× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f7f4e3b335a56e9334681f82da4f0170d2d633588008d022045885e26dd8c057
File name: rDos.exe
Detection ratio: 53 / 56
Analysis date: 2016-04-17 13:19:42 UTC ( 2 weeks, 3 days ago )
Antivirus Result Update
ALYac Trojan.Generic.5340905 20160417
AVG Generic20.BGST 20160417
AVware Trojan.Win32.Generic!BT 20160417
Ad-Aware Trojan.Generic.5340905 20160417
AegisLab Troj.DDoS.W32.Small.ae!c 20160417
AhnLab-V3 Win-Trojan/Rixdos.22748 20160416
Antiy-AVL Trojan[DDoS]/Win32.Small 20160416
Arcabit Trojan.Generic.D517EE9 20160417
Avast Win32:Agent-ATAC [PUP] 20160417
Avira (no cloud) TR/Htool.WEZ 20160416
Baidu-International Trojan.Win32.DDos.ae 20160416
BitDefender Trojan.Generic.5340905 20160417
CAT-QuickHeal DDoS.RixDos.r5 (Not a Virus) 20160416
CMC Trojan-DDoS.Win32.Small!O 20160415
ClamAV Win.Trojan.Small-15050 20160417
Comodo TrojWare.Win32.Agent.~TK 20160416
Cyren W32/Trojan.LPIG-4992 20160417
DrWeb DDoS.5781 20160417
ESET-NOD32 Win32/HackTool.DosTool.B potentially unsafe 20160416
Emsisoft Trojan.Generic.5340905 (B) 20160417
F-Prot W32/Trojan4.AEMW 20160417
F-Secure Trojan.Generic.5340905 20160417
Fortinet Riskware/DDoS 20160417
GData Trojan.Generic.5340905 20160417
Ikarus Trojan-DDoS.Win32.Small 20160416
Jiangmin TrojanDDoS.Small.e 20160417
K7AntiVirus Trojan ( 001f0b381 ) 20160417
K7GW Trojan ( 001f0b381 ) 20160417
Kaspersky Trojan-DDoS.Win32.Small.ae 20160417
Kingsoft Win32.Malware.Heur_Generic.A.(kcloud) 20160417
Malwarebytes HackTool.DDoS 20160417
McAfee Generic.mb 20160417
McAfee-GW-Edition Generic.mb 20160416
eScan Trojan.Generic.5340905 20160417
Microsoft Trojan:Win32/Bagsu!rfn 20160417
NANO-Antivirus Trojan.Win32.Small.dlmme 20160417
Panda Generic Malware 20160416
Qihoo-360 Adware/Win32.180solutions.BM 20160417
Rising PE:Malware.Generic(Thunder)!1.A1C4 [F] 20160417
SUPERAntiSpyware Trojan.Agent/Gen-DDoS 20160417
Sophos Troj/DDos-AO 20160417
Symantec Trojan.Gen 20160417
Tencent Win32.Trojan-ddos.Small.Wwei 20160417
TheHacker Trojan/DDOS.Small.ae 20160416
TrendMicro HKTL_DDOS 20160417
TrendMicro-HouseCall HKTL_DDOS 20160417
VBA32 TrojanDDoS.Small 20160415
VIPRE Trojan.Win32.Generic!BT 20160417
ViRobot Trojan.Win32.S.DDos-Agent.22748[h] 20160417
Yandex Trojan.DDoS.Small!4r+BVUVDxro 20160416
Zillya Tool.Small.Win32.180 20160416
Zoner Trojan.Small 20160417
nProtect Trojan/W32.DoS.22748 20160415
Alibaba 20160415
Baidu 20160416
Bkav 20160415
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
Packers identified
F-PROT embedded
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-06-29 23:57:02
Entry Point 0x00001280
Number of sections 5
PE sections
Overlays
MD5 9922503862e610f0e869fa550b487352
File type data
Offset 7680
Size 15068
Entropy 3.90
PE imports
GetAtomNameA
GetStdHandle
AddAtomA
SetUnhandledExceptionFilter
FindAtomA
ExitProcess
SetConsoleTextAttribute
SetConsoleTitleA
Sleep
GetAsyncKeyState
MessageBoxA
socket
inet_addr
send
WSACleanup
WSAStartup
connect
htons
closesocket
_cexit
__p__fmode
malloc
puts
__p__environ
_beginthread
memset
free
_onexit
atexit
abort
_setmode
_assert
__getmainargs
fgets
printf
atoi
_iob
signal
__set_app_type
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

TimeStamp
2009:06:30 00:57:02+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
3584

LinkerVersion
2.56

FileTypeExtension
exe

InitializedDataSize
6656

SubsystemVersion
4.0

EntryPoint
0x1280

OSVersion
4.0

ImageVersion
1.0

UninitializedDataSize
400384

Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 ddd822d85f905d0c62367e95e9c52530
SHA1 51144cd598dafa90ae11c808ecda599c0a40d859
SHA256 f7f4e3b335a56e9334681f82da4f0170d2d633588008d022045885e26dd8c057
ssdeep
192:U4/aTd/GMGiGzsnX47i47CmFBaWi803On9gB/mPbyr89E85CN+:Ubd/BGiyeMiMCYab3O9C/Em49E88c

authentihash 46b377b324459016dabd3de26172d83be55dac990dadc32df228e8fcb68fe844
imphash 997934a889223499f07c057666eafeb7
File size 22.2 KB ( 22748 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.6%)
Win32 Dynamic Link Library (generic) (14.6%)
Win32 Executable (generic) (10.0%)
Win16/32 Executable Delphi generic (4.6%)
Generic Win/DOS Executable (4.4%)
Tags
peexe overlay via-tor

VirusTotal metadata
First submission 2009-06-30 08:07:52 UTC ( 6 years, 10 months ago )
Last submission 2016-04-17 13:19:42 UTC ( 2 weeks, 3 days ago )
File names "rDos.exe"
Dos Bitches.exe
output.9217596.txt
rDos_By_Thefalconspeed1.exe
file
rDos by wall.exe
ghkjkiuj.exe
rDos (1).exe
rDos (2).exe
file-214526_exe
ddd822d85f905d0c62367e95e9c52530.PE_
DOS Flooder.exe
ddd822d85f905d0c62367e95e9c52530.exe
gzaqwe-game.exe
rDos by Carlitos.exe
1286068536.rDos.exe
rDos(1).exe
balls.exe
asd.exe
blob
smona_f7f4e3b335a56e9334681f82da4f0170d2d633588008d022045885e26dd8c057.bin
9217596
rDos.exe
rDos By Scifen.exe
ddos.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!