× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fbc61070ff96d8ef24123255ef417446a6fc0ab8b05da33c8c7d7b7a2234435a
File name: f97350d56b418c93b4fc2ac08e987e41
Detection ratio: 51 / 57
Analysis date: 2015-09-29 05:15:37 UTC ( 1 year, 10 months ago )
Antivirus Result Update
Ad-Aware Trojan.Generic.KD.914347 20150929
Yandex Trojan.Injector!XWZZ9oRWCPQ 20150928
AhnLab-V3 Trojan/Win32.HmBlocker 20150928
ALYac Trojan.Generic.KD.914347 20150929
Antiy-AVL Worm[Net]/Win32.Kolab 20150929
Arcabit Trojan.Generic.KD.DDF3AB 20150929
Avast Win32:Malware-gen 20150929
AVG Dropper.Generic7.COFM 20150929
Avira (no cloud) TR/Dropper.Gen 20150929
AVware Trojan.Win32.Agent.aaxv (v) 20150929
Baidu-International Trojan.Win32.Injector.AEJX 20150928
BitDefender Trojan.Generic.KD.914347 20150929
CAT-QuickHeal Trojan.Ircbrute.SU5 20150928
ClamAV Win.Trojan.Agent-687108 20150929
Comodo TrojWare.Win32.Injector.BGJ 20150929
Cyren W32/Trojan.WLUI-7811 20150929
DrWeb BackDoor.Gurl.2 20150929
Emsisoft Trojan.Generic.KD.914347 (B) 20150929
ESET-NOD32 Win32/Injector.AEJX 20150929
F-Prot W32/Trojan2.NWBR 20150929
F-Secure Trojan.Generic.KD.914347 20150929
Fortinet W32/Injector.AEJX!tr 20150929
GData Trojan.Generic.KD.914347 20150929
Ikarus Trojan.Win32.Ircbrute 20150929
Jiangmin Backdoor/Azbreg.bqi 20150927
K7AntiVirus Trojan ( 0040f5791 ) 20150928
K7GW Trojan ( 0040f5791 ) 20150929
Kaspersky HEUR:Trojan.Win32.Generic 20150929
Kingsoft Win32.Troj.Undef.(kcloud) 20150929
Malwarebytes Worm.AutoRun 20150929
McAfee Dropper-FED!F97350D56B41 20150929
McAfee-GW-Edition BehavesLike.Win32.Backdoor.qm 20150929
Microsoft Trojan:Win32/Lethic.B 20150929
eScan Trojan.Generic.KD.914347 20150929
NANO-Antivirus Trojan.Win32.Gurl.brorzr 20150929
nProtect Trojan.Generic.KD.914347 20150925
Panda Trj/Zbot.M 20150928
Qihoo-360 HEUR/Malware.QVM07.Gen 20150929
Rising PE:Malware.RDM.24!5.1E[F1] 20150928
Sophos AV Troj/Agent-AAXV 20150928
SUPERAntiSpyware Trojan.Agent/Gen-IRCBot 20150929
Symantec Packed.Generic.326 20150928
Tencent Win32.Trojan.Generic.Eegx 20150929
TheHacker Trojan/Injector.aejx 20150929
TotalDefense Win32/Tnega.ASAU 20150929
TrendMicro TROJ_IRCBRUTE.IO 20150929
TrendMicro-HouseCall TROJ_IRCBRUTE.IO 20150929
VBA32 BScope.Backdoor.IRCBot.2122 20150928
VIPRE Trojan.Win32.Agent.aaxv (v) 20150929
ViRobot Worm.Win32.Net-Kolab.68231[h] 20150929
Zoner Trojan.Lethic.AA 20150929
AegisLab 20150928
Alibaba 20150927
Bkav 20150928
ByteHero 20150929
CMC 20150928
Zillya 20150928
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-10-28 19:00:30
Entry Point 0x0000160F
Number of sections 5
PE sections
Overlays
MD5 cf40a1de3f93b4a025409b5efa5aa210
File type ASCII text
Offset 57344
Size 2000
Entropy 0.00
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetOEMCP
LCMapStringA
HeapDestroy
ExitProcess
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
GetCurrentProcess
GetEnvironmentStrings
AddAtomA
GetCPInfo
UnhandledExceptionFilter
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetStartupInfoA
GetACP
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
TerminateProcess
InitializeCriticalSection
HeapCreate
VirtualFree
TlsGetValue
GetFileType
GetTickCount
TlsSetValue
HeapAlloc
GetVersion
VirtualAlloc
SetLastError
LeaveCriticalSection
DrawAnimatedRects
FlashWindowEx
Number of PE resources by type
Struct(202) 1
Struct(211) 1
Number of PE resources by language
GERMAN NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2011:10:28 20:00:30+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
6.0

EntryPoint
0x160f

InitializedDataSize
32768

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 f97350d56b418c93b4fc2ac08e987e41
SHA1 7ce328e3d35bae7d5490089b96ff900b0cc1561c
SHA256 fbc61070ff96d8ef24123255ef417446a6fc0ab8b05da33c8c7d7b7a2234435a
ssdeep
768:HCbJTWdEDgbvXF3lU7rTTDlZ8ZNNWNC2NWK91YVnP0:HCbJTYEDclI/DlZ8ZNNWbwKIVns

authentihash 9c731a30a616271209e9eefa4b1e2b1f61df0314584b8da600b7145f33170789
imphash b41f22486d4aa79695588232cb2c7b00
File size 58.0 KB ( 59344 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 5.0 (56.7%)
Win32 Executable MS Visual C++ (generic) (29.1%)
Win32 Dynamic Link Library (generic) (6.1%)
Win32 Executable (generic) (4.2%)
Generic Win/DOS Executable (1.8%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2013-04-18 16:03:19 UTC ( 4 years, 3 months ago )
Last submission 2015-09-29 05:15:37 UTC ( 1 year, 10 months ago )
File names f97350d56b418c93b4fc2ac08e987e41
f97350d56b418c93b4fc2ac08e987e41.7ce328e3d35bae7d5490089b96ff900b0cc1561c
B2595.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs