× 쿠키가 비활성화 되어 있습니다! 이 사이트는 작업을 제대로 하려면 쿠키 활성화가 필요합니다.
SHA256: 2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304
파일 이름: Gully.exe
탐지 비율: 51 / 60
분석 날짜: 2017-03-17 04:34:26 UTC ( 2개월, 1주 전 )
안티바이러스 결과 업데이트
Ad-Aware Gen:Variant.Kazy.166603 20170316
AegisLab Backdoor.W32.Azbreg.ubw!c 20170316
AhnLab-V3 Downloader/Win32.Dofoil.R65395 20170316
ALYac Gen:Variant.Kazy.166603 20170316
Antiy-AVL Trojan[Backdoor]/Win32.Azbreg 20170316
Arcabit Trojan.Kazy.D28ACB 20170316
Avast Win32:Malware-gen 20170316
AVG SHeur4.BGVM 20170316
Avira (no cloud) TR/Crypt.XPACK.Gen8 20170316
AVware Trojan.Win32.Zbocheman.fb (v) 20170316
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9924 20170316
BitDefender Gen:Variant.Kazy.166603 20170316
Bkav W32.GenericDorkbotF.Trojan 20170316
CAT-QuickHeal Worm.HamweqBot 20170316
Comodo TrojWare.Win32.Kryptik.AZFP 20170316
CrowdStrike Falcon (ML) malicious_confidence_67% (D) 20170130
Cyren W32/Trojan.XCFO-3673 20170316
DrWeb BackDoor.Ddoser.131 20170316
Emsisoft Gen:Variant.Kazy.166603 (B) 20170316
Endgame malicious (high confidence) 20170222
ESET-NOD32 Win32/AutoRun.KS 20170316
F-Secure Gen:Variant.Kazy.166603 20170316
Fortinet W32/Kryptik.AX!tr 20170316
GData Gen:Variant.Kazy.166603 20170316
Ikarus Trojan-Ransom.Win32.Gimemo 20170316
Invincea trojanspy.win32.usteal.d 20170203
Jiangmin Backdoor/Azbreg.aoe 20170316
Kaspersky Backdoor.Win32.Azbreg.ubw 20170316
McAfee Artemis!085F286A6F2C 20170316
McAfee-GW-Edition BehavesLike.Win32.Yahlover.pc 20170316
Microsoft Worm:Win32/Hamweq.A 20170316
eScan Gen:Variant.Kazy.166603 20170316
NANO-Antivirus Trojan.Win32.Azbreg.cunbvk 20170316
nProtect Backdoor/W32.Azbreg.41984 20170316
Palo Alto Networks (Known Signatures) generic.ml 20170317
Panda Trj/Dtcontx.D 20170316
Rising Trojan.Generic (cloud:ZqYLOpEFnbQ) 20170317
Sophos Troj/Agent-ABIP 20170317
SUPERAntiSpyware Trojan.Agent/Gen-Downloader 20170317
Symantec W32.Pilleuz 20170317
Tencent Win32.Backdoor.Azbreg.Eyp 20170317
TheHacker Posible_Worm32 20170315
TotalDefense Win32/Tnega.ASAZ 20170317
TrendMicro TROJ_IRCBRUTE.BC 20170317
TrendMicro-HouseCall TROJ_IRCBRUTE.BC 20170317
VBA32 BScope.Trojan.MTA.2507 20170316
VIPRE Trojan.Win32.Zbocheman.fb (v) 20170317
Webroot Trojan.Dropper.Gen 20170317
Yandex Backdoor.Azbreg!aanmHZdZk9A 20170315
Zillya Backdoor.Azbreg.Win32.1985 20170314
ZoneAlarm by Check Point Backdoor.Win32.Azbreg.ubw 20170316
Alibaba 20170228
ClamAV 20170316
CMC 20170316
F-Prot 20170316
K7AntiVirus 20170316
K7GW 20170316
Kingsoft 20170317
Malwarebytes 20170316
Trustlook 20170317
ViRobot 20170316
WhiteArmor 20170315
Zoner 20170316
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Sappy 2000 2010

Original name Gully.exe
File version 3, 7, 9
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-07-03 03:22:58
Entry Point 0x0017BFC0
Number of sections 3
PE sections
PE imports
SetBrushOrgEx
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
EndDialog
Number of PE resources by type
RT_DLGINCLUDE 16
RT_DIALOG 13
RT_VERSION 1
Number of PE resources by language
SPANISH COSTA RICA 30
PE resources
ExifTool file metadata
EDpDJvWBMUreoSWMgbSe
IPIRkOrkWMKOcRjJxbx2

SubsystemVersion
4.0

LinkerVersion
5.0

ImageVersion
0.0

FileVersionNumber
3.7.0.0

JJiUflpA5hv
NmdU3KMyDFG

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

LegalCopyright
Sappy 2000 2010

CharacterSet
Unicode

InitializedDataSize
4096

nfsNFqo4u8
8ProLidTplp

EntryPoint
0x17bfc0

Tag5K3apinproNFb1YMgRI
tj2ugQcxNDv7H

OriginalFileName
Gully.exe

MIMEType
application/octet-stream

J1LM7HSgIJASIedWQAGO
mto8keXPXbprb8WYrrXR

FileVersion
3, 7, 9

TimeStamp
2005:07:03 04:22:58+01:00

FileType
Win32 EXE

PEType
PE32

SRqxJ7DFMfAAWEt
4yy3DcW4whHHrNN

ProductVersion
3 7 502

hGBxcIgX3r16bsKUewD
VxiwFQjq1aQu

UninitializedDataSize
1515520

MachineType
Intel 386 or later, and compatibles

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

Tag2QoUvGNpRJqTolnCkRH
JGJftcHFDV

uJVvSFKGC21sLmsXN8
mgiYvT1eInT2DYx

fiBMkEJvEWPB5MRgIWev
NYVC62LkdUBMDwGf

CompanyName
He&m

CodeSize
40960

FileSubtype
0

ProductVersionNumber
3.7.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

u6Nro15J5knIn
axferH83jt3w8Q4

l3MtiF2kHQ3EsjodFu6
g4bJRmOC4VGL3SIW

File identification
MD5 085f286a6f2c31943aff11f301684b74
SHA1 b3e86c139d779aa3b715380af751c73e28016440
SHA256 2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304
ssdeep
768:JkRxwKSbI/hSYfPTavBQwZLLLrS7QvlieRaAVlpMauq28nblG:aRG3StDav2w9vlfaAVYa3285

authentihash 156ab63c6c89ef45e146e5eb40461933db8b52f347f0c5b4d917721aa8c023f1
imphash eff659f95d8517fd146fbb6f239133e7
File size 41.0 KB ( 41984 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe upx

VirusTotal metadata
First submission 2013-04-20 16:40:07 UTC ( 4년, 1개월 전 )
Last submission 2015-09-29 04:31:07 UTC ( 1년, 8개월 전 )
파일 이름 2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304-41984
t2.exe
085f286a6f2c31943aff11f301684b74
Gully.exe
hostsn.exe
hostsn.exeê
B2605.exe
sample.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
댓글이 없습니다.. 이 항목에 대해 댓글을 작성한 바이러스토탈 커뮤니티 회원이 아직 없습니다. 첫 번째로 댓글을 작성해 보십시오!

댓글 남기기...

?
댓글 달기

로그인 안됨. 등록된 사용자만 댓글을 남길 수 있습니다. 로그인하여 댓글을 남겨보십시오!

투표가 없습니다.. 아직 이 항목에 투표한 사람이 없습니다. 첫 번째로 투표해 보십시오!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Code injections in the following processes
Runtime DLLs
DNS requests
TCP connections