× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e66d2a42ae9f647aa7027ddb62cd5487a9e4a81c7885b86591ea67bbce4e88fb
File name: 6ea54a4eba917935d35eb946794139c2
Detection ratio: 39 / 54
Analysis date: 2014-07-30 16:18:06 UTC ( 4 years, 3 months ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.1757455 20140730
Yandex Trojan.Injector!Rea1tZnr5GE 20140729
AntiVir TR/PSW.Fareit.2936 20140730
Antiy-AVL Trojan[PSW]/Win32.Fareit 20140730
Avast Win32:Trojan-gen 20140730
AVG Delf.APOP 20140730
AVware Trojan.Win32.Generic.pak!cobra 20140730
BitDefender Trojan.GenericKD.1757455 20140730
CAT-QuickHeal TrojanPSW.Fareit.r3 20140730
Comodo UnclassifiedMalware 20140730
DrWeb Trojan.PWS.Panda.7278 20140730
Emsisoft Trojan.GenericKD.1757455 (B) 20140730
ESET-NOD32 a variant of Win32/Injector.BHSA 20140730
F-Secure Trojan.GenericKD.1757455 20140730
Fortinet W32/Injector.BHDC!tr 20140730
GData Trojan.GenericKD.1757455 20140730
Ikarus Trojan-PSW.Win32.Fareit 20140730
K7AntiVirus Trojan ( 0049ca721 ) 20140730
K7GW Trojan ( 0049ca721 ) 20140730
Kaspersky Trojan-Spy.Win32.Zbot.tlxw 20140730
Kingsoft VIRUS_UNKNOWN 20140730
Malwarebytes Trojan.Agent.DIA 20140730
McAfee Generic.tb 20140730
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious-PKR.S 20140729
Microsoft PWS:Win32/Fareit 20140730
eScan Trojan.GenericKD.1757455 20140730
NANO-Antivirus Trojan.Win32.Zbot.dceqwl 20140730
Norman Troj_Generic.UXUXF 20140730
nProtect Trojan.GenericKD.1757455 20140730
Panda Trj/Genetic.gen 20140730
Qihoo-360 HEUR/Malware.QVM06.Gen 20140730
Rising PE:Trojan.Win32.Generic.16FBC146!385597766 20140730
Sophos AV Troj/Zbot-IPJ 20140730
Symantec Trojan Horse 20140730
Tencent Win32.Trojan-spy.Zbot.Wsuf 20140730
TrendMicro TROJ_FAKEAV.BME 20140730
TrendMicro-HouseCall TROJ_FAKEAV.BME 20140730
VBA32 TrojanPSW.Fareit 20140729
VIPRE Trojan.Win32.Generic.pak!cobra 20140730
AegisLab 20140730
AhnLab-V3 20140730
Baidu-International 20140730
Bkav 20140730
ByteHero 20140730
ClamAV 20140730
CMC 20140728
Commtouch 20140730
F-Prot 20140730
Jiangmin 20140725
SUPERAntiSpyware 20140730
TheHacker 20140728
TotalDefense 20140730
ViRobot 20140730
Zoner 20140729
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT RAR, UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-03-02 07:40:24
Entry Point 0x0000B4B5
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityA
RegQueryValueExW
Ord(17)
InitCommonControlsEx
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
GetDeviceCaps
DeleteDC
SelectObject
StretchBlt
GetObjectW
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
SetFilePointer
GetSystemTime
GetLastError
HeapFree
GetStdHandle
SystemTimeToFileTime
ReadFile
FileTimeToSystemTime
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
FindNextFileA
CompareStringW
HeapAlloc
SetFileTime
IsDBCSLeadByte
GetCommandLineW
GetFileAttributesW
GetCurrentProcess
FileTimeToLocalFileTime
MoveFileW
OpenFileMappingW
SetFileAttributesA
GetDateFormatW
CreateDirectoryA
DeleteFileA
GetCPInfo
ExitProcess
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
GetTimeFormatW
WriteFile
SetFileAttributesW
DosDateTimeToFileTime
CloseHandle
WideCharToMultiByte
MapViewOfFile
MoveFileExW
ExpandEnvironmentStringsW
FindNextFileW
SetEndOfFile
GetFileAttributesA
GetTempPathW
FindFirstFileA
FindFirstFileW
HeapReAlloc
GetModuleHandleW
GetFullPathNameA
GetCurrentDirectoryW
LoadLibraryW
SetCurrentDirectoryW
UnmapViewOfFile
FindResourceW
CreateFileW
GlobalAlloc
LocalFileTimeToFileTime
FindClose
Sleep
GetFileType
GetFullPathNameW
CreateFileA
GetTickCount
GetLocaleInfoW
GetNumberFormatW
SetLastError
CompareStringA
VariantInit
SHBrowseForFolderW
SHChangeNotify
SHFileOperationW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFileInfoW
SHGetMalloc
SHAutoComplete
SetFocus
MapWindowPoints
GetParent
UpdateWindow
EndDialog
LoadBitmapW
DefWindowProcW
CopyRect
GetWindowTextW
GetMessageW
ShowWindow
GetSystemMetrics
SetWindowPos
wvsprintfW
CharToOemBuffA
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
RegisterClassExW
CharUpperW
DialogBoxParamW
CharToOemBuffW
wvsprintfA
SendDlgItemMessageW
GetDlgItemTextW
PostMessageW
GetSysColor
SetDlgItemTextW
GetDC
ReleaseDC
DestroyIcon
TranslateMessage
IsWindowVisible
LoadStringW
SetWindowTextW
GetDlgItem
GetWindow
MessageBoxW
DispatchMessageW
GetClassNameW
PeekMessageW
CharUpperA
OemToCharA
EnableWindow
GetClientRect
WaitForInputIdle
OemToCharBuffA
LoadCursorW
LoadIconW
FindWindowExW
CreateWindowExW
GetWindowLongW
SetForegroundWindow
DestroyWindow
CharToOemA
CreateStreamOnHGlobal
OleUninitialize
CoCreateInstance
OleInitialize
CLSIDFromString
Number of PE resources by type
RT_DIALOG 6
RT_ICON 5
RT_STRING 5
RT_GROUP_ICON 2
RT_MANIFEST 1
RT_BITMAP 1
Number of PE resources by language
ENGLISH US 18
NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:03:02 08:40:24+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
72192

LinkerVersion
9.0

FileAccessDate
2014:07:30 17:09:39+01:00

EntryPoint
0xb4b5

InitializedDataSize
158208

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

FileCreateDate
2014:07:30 17:09:39+01:00

UninitializedDataSize
0

File identification
MD5 6ea54a4eba917935d35eb946794139c2
SHA1 d4ea043f2aafa45549392152ec3f0511a440b686
SHA256 e66d2a42ae9f647aa7027ddb62cd5487a9e4a81c7885b86591ea67bbce4e88fb
ssdeep
24576:cFszWS5vHlkPya1gh1ajWM71Xv2BLQOXVrQYN0ZMIjdo+c3:ce6YaSA1eBVhQYN06IpTq

imphash dbb1eb5c3476069287a73206929932fd
File size 1.3 MB ( 1344180 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe upx

VirusTotal metadata
First submission 2014-07-12 06:47:03 UTC ( 4 years, 4 months ago )
Last submission 2014-07-30 16:18:06 UTC ( 4 years, 3 months ago )
File names citadel.exe
6ea54a4eba917935d35eb946794139c2_INF3A5B.tmp
6ea54a4eba917935d35eb946794139c2
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.