× Sütik letiltva! Az oldal helyes működéséhez engedélyezni kell a sütiket.
SHA256: 5f1fcdfb951dc4642ce136a5d3e6bc42021f8e0cd631975a5eb3842da020531c
Fájl neve: Vfbmzerekbl
Észlelési arány: 54 / 66
Elemzés ideje: 2019-02-21 00:50:14 UTC ( 2 nap, 12 óra ezelőtt )
Vírusirtó Eredmény Utolsó frissítés
Ad-Aware Trojan.GenericKD.5101930 20190220
AhnLab-V3 Trojan/Win32.JaffCrypto.C1959547 20190220
ALYac Trojan.Ransom.Jaff 20190220
Antiy-AVL Trojan[Ransom]/Win32.Scatter 20190220
Arcabit Trojan.Generic.D4DD96A 20190220
Avast Win32:Trojan-gen 20190220
AVG Win32:Trojan-gen 20190220
Avira (no cloud) TR/Crypt.XPACK.zomwe 20190220
BitDefender Trojan.GenericKD.5101930 20190220
CAT-QuickHeal Ransom.JAFF.A4 20190220
ClamAV Win.Ransomware.Jaff-6316620-4 20190220
Comodo Malware@#zq0z4t1bbqwu 20190220
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190211
Cybereason malicious.b51e81 20190109
Cylance Unsafe 20190220
Cyren W32/Filecoder.PUQS-5261 20190220
DrWeb Trojan.Encoder.11498 20190220
Emsisoft Trojan.GenericKD.5101930 (B) 20190220
Endgame malicious (high confidence) 20190215
ESET-NOD32 Win32/Filecoder.Jaff.A 20190220
F-Secure Trojan.TR/Crypt.XPACK.zomwe 20190220
Fortinet W32/Filecoder_Jaff.A!tr 20190220
GData Win32.Trojan-Ransom.Jaff.C 20190220
Ikarus Trojan.Win32.Filecoder 20190220
Sophos ML heuristic 20181128
Jiangmin Trojan.Scatter.eg 20190220
K7AntiVirus Trojan ( 0050de1d1 ) 20190220
K7GW Trojan ( 0050de1d1 ) 20190220
Kaspersky Trojan-Ransom.Win32.Scatter.vd 20190220
MAX malware (ai score=100) 20190220
McAfee Generic.abu 20190220
McAfee-GW-Edition Generic.abu 20190220
Microsoft Ransom:Win32/Jaffrans.A 20190220
eScan Trojan.GenericKD.5101930 20190220
NANO-Antivirus Trojan.Win32.Scatter.epvmhq 20190220
Palo Alto Networks (Known Signatures) generic.ml 20190220
Panda Trj/WLT.C 20190220
Qihoo-360 Trojan.Generic 20190220
Rising Ransom.Scatter!8.139C (CLOUD) 20190220
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Troj/Ransom-EMU 20190220
SUPERAntiSpyware Ransom.Jaff/Variant 20190220
Symantec Ransom.Enciphered 20190220
TACHYON Ransom/W32.Scatter.163840 20190220
Tencent Win32.Trojan.Raas.Auto 20190220
TheHacker Trojan/Filecoder.Jaff.a 20190217
Trapmine malicious.high.ml.score 20190123
VBA32 SScope.TrojanRansom.WannaCry 20190220
VIPRE Trojan.Win32.Generic!BT 20190220
ViRobot Trojan.Win32.Ransom.163840.C 20190220
Webroot W32.Ransomware.Jaff 20190220
Yandex Trojan.Scatter! 20190219
ZoneAlarm by Check Point Trojan-Ransom.Win32.Scatter.vd 20190220
Zoner Trojan.Win32.58591 20190220
Acronis 20190220
AegisLab 20190220
Alibaba 20180921
Avast-Mobile 20190220
Babable 20180917
Baidu 20190214
CMC 20190220
eGambit 20190220
Kingsoft 20190220
Malwarebytes 20190220
Symantec Mobile Insight 20190220
TotalDefense 20190220
Trustlook 20190220
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © fltppzx e aeeb

Product Umhcrew mvh
Original name Vfbmzerekbl
Internal name Vfbmzerekbl
File version 6.486
Description Pa sf yrqbunq hsg
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-05-15 13:53:44
Entry Point 0x0001A61C
Number of sections 4
PE sections
PE imports
ADsOpenObject
ConvertSecDescriptorToVariant
PropVariantToAdsType2
ADsEnumerateNext
AdsTypeToPropVariant2
ConvertSecurityDescriptorToSecDes
AdsFreeAdsValues
ADsBuildVarArrayStr
ADsGetObject
ADsBuildEnumerator
ADsFreeEnumerator
ADsBuildVarArrayInt
PropVariantToAdsType
SetEntriesInAclA
RegQueryValueExW
RegOpenKeyExW
CloseFigure
SetDCPenColor
EnumObjects
SetPixel
SetArcDirection
SetPaletteEntries
Rectangle
SetThreadLocale
SetupComm
SetCurrentDirectoryW
RaiseException
SetEnvironmentVariableW
LoadLibraryA
GetModuleHandleA
lstrcmpA
FindResourceExW
GetStartupInfoA
EnumUILanguagesW
CloseHandle
SetConsoleCursorPosition
SetComputerNameExW
VirtualAlloc
GetProcAddress
SetCommTimeouts
_adj_fdiv_m32
__p__fmode
__dllonexit
_controlfp
_onexit
_except_handler3
_mbbtombc
_wfindnext
clock
_HUGE
qsort
isxdigit
exit
_XcptFilter
__setusermatherr
__p__commode
_acmdln
_ismbblead
_exit
_adjust_fdiv
_ismbbkalnum
__getmainargs
_wstat64
__badioinfo
_strerror
_mbbtype
_initterm
memchr
__set_app_type
SQLTablesW
SQLStatisticsW
SQLBrowseConnectW
SQLColumnPrivilegesA
ODBCInternalConnectW
SQLTablesA
DllBidEntryPoint
SQLBrowseConnectA
SQLTransact
SQLParamData
SQLGetConnectAttrW
SQLPrepareA
ODBCGetTryWaitValue
OpenODBCPerfData
SQLPrepareW
SQLGetConnectAttrA
SQLSetPos
SQLRowCount
GetODBCSharedData
SQLAllocHandle
SQLFreeEnv
SQLDriversW
SQLGetDiagRecA
CursorLibTransact
SQLBulkOperations
g_hHeapMalloc
SQLPutData
SQLConnectA
SQLSetDescFieldW
SQLGetCursorNameW
SQLDescribeParam
SQLErrorA
SQLEndTran
SQLGetTypeInfoW
SQLGetDiagFieldA
VFreeErrors
SQLColAttributesA
SQLSetScrollOptions
SQLFetchScroll
SQLGetDiagFieldW
SQLAllocConnect
CloseODBCPerfData
SQLColAttributesW
SQLGetConnectOptionW
SQLSetStmtAttrW
SQLNumParams
SQLBindParam
SQLProcedureColumnsA
SQLFetch
SQLGetConnectOptionA
SQLColAttributeW
SQLSetDescRec
SQLDisconnect
SQLMoreResults
SQLColumnsA
SQLGetCursorNameA
SQLTablePrivilegesW
SQLSetCursorNameA
SQLGetInfoW
SQLSetParam
SQLParamOptions
SQLTablePrivilegesA
SQLExecute
SQLFreeStmt
SearchStatusCode
SQLGetInfoA
SQLGetFunctions
SQLNativeSqlA
SQLPrimaryKeysW
SQLGetEnvAttr
PostODBCError
SQLPrimaryKeysA
SQLNativeSqlW
ODBCSetTryWaitValue
PostODBCComponentError
SQLCloseCursor
SQLSetDescFieldA
SQLGetDescFieldA
SQLAllocHandleStd
SQLDriverConnectW
SQLDescribeColA
SQLSetEnvAttr
SQLFreeConnect
SQLDriverConnectA
SQLDescribeColW
ODBCQualifyFileDSNW
SQLCancel
SQLForeignKeysA
SQLSpecialColumnsW
SQLColumnPrivilegesW
SQLForeignKeysW
SQLSpecialColumnsA
SQLNumResultCols
CursorLibLockStmt
SQLCopyDesc
CollectODBCPerfData
SQLGetStmtOption
SQLAllocEnv
SQLGetData
SQLGetDescRecW
CursorLibLockDbc
SQLGetStmtAttrA
SQLSetConnectAttrW
PostComponentError
SQLGetDescRecA
ValidateErrorQueue
SQLFreeHandle
SQLSetConnectAttrA
SQLExecDirectW
LockHandle
SQLSetConnectOptionA
SQLDataSourcesW
SQLExecDirectA
CursorLibLockDesc
SQLDataSourcesA
SQLBindParameter
SQLProceduresW
CloseOSObject
OpenOSObject
SetQueryNetSessionCount
SHGetPathFromIDListW
SHDeleteEmptyKeyW
ValidateRgn
PostMessageW
SetWindowTextA
DtcGetTransactionManagerExA
DtcGetTransactionManagerExW
GetDtcLocaleResourceHandle
Number of PE resources by type
RT_ACCELERATOR 5
RT_ICON 2
RT_STRING 2
RT_GROUP_ICON 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 13
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.486.0.0

LanguageCode
Unknown (0003)

FileFlagsMask
0x003f

FileDescription
Pa sf yrqbunq hsg

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unknown (0003)

InitializedDataSize
118784

EntryPoint
0x1a61c

OriginalFileName
Vfbmzerekbl

MIMEType
application/octet-stream

LegalCopyright
Copyright fltppzx e aeeb

FileVersion
6.486

TimeStamp
2017:05:15 06:53:44-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
Vfbmzerekbl

ProductVersion
6.486

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Tbn mfitlnky

CodeSize
106496

ProductName
Umhcrew mvh

ProductVersionNumber
6.486.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 f3d9b2cb51e81d12ff3d5faaca231041
SHA1 ca7cf9e472f34973216781c3a1e269c510af0300
SHA256 5f1fcdfb951dc4642ce136a5d3e6bc42021f8e0cd631975a5eb3842da020531c
ssdeep
3072:ho+Z3+yf/xg77QtPrn4FAsm+Ro5nLAdGkk3JIFBKuHIGQ5Nxb+b5knn:2o+yf+Kn4FAsm4MMd3kkKuHINLZ+9

authentihash 7d2b1d8ef9ccaf355658eea16d197fd1e335dd61f3230b04cc5c7f5729b64070
imphash c02ee2da36fedd83f5dd868cf320e1b5
Fájl méret 160.0 KB ( 163840 bytes )
Fájl típus Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 5.0 (39.0%)
Win32 Executable MS Visual C++ (generic) (20.0%)
Win64 Executable (generic) (17.7%)
Microsoft Visual C++ compiled executable (generic) (10.6%)
Win32 Dynamic Link Library (generic) (4.2%)
Tags
peexe

VirusTotal metadata
First submission 2017-05-17 12:37:51 UTC ( 1 év, 9 hónap ezelőtt )
Last submission 2018-10-08 06:02:23 UTC ( 4 hónap, 2 hét ezelőtt )
Fájl nevek Vfbmzerekbl.exe
f3d9b2cb51e81d12ff3d5faaca231041
Vfbmzerekbl
Vfbmzerekbl.exe
WannaCry.exe
jaf.exe_
malw
bbb.exe
hardiloch8.exe
Vfbmzerekbl.exe
bad.exe
hardiloch8.exe
f3d9b2cb51e81d12ff3d5faaca231041.exe
hjt67t.exe
Vfbmzerekbl.exe
X.exe
5f1fcdfb951dc4642ce136a5d3e6bc42021f8e0cd631975a5eb3842da020531c.bin
5f1fcdfb951dc4642ce136a5d3e6bc42021f8e0cd631975a5eb3842da020531c
hardiloch8.exe
hardiloch8.exe
Behaviour characterization
Zemana
dll-injection

Nincsenek hozzászólások. Még egy VirusTotal felhasználó sem írt bejegyzést ehhez, legyél te az első!

Hozzászólás írása...

?
Hozzászólás elküldése

Nem vagy bejelentkezve. Csak regisztrált felhasználók írhatnak hozzászólást, jelentkezz be és oszd meg a véleményed!

Nincsenek szavazatok. Még senki nem szavazott, legyél te az első!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications