_sockschain_4.221.exe
output.83592826.txt
83559845
ufasoft_sockschain_4.221.exe
ufasoft_sockschain-4.221.exe
ufasoft_sockschain-4.221.exe
83592826
83578224
775505
output.97700009.txt
output.83559845.txt
VirusShare_bc0f341b0a6be3bbd9030c8a3005e1b6
ufasoft_sockschain-4.221.exe
ufasoft_sockschain_4.221.exe
ufasoft_sockschain_4.221 (1).exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications