× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dd4e67950158511eb7c3ac1a047b551a08da73416d45c2ce3b0e507b40274840
File name: loselose.zip
Detection ratio: 22 / 43
Analysis date: 2011-02-20 22:22:36 UTC ( 5 years, 7 months ago ) View latest
Antivirus Result Update
AntiVir MACOS/LoseLose 20110220
Antiy-AVL Trojan/OSX.Gaslome 20110219
Avast Other:Malware-gen 20110220
Avast5 Other:Malware-gen 20110220
Commtouch MacOS/Loselose.A 20110220
Emsisoft Trojan.OSX.Gaslome!IK 20110220
F-Prot MacOS/Loselose.A 20110220
F-Secure Trojan:OSX/Loosemaque.A 20110220
GData Other:Malware-gen 20110220
Ikarus Trojan.OSX.Gaslome 20110220
K7AntiVirus Trojan 20110219
Kaspersky Trojan.OSX.Gaslome.a 20110220
McAfee OSX/LoseGame.dr 20110220
McAfee-GW-Edition OSX/LoseGame.dr 20110220
Microsoft Trojan:MacOS_X/Loosemaque.A 20110220
PCTools Application.OSX 20110220
Sophos OSX/LoseGame-A 20110220
Symantec OSX.Loosemaque 20110220
VBA32 Trojan.OSX.Gaslome.a 20110218
VirusBuster Trojan.OSX.Loselose.A 20110220
eSafe Win32.OSX.Loosemaque 20110217
eTrust-Vet OSX/LoseLose.A 20110218
AVG 20110220
AhnLab-V3 20110214
BitDefender 20110220
CAT-QuickHeal 20110220
ClamAV 20110220
Comodo 20110220
DrWeb 20110220
Fortinet 20110220
Jiangmin 20110220
NOD32 20110220
Norman 20110220
Panda 20110220
Prevx 20110220
Rising 20110218
SUPERAntiSpyware 20110220
TheHacker 20110220
TrendMicro 20110220
TrendMicro-HouseCall 20110215
VIPRE 20110220
ViRobot 20110220
nProtect 20110215
The file being studied is a compressed stream! More specifically, it is a ZIP file. It seems to be a bundled Mac OS X application.
Interesting properties
The studied file contains at least one Mac OS X executable.
Contained files
Compression metadata
Contained files
45
Uncompressed size
10708344
Highest datetime
2009-09-14 13:24:22
Lowest datetime
2005-03-11 19:29:36
Contained files by extension
png
10
wav
3
txt
2
mp3
2
ttf
2
Contained files by type
unknown
22
directory
13
PNG
5
XML
2
Mac OS X Executable
2
MP3
1
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
10

ZipCRC
0x00000000

FileType
ZIP

ZipCompression
None

ZipUncompressedSize
0

ZipCompressedSize
0

FileTypeExtension
zip

ZipFileName
lose lose/

ZipBitFlag
0

ZipModifyDate
2009:09:14 13:24:08

File identification
MD5 1b4fe0dc562ae0b8fb6f51104187e733
SHA1 854f51c4274365837f06b06201b708c9aec5834d
SHA256 dd4e67950158511eb7c3ac1a047b551a08da73416d45c2ce3b0e507b40274840
ssdeep
98304:Qz0oS1gqUetpUAIeBcJbNJCIAOiQ8i4etxINkW/pvd6/Oo14j3ggWRXqgFTMCRg:g0KEpUAIPlAO788Afpvd414jQgWRXqg6

File size 5.8 MB ( 6044154 bytes )
File type ZIP
Magic literal
Zip archive data, at least v1.0 to extract

TrID ZIP compressed archive (100.0%)
Tags
mac-app contains-macho zip

VirusTotal metadata
First submission 2009-09-23 14:30:04 UTC ( 7 years ago )
Last submission 2016-01-15 18:31:33 UTC ( 8 months, 2 weeks ago )
File names 139074
loselose.zip
43146106
1b4fe0dc562ae0b8fb6f51104187e733.vir
filename
1b4fe0dc562ae0b8fb6f51104187e733
file-6520174_zip
output.43146106.txt
loselose-337.zip
loselose.zip
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections