× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f411eaf2d3389764598d939c389df6bd7177ca0b632f92cab16b6ceb38a3e6d5
File name: F411EAF2D3389764598D939C389DF6BD7177CA0B632F92CAB16B6CEB38A3E6D5
Detection ratio: 48 / 66
Analysis date: 2018-06-04 15:29:04 UTC ( 9 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.MSILPerseus.142516 20180604
AegisLab Backdoor.W32.Generic!c 20180604
AhnLab-V3 Trojan/Win32.Coinminer.C2356770 20180604
ALYac Gen:Variant.MSILPerseus.142516 20180604
Antiy-AVL Trojan[Backdoor]/Win32.AGeneric 20180604
Arcabit Trojan.MSILPerseus.D22CB4 20180604
Avast Win32:Malware-gen 20180604
AVG Win32:Malware-gen 20180604
Avira (no cloud) TR/Dropper.MSIL.vggib 20180604
AVware Trojan.Win32.Generic.pak!cobra 20180604
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9915 20180604
BitDefender Gen:Variant.MSILPerseus.142516 20180604
CAT-QuickHeal Backdoor.Generic 20180604
Comodo UnclassifiedMalware 20180604
Cylance Unsafe 20180604
Cyren W32/MSIL_Injector.OG.gen!Eldorado 20180604
Emsisoft Gen:Variant.MSILPerseus.142516 (B) 20180604
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of MSIL/Kryptik.MJG 20180604
F-Prot W32/MSIL_Injector.OG.gen!Eldorado 20180604
F-Secure Gen:Variant.MSILPerseus.142516 20180604
Fortinet MSIL/GenKryptik.BMGP!tr 20180604
GData Gen:Variant.MSILPerseus.142516 20180604
Ikarus Trojan.MSIL.Crypt 20180604
Sophos ML heuristic 20180601
Jiangmin Backdoor.Generic.anyi 20180604
K7AntiVirus Trojan ( 005242ab1 ) 20180604
K7GW Trojan ( 005242ab1 ) 20180604
Kaspersky HEUR:Backdoor.Win32.Generic 20180604
Malwarebytes Spyware.Pony 20180604
MAX malware (ai score=97) 20180604
McAfee GenericRXDU-SJ!353C972D301C 20180604
McAfee-GW-Edition GenericRXDU-SJ!353C972D301C 20180604
eScan Gen:Variant.MSILPerseus.142516 20180604
NANO-Antivirus Trojan.Win32.Kryptik.exjcvh 20180604
Palo Alto Networks (Known Signatures) generic.ml 20180604
Panda Trj/GdSda.A 20180604
Qihoo-360 Win32/Backdoor.d55 20180604
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/Generic-S 20180604
Symantec ML.Attribute.HighConfidence 20180604
Tencent Win32.Backdoor.Generic.Lhxc 20180604
TrendMicro TROJ_GEN.R002C0PAN18 20180604
TrendMicro-HouseCall TROJ_GEN.R002C0PAN18 20180604
VIPRE Trojan.Win32.Generic.pak!cobra 20180604
Webroot W32.Trojan.Gen 20180604
Yandex Trojan.Kryptik!VsFL/R2bgKU 20180529
ZoneAlarm by Check Point HEUR:Backdoor.Win32.Generic 20180604
Alibaba 20180604
Avast-Mobile 20180604
Babable 20180406
Bkav 20180604
ClamAV 20180604
CMC 20180604
CrowdStrike Falcon (ML) 20180202
Cybereason None
DrWeb 20180604
eGambit 20180604
Kingsoft 20180604
Microsoft 20180604
nProtect 20180604
Rising 20180604
SUPERAntiSpyware 20180604
Symantec Mobile Insight 20180601
TheHacker 20180531
TotalDefense 20180604
Trustlook 20180604
VBA32 20180604
ViRobot 20180604
Zillya 20180604
Zoner 20180604
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2018

Product Anystla
Original name Anystla.exe
Internal name Anystla.exe
File version 1.0.0.0
Description Anystla
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-01-23 03:56:02
Entry Point 0x00010ABE
Number of sections 3
.NET details
Module Version ID ed8506f2-5eab-4820-942a-23a726eca252
TypeLib ID c603742e-7f1e-4184-8ee5-ff2c037198ec
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 4
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Anystla

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
69632

EntryPoint
0x10abe

OriginalFileName
Anystla.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2018

FileVersion
1.0.0.0

TimeStamp
2018:01:23 04:56:02+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Anystla.exe

ProductVersion
1.0.0.0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
60416

ProductName
Anystla

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 353c972d301cb37166add5ce4fe5b2a4
SHA1 712b50b43509d047f677712a3277f6704bc421d7
SHA256 f411eaf2d3389764598d939c389df6bd7177ca0b632f92cab16b6ceb38a3e6d5
ssdeep
3072:NzZ22wAPDne83FPJjjjjjjjjjjzkoQCCCi:NzZpwAPl3lJk

authentihash ff9dd557176f894523f46962e69a1ccab131618d1acf6cb19b195fcbc8a2231f
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 127.5 KB ( 130560 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (81.0%)
Win32 Dynamic Link Library (generic) (7.2%)
Win32 Executable (generic) (4.9%)
OS/2 Executable (generic) (2.2%)
Generic Win/DOS Executable (2.2%)
Tags
peexe assembly

VirusTotal metadata
First submission 2018-01-23 11:55:09 UTC ( 1 year, 2 months ago )
Last submission 2018-01-23 11:55:09 UTC ( 1 year, 2 months ago )
File names FLASHUPDATE_038.EXE
flashupdate_038.exe
F411EAF2D3389764598D939C389DF6BD7177CA0B632F92CAB16B6CEB38A3E6D5
Anystla.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections
UDP communications