× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f264700a36a21f96851bddd1a488da66b30c1693544cba5ed2c83562ba62c212
File name: badguy3.exe
Detection ratio: 48 / 61
Analysis date: 2017-06-19 15:27:17 UTC ( 1 year, 9 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.174703 20170619
AhnLab-V3 Trojan/Win32.Shell.R1283 20170619
ALYac Gen:Variant.Razy.174703 20170619
Arcabit Trojan.Razy.D2AA6F 20170619
Avast Win32:SwPatch [Wrm] 20170619
AVG Win32:SwPatch [Wrm] 20170619
Avira (no cloud) TR/Crypt.EPACK.Gen2 20170619
AVware Trojan.Win32.Swrort.B (v) 20170619
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170619
BitDefender Gen:Variant.Razy.174703 20170619
Bkav W32.FamVT.RorenNHc.Trojan 20170619
CAT-QuickHeal Trojan.Swrort.A 20170619
ClamAV Win.Trojan.Swrort-5710536-0 20170619
Comodo TrojWare.Win32.Rozena.A 20170619
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170420
Cyren W32/Swrort.A.gen!Eldorado 20170619
DrWeb Trojan.Swrort.1 20170619
Emsisoft Gen:Variant.Razy.174703 (B) 20170619
Endgame malicious (high confidence) 20170615
ESET-NOD32 a variant of Win32/Rozena.AM 20170619
F-Prot W32/Swrort.A.gen!Eldorado 20170619
F-Secure Gen:Variant.Razy.174703 20170619
Fortinet W32/Swrort.C!tr 20170619
GData Gen:Variant.Razy.174703 20170619
Ikarus Trojan.Win32.Swrort 20170619
Sophos ML heuristic 20170607
K7AntiVirus Backdoor ( 04c53cce1 ) 20170619
K7GW Backdoor ( 04c53cce1 ) 20170619
Kaspersky HEUR:Trojan.Win32.Generic 20170619
Malwarebytes Trojan.Swrort 20170619
McAfee Swrort.i 20170619
McAfee-GW-Edition BehavesLike.Win32.Swrort.lh 20170619
Microsoft Trojan:Win32/Swrort.A 20170619
eScan Gen:Variant.Razy.174703 20170619
NANO-Antivirus Virus.Win32.Gen-Crypt.ccnc 20170619
Qihoo-360 HEUR/QVM20.1.EE03.Malware.Gen 20170619
Rising HackTool.Swrort!1.6477 (classic) 20170619
SentinelOne (Static ML) static engine - malicious 20170516
Sophos AV Mal/EncPk-TZ 20170619
SUPERAntiSpyware Trojan.Backdoor-PoisonIvy 20170619
Symantec Packed.Generic.347 20170619
TrendMicro BKDR_SWRORT.SM 20170619
TrendMicro-HouseCall BKDR_SWRORT.SM 20170619
VIPRE Trojan.Win32.Swrort.B (v) 20170619
ViRobot Trojan.Win32.Elzob.Gen[h] 20170619
Webroot W32.Malware.Gen 20170619
Yandex Trojan.Rosena.Gen.1 20170616
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20170619
AegisLab 20170618
Alibaba 20170619
Antiy-AVL 20170619
CMC 20170619
Jiangmin 20170619
Kingsoft 20170619
nProtect 20170619
Palo Alto Networks (Known Signatures) 20170619
Panda 20170619
Symantec Mobile Insight 20170614
Tencent 20170619
TheHacker 20170618
Trustlook 20170619
VBA32 20170619
WhiteArmor 20170616
Zillya 20170619
Zoner 20170619
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2009 The Apache Software Foundation.

Product Apache HTTP Server
Original name ab.exe
Internal name ab.exe
File version 2.2.14
Description ApacheBench command line utility
Comments Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-06-15 21:38:30
Entry Point 0x0000509B
Number of sections 4
PE sections
Overlays
MD5 95eb479e8f470740aa86bcb86cb13966
File type data
Offset 73728
Size 74
Entropy 4.61
PE imports
FreeSid
AllocateAndInitializeSid
PeekNamedPipe
GetLastError
EnterCriticalSection
ReleaseMutex
FileTimeToSystemTime
GetOverlappedResult
GlobalFree
WaitForSingleObject
GetExitCodeProcess
SystemTimeToFileTime
TlsAlloc
GetEnvironmentStringsW
GetVersionExA
LoadLibraryA
SystemTimeToTzSpecificLocalTime
DeleteCriticalSection
GetCurrentProcess
FileTimeToLocalFileTime
GetCommandLineW
FreeEnvironmentStringsW
GetProcAddress
FormatMessageA
SetStdHandle
CreateMutexA
TlsFree
SetFilePointer
ReadFile
WriteFile
CloseHandle
GetSystemTimeAsFileTime
GetFileInformationByHandle
DuplicateHandle
SetHandleInformation
SetEvent
LocalFree
TerminateProcess
DeviceIoControl
GetTimeZoneInformation
InitializeCriticalSection
CreateFileW
CreateEventA
Sleep
GetFileType
CreateFileA
SetLastError
LeaveCriticalSection
strncmp
__p__fmode
malloc
__p__environ
realloc
fclose
__dllonexit
_controlfp
fprintf
printf
fflush
fopen
strncpy
_except_handler3
_errno
qsort
_onexit
wcslen
exit
_XcptFilter
_ftol
strrchr
__setusermatherr
__p__wenviron
_adjust_fdiv
_strdup
_close
strchr
_isctype
__p__commode
_pctype
free
__p___initenv
atoi
wcsncmp
__getmainargs
calloc
perror
_initterm
strstr
signal
strerror
wcscpy
strspn
modf
__mb_cur_max
_strnicmp
_exit
__set_app_type
_iob
WSARecv
WSASend
setsockopt
getsockopt
__WSAFDIsSet
ntohl
ioctlsocket
WSAStartup
gethostbyname
WSAGetLastError
connect
WSACleanup
inet_ntoa
htons
closesocket
select
socket
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
FileDescription
ApacheBench command line utility

Comments
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

InitializedDataSize
40960

ImageVersion
0.0

ProductName
Apache HTTP Server

FileVersionNumber
2.2.14.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

OriginalFileName
ab.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.2.14

TimeStamp
2009:06:15 22:38:30+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
ab.exe

SubsystemVersion
4.0

ProductVersion
2.2.14

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright 2009 The Apache Software Foundation.

MachineType
Intel 386 or later, and compatibles

CompanyName
Apache Software Foundation

CodeSize
45056

FileSubtype
0

ProductVersionNumber
2.2.14.0

EntryPoint
0x509b

ObjectFileType
Executable application

File identification
MD5 8eac75d2125dc4c4a10cf5adcb8af119
SHA1 8cba3c9f3b871dafbdaa290fb1a371387a1628b5
SHA256 f264700a36a21f96851bddd1a488da66b30c1693544cba5ed2c83562ba62c212
ssdeep
1536:I24tTQTAzEVzI6TmxYANxAuZDRk8hS/TT6Mb+KR0Nc8QsJq39:vc+AYLT4jN1G8hyee0Nc8QsC9

authentihash 9698da0e40b86aea45f2cf2236225d4ec95f9043fd8ecd4cc9eb9dc539cabbbc
imphash 481f47bbb2c9c21e108d65f52b04c448
File size 72.1 KB ( 73802 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe overlay

VirusTotal metadata
First submission 2017-06-19 15:27:17 UTC ( 1 year, 9 months ago )
Last submission 2017-06-19 15:27:17 UTC ( 1 year, 9 months ago )
File names badguy3.exe
ab.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs
UDP communications