× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e04bbb295bab57f15210b0d40eab46fb3885a85dff8728f8d54bae2550fcd6ee
File name: output.11433798.txt
Detection ratio: 1 / 68
Analysis date: 2018-06-15 21:46:51 UTC ( 5 months, 4 weeks ago )
Antivirus Result Update
TheHacker Posible_Worm32 20180613
Ad-Aware 20180615
AegisLab 20180615
AhnLab-V3 20180615
Alibaba 20180615
ALYac 20180615
Antiy-AVL 20180615
Arcabit 20180615
Avast 20180615
Avast-Mobile 20180614
AVG 20180615
Avira (no cloud) 20180615
AVware 20180615
Babable 20180406
Baidu 20180615
BitDefender 20180615
Bkav 20180615
CAT-QuickHeal 20180615
ClamAV 20180615
CMC 20180615
Comodo 20180615
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180615
Cyren 20180615
DrWeb 20180615
eGambit 20180615
Emsisoft 20180615
Endgame 20180612
ESET-NOD32 20180615
F-Prot 20180615
F-Secure 20180615
Fortinet 20180615
GData 20180615
Ikarus 20180615
Sophos ML 20180601
Jiangmin 20180615
K7AntiVirus 20180615
K7GW 20180615
Kaspersky 20180615
Kingsoft 20180615
Malwarebytes 20180615
MAX 20180615
McAfee 20180615
McAfee-GW-Edition 20180615
Microsoft 20180615
eScan 20180615
NANO-Antivirus 20180615
Palo Alto Networks (Known Signatures) 20180615
Panda 20180615
Qihoo-360 20180615
Rising 20180615
SentinelOne (Static ML) 20180225
Sophos AV 20180615
SUPERAntiSpyware 20180615
Symantec 20180615
Symantec Mobile Insight 20180614
TACHYON 20180614
Tencent 20180615
TotalDefense 20180615
TrendMicro 20180615
TrendMicro-HouseCall 20180615
Trustlook 20180615
VBA32 20180615
VIPRE 20180615
ViRobot 20180615
Webroot 20180615
Yandex 20180615
Zillya 20180615
ZoneAlarm by Check Point 20180615
Zoner 20180615
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 2009

Product Roadkil's Unstoppable Copier
Original name Unstopcp.exe
Internal name Unstoppable Copier
File version 4, 3, 0, 0
Description Unstoppable Copier
Signature verification Signed file, verified signature
Signing date 7:50 AM 1/13/2010
Signers
[+] Jason Hatley
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 5/21/2009
Valid to 12:59 AM 5/22/2010
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 4FBC9DDD00A92496FA086A5C85C1FAF5C44D9E03
Serial number 00 E9 72 6D EE 8A AA 53 E4 72 FA 0E C7 2F 19 E8 FF
[+] UTN-USERFirst-Object
Status Valid
Issuer AddTrust External CA Root
Valid from 9:09 AM 6/7/2005
Valid to 11:48 AM 5/30/2020
Valid usage All
Algorithm sha1RSA
Thumbprint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] The USERTrust Network™
Status Valid
Issuer AddTrust External CA Root
Valid from 11:48 AM 5/30/2000
Valid to 11:48 AM 5/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbprint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
Counter signers
[+] Comodo Time Stamping Signer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 5/17/2005
Valid to 12:59 AM 5/17/2010
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 95B2B8E34EB2CB768144ED07433EF0A3AFCAEEC0
Serial number 4F 63 D0 30 F8 15 A3 A5 B3 44 69 40 06 3D 16 89
[+] UTN-USERFirst-Object
Status Valid
Issuer AddTrust External CA Root
Valid from 9:09 AM 6/7/2005
Valid to 11:48 AM 5/30/2020
Valid usage All
Algorithm sha1RSA
Thumbrint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] The USERTrust Network™
Status Valid
Issuer AddTrust External CA Root
Valid from 11:48 AM 5/30/2000
Valid to 11:48 AM 5/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbrint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-01-13 06:47:24
Entry Point 0x0003B4A0
Number of sections 3
PE sections
Overlays
MD5 8bb159df830422a7cc4942b76abf6bab
File type data
Offset 102912
Size 4992
Entropy 7.37
PE imports
RegCloseKey
GetOpenFileNameW
CreateFontW
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
DragFinish
SetFocus
WSAStartup
Number of PE resources by type
RT_ICON 5
RT_DIALOG 3
RT_GROUP_CURSOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH AUS 13
PE resources
ExifTool file metadata
UninitializedDataSize
147456

InitializedDataSize
12288

ImageVersion
0.0

ProductName
Roadkil's Unstoppable Copier

FileVersionNumber
4.3.0.0

LanguageCode
English (Australian)

FileFlagsMask
0x003f

FileDescription
Unstoppable Copier

CharacterSet
Unicode

LinkerVersion
7.1

FileTypeExtension
exe

OriginalFileName
Unstopcp.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
4, 3, 0, 0

TimeStamp
2010:01:13 07:47:24+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Unstoppable Copier

ProductVersion
4, 3, 0, 0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright 2009

MachineType
Intel 386 or later, and compatibles

CompanyName
Roadkil.Net

CodeSize
94208

FileSubtype
0

ProductVersionNumber
4.3.0.0

EntryPoint
0x3b4a0

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
File identification
MD5 983d37b5e9581921bb18e330b6d11952
SHA1 a7ee8dddd0c79aa7bfe7f5fd08d503a82a72fe14
SHA256 e04bbb295bab57f15210b0d40eab46fb3885a85dff8728f8d54bae2550fcd6ee
ssdeep
1536:uCtgJd0Zrz48UHJIH4oJ2CBHL8A0qntpEjZSry8s3/dSM/fpP22N7Xbz2rj6SB1U:uWE8UWYGzYAVXEjP86QM/V2g7XfxShYX

authentihash e1f2300398cdba675eaa1f22802fe43e9439ffdd8c2c52aa1d7538db9ec776e3
imphash 4c33d62b843b04a6f914e69138532f3d
File size 105.4 KB ( 107904 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (38.2%)
Win32 EXE Yoda's Crypter (37.5%)
Win32 Dynamic Link Library (generic) (9.2%)
Win32 Executable (generic) (6.3%)
OS/2 Executable (generic) (2.8%)
Tags
peexe software-collection signed upx overlay

VirusTotal metadata
First submission 2010-01-13 15:55:34 UTC ( 8 years, 11 months ago )
Last submission 2018-06-15 21:46:51 UTC ( 5 months, 4 weeks ago )
File names download.php
11397731
20161221141459
download.php.exe
output.11433798.txt
UnstopCpy_4_3_Win2K_UP.exe
Unstoppable Copier
output.11397731.txt
983d37b5e9581921bb18e330b6d11952.exe
download.php
Unstopcp.exe
5QmEzm.xls
unstoppable copier 4.3.exe
Unstoppable Copier 4.3.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!