× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e9b3909ca3dd2663123793a5fdebfbdd7a21238241ec748c52bef27d3ce7bb52
File name: obil.exe
Detection ratio: 51 / 69
Analysis date: 2018-12-04 01:00:15 UTC ( 5 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Generic.Delph.PWS.E06EBA9A 20181203
AhnLab-V3 Malware/Win32.Generic.C2622462 20181203
ALYac Generic.Delph.PWS.E06EBA9A 20181203
Antiy-AVL Trojan[Ransom]/Win32.Blocker 20181202
Arcabit Generic.Delph.PWS.E06EBA9A 20181203
Avast Win32:Malware-gen 20181203
AVG Win32:Malware-gen 20181203
Avira (no cloud) TR/AD.MoksSteal.elw 20181203
BitDefender Generic.Delph.PWS.E06EBA9A 20181203
CAT-QuickHeal Trojan.Sigmal.S3989901 20181203
ClamAV Win.Ransomware.Delf-6651871-0 20181203
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20181204
Cyren W32/PWS.stealer.A.gen!Eldorado 20181203
DrWeb Trojan.PWS.Stealer.24300 20181203
Emsisoft Generic.Delph.PWS.E06EBA9A (B) 20181203
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/PSW.Delf.OSF 20181204
F-Prot W32/PWS.stealer.A.gen!Eldorado 20181203
F-Secure Generic.Delph.PWS.E06EBA9A 20181203
Fortinet W32/Delf.OSF!tr 20181203
GData Generic.Delph.PWS.E06EBA9A 20181203
Ikarus Trojan-PSW.Delf 20181203
Sophos ML heuristic 20181128
Jiangmin Trojan.PSW.Coins.buh 20181203
K7AntiVirus Password-Stealer ( 0052f96e1 ) 20181203
K7GW Password-Stealer ( 0052f96e1 ) 20181203
Kaspersky Trojan-Ransom.Win32.Blocker.lckf 20181203
Malwarebytes Trojan.AzorUlt 20181203
MAX malware (ai score=87) 20181204
McAfee GenericRXGI-KI!7C47E5AB95A7 20181203
McAfee-GW-Edition BehavesLike.Win32.Dropper.ch 20181204
Microsoft PWS:Win32/Stimilina.E!bit 20181204
eScan Generic.Delph.PWS.E06EBA9A 20181204
NANO-Antivirus Trojan.Win32.Stealer.fflqpr 20181204
Palo Alto Networks (Known Signatures) generic.ml 20181204
Panda Trj/Genetic.gen 20181203
Qihoo-360 Win32/Trojan.Ransom.c78 20181204
Rising Ransom.Blocker!8.12A (RDM+:cmRtazo+t7oincKDKEzUba22pNBn) 20181204
Sophos AV Troj/PWS-CJJ 20181204
SUPERAntiSpyware Trojan.Agent/Gen-Crypt 20181128
Symantec Trojan.Coinstealer 20181204
Tencent Win32.Trojan.Blocker.Aisd 20181204
Trapmine malicious.high.ml.score 20181128
TrendMicro TrojanSpy.Win32.CLIPBANKER.SMMR 20181204
TrendMicro-HouseCall TrojanSpy.Win32.CLIPBANKER.SMMR 20181204
VBA32 BScope.TrojanRansom.Blocker 20181203
Webroot W32.Trojan.Gen 20181204
Yandex Trojan.Blocker!m3aQMhOteaA 20181130
Zillya Trojan.Blocker.Win32.40079 20181203
ZoneAlarm by Check Point Trojan-Ransom.Win32.Blocker.lckf 20181203
AegisLab 20181203
Alibaba 20180921
Avast-Mobile 20181203
Babable 20180918
Baidu 20181203
Bkav 20181203
CMC 20181203
Comodo 20181203
Cybereason 20180225
eGambit 20181204
Kingsoft 20181204
SentinelOne (Static ML) 20181011
Symantec Mobile Insight 20181121
TACHYON 20181203
TheHacker 20181202
TotalDefense 20181203
Trustlook 20181204
ViRobot 20181203
Zoner 20181203
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0001A1F8
Number of sections 5
PE sections
PE imports
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
FreeSid
DeleteDC
SelectObject
BitBlt
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
EnterCriticalSection
GetSystemInfo
FreeLibrary
QueryPerformanceCounter
ExitProcess
GetThreadLocale
GlobalUnlock
GetModuleFileNameA
RtlUnwind
LoadLibraryA
CopyFileW
DeleteCriticalSection
GetStartupInfoA
GetLocaleInfoA
LocalAlloc
FindClose
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateDirectoryW
GetCommandLineA
GlobalLock
RaiseException
WideCharToMultiByte
GetModuleHandleA
FindNextFileW
WriteFile
GetCurrentProcess
DeleteFileW
FindFirstFileW
GetCurrentThreadId
LocalFree
InitializeCriticalSection
VirtualFree
GetFileAttributesW
Sleep
GetTickCount
GetVersion
GetProcAddress
VirtualAlloc
GetCurrentProcessId
LeaveCriticalSection
CoCreateInstance
OleInitialize
SysReAllocStringLen
SysFreeString
SysAllocStringLen
ReleaseDC
GetSystemMetrics
CharToOemBuffA
CharNextA
MessageBoxA
GetKeyboardType
GetDC
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:20 00:22:17+02:00

FileType
Win32 EXE

PEType
PE32

CodeSize
103424

LinkerVersion
2.25

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0x1a1f8

InitializedDataSize
10752

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 7c47e5ab95a7982cfd81c76a98801e19
SHA1 7bba9587fb252714a2cf579dfd3bd5e0d308308e
SHA256 e9b3909ca3dd2663123793a5fdebfbdd7a21238241ec748c52bef27d3ce7bb52
ssdeep
3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/axg/:Zzx7ZApszolIo7lf/ipT/a

authentihash 481c342623d8fe0936570d343e079d027fa8da9c9088a283cbf3d7fbbcbd1dc2
imphash 6d1f2b41411eacafcf447fc002d8cb00
File size 112.5 KB ( 115200 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (40.5%)
Win32 Dynamic Link Library (generic) (20.3%)
Win32 Executable (generic) (13.9%)
Win16/32 Executable Delphi generic (6.4%)
OS/2 Executable (generic) (6.2%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2018-12-04 01:00:15 UTC ( 5 months, 2 weeks ago )
Last submission 2018-12-21 06:12:43 UTC ( 5 months ago )
File names output.114635342.txt
7c47e5ab95a7982cfd81c76a98801e19
obil.exe
output.114634636.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
DNS requests
UDP communications