× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ee5f4e4f36f6b68be7deefab5ae4f202102c79fafd1df6c4a55a3d326c182758
File name: 1282387621-myspider.exe
Detection ratio: 1 / 54
Analysis date: 2016-02-08 09:56:34 UTC ( 3 years, 2 months ago ) View latest
Antivirus Result Update
ByteHero Trojan.Malware.Obscu.Gen.001 20160208
Ad-Aware 20160208
AegisLab 20160208
Yandex 20160206
AhnLab-V3 20160207
Alibaba 20160204
Antiy-AVL 20160208
Arcabit 20160208
Avast 20160208
AVG 20160208
Avira (no cloud) 20160207
Baidu-International 20160207
BitDefender 20160208
Bkav 20160204
CAT-QuickHeal 20160208
ClamAV 20160206
CMC 20160205
Comodo 20160208
Cyren 20160208
DrWeb 20160208
Emsisoft 20160208
ESET-NOD32 20160208
F-Prot 20160129
F-Secure 20160208
Fortinet 20160208
GData 20160208
Ikarus 20160208
Jiangmin 20160208
K7AntiVirus 20160208
K7GW 20160208
Kaspersky 20160208
Malwarebytes 20160208
McAfee 20160208
McAfee-GW-Edition 20160208
Microsoft 20160208
eScan 20160208
NANO-Antivirus 20160208
nProtect 20160205
Panda 20160207
Qihoo-360 20160208
Rising 20160208
Sophos AV 20160208
SUPERAntiSpyware 20160208
Symantec 20160207
Tencent 20160208
TheHacker 20160206
TotalDefense 20160208
TrendMicro 20160208
TrendMicro-HouseCall 20160208
VBA32 20160208
VIPRE 20160208
ViRobot 20160208
Zillya 20160206
Zoner 20160208
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT appended, Unicode, ZIP
PEiD WinZip 32-bit SFX v8.x module
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2001-01-09 14:09:05
Entry Point 0x00003F8F
Number of sections 5
PE sections
PE imports
GetDeviceCaps
CreateDCA
DeleteDC
CreateFontIndirectA
DeleteObject
GetTextExtentPoint32A
SetTextAlign
ExtTextOutA
SelectObject
SetBkColor
GetBkColor
SetTextColor
GetLastError
_lcreat
DosDateTimeToFileTime
LoadLibraryA
lstrlenA
GlobalFree
WaitForSingleObject
FreeLibrary
LocalAlloc
ExitProcess
SetFileTime
GlobalUnlock
RemoveDirectoryA
GlobalHandle
RtlUnwind
GetModuleFileNameA
WinExec
OpenFile
GetVolumeInformationA
_lwrite
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
_llseek
GetCommandLineA
GetProcAddress
_lread
GetModuleHandleA
_lclose
MapViewOfFile
SetFilePointer
FindFirstFileA
lstrcpyA
_lopen
CloseHandle
CreateFileMappingA
FindNextFileA
GetACP
MoveFileExA
GlobalLock
SetFileAttributesA
GetDriveTypeA
LocalFree
CreateProcessA
GetEnvironmentVariableA
UnmapViewOfFile
GlobalAlloc
LocalFileTimeToFileTime
FindClose
FormatMessageA
SetEndOfFile
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
KillTimer
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
SetWindowWord
GetSystemMetrics
OemToCharBuffA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
PostMessageA
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
GetSysColor
GetWindowWord
SetWindowTextA
SendDlgItemMessageA
GetLastActivePopup
SendMessageA
GetClientRect
GetDlgItem
RegisterClassA
SetRect
InvalidateRect
GetWindowLongA
SetTimer
LoadCursorA
LoadIconA
GetTopWindow
CharNextA
SetActiveWindow
wsprintfA
EndPaint
SetForegroundWindow
SetCursor
DialogBoxIndirectParamA
DestroyWindow
Number of PE resources by type
RT_ICON 2
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 3
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
4.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2001:01:09 15:09:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
22016

LinkerVersion
5.1

FileTypeExtension
exe

InitializedDataSize
10752

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x3f8f

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 56e33f8cb227604d448da97aba285bad
SHA1 407f918994e2c019d8ef7c15490cefc77fc326db
SHA256 ee5f4e4f36f6b68be7deefab5ae4f202102c79fafd1df6c4a55a3d326c182758
ssdeep
49152:ohaeqsu81MWiG6KRHk9k4dPMxHzixONl7rFRJ9nkq3kVoxE:oseqh81MHG6sEKNxHWsNl7rFv9kq0ox

authentihash fa2e572ade059d69046b3ee6add3c1b242575e64ece8183b8ba74c0f9e6065d7
imphash 4c59c0b3420ca0877a0e6c8146bdb593
File size 2.3 MB ( 2446848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (31.5%)
Win64 Executable (generic) (27.9%)
Winzip Win32 self-extracting archive (generic) (23.2%)
Win32 Dynamic Link Library (generic) (6.6%)
Win32 Executable (generic) (4.5%)
Tags
winzip peexe

VirusTotal metadata
First submission 2009-08-11 09:27:25 UTC ( 9 years, 8 months ago )
Last submission 2018-02-13 19:08:03 UTC ( 1 year, 2 months ago )
File names aa
myspider.exe
87SN.exe
1282387621-myspider.exe
56e33f8cb227604d448da97aba285bad
myspider.exe
1180941
VirusShare_56e33f8cb227604d448da97aba285bad
vbqI7354R6.inf
52993
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!