× Obsługa plików cookie w przeglądarce jest wyłączona! Ta strona wymaga włączonej obsługi plików cookie, aby działać poprawnie
SHA256: 2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304
Nazwa pliku: Gully.exe
Współczynnik wykrycia: 50 / 61
Data analizy: 2017-07-02 20:46:55 UTC ( 3 miesiące, 3 tygodnie temu )
Antywirus Wynik Uaktualnij
Ad-Aware Gen:Variant.Kazy.166603 20170702
AegisLab Backdoor.W32.Azbreg.ubw!c 20170702
AhnLab-V3 Downloader/Win32.Dofoil.R65395 20170702
ALYac Gen:Variant.Kazy.166603 20170702
Antiy-AVL Trojan[Backdoor]/Win32.Azbreg 20170630
Arcabit Trojan.Kazy.D28ACB 20170702
Avast Win32:Malware-gen 20170702
AVG Win32:Malware-gen 20170702
Avira (no cloud) TR/Crypt.XPACK.Gen8 20170702
AVware Trojan.Win32.Zbocheman.fb (v) 20170702
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9924 20170630
BitDefender Gen:Variant.Kazy.166603 20170702
CAT-QuickHeal Worm.HamweqBot 20170701
Comodo TrojWare.Win32.Kryptik.AZFP 20170702
CrowdStrike Falcon (ML) malicious_confidence_65% (W) 20170420
Cyren W32/Trojan.XCFO-3673 20170702
DrWeb BackDoor.Ddoser.131 20170702
Emsisoft Gen:Variant.Kazy.166603 (B) 20170702
Endgame malicious (high confidence) 20170629
ESET-NOD32 Win32/AutoRun.KS 20170702
F-Secure Gen:Variant.Kazy.166603 20170702
Fortinet W32/Kryptik.AX!tr 20170629
GData Gen:Variant.Kazy.166603 20170702
Ikarus Trojan.Win32.Revoyem 20170702
Sophos ML heuristic 20170607
Jiangmin Backdoor/Azbreg.aoe 20170702
Kaspersky Backdoor.Win32.Azbreg.ubw 20170702
Kingsoft Win32.Troj.Generic.a.(kcloud) 20170702
McAfee Artemis!085F286A6F2C 20170702
McAfee-GW-Edition PWS-Zbot-FAUE!028AA5F1D4BE 20170702
Microsoft Worm:Win32/Hamweq 20170702
eScan Gen:Variant.Kazy.166603 20170702
NANO-Antivirus Trojan.Win32.Azbreg.cunbvk 20170702
nProtect Backdoor/W32.Azbreg.41984 20170702
Palo Alto Networks (Known Signatures) generic.ml 20170702
Panda Trj/Dtcontx.D 20170702
Qihoo-360 Win32/Backdoor.389 20170702
Rising Trojan.Generic (cloud:ZqYLOpEFnbQ) 20170702
Sophos AV Troj/Agent-ABIP 20170702
SUPERAntiSpyware Trojan.Agent/Gen-Downloader 20170702
Symantec W32.Pilleuz 20170701
Tencent Win32.Backdoor.Azbreg.Eyp 20170702
TheHacker Posible_Worm32 20170702
TotalDefense Win32/Tnega.ASAZ 20170702
VBA32 BScope.Trojan.MTA.2507 20170630
VIPRE Trojan.Win32.Zbocheman.fb (v) 20170702
ViRobot Trojan.Win32.Z.Azbreg.41984 20170702
Yandex Backdoor.Azbreg!aanmHZdZk9A 20170630
Zillya Backdoor.Azbreg.Win32.1985 20170701
ZoneAlarm by Check Point Backdoor.Win32.Azbreg.ubw 20170702
Alibaba 20170702
ClamAV 20170702
CMC 20170701
F-Prot 20170702
K7AntiVirus 20170702
K7GW 20170702
Malwarebytes 20170702
SentinelOne (Static ML) 20170516
Symantec Mobile Insight 20170630
TrendMicro 20170702
TrendMicro-HouseCall 20170702
Trustlook 20170702
Webroot 20170702
WhiteArmor 20170627
Zoner 20170702
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Sappy 2000 2010

Original name Gully.exe
File version 3, 7, 9
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-07-03 03:22:58
Entry Point 0x0017BFC0
Number of sections 3
PE sections
PE imports
SetBrushOrgEx
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
EndDialog
Number of PE resources by type
RT_DLGINCLUDE 16
RT_DIALOG 13
RT_VERSION 1
Number of PE resources by language
SPANISH COSTA RICA 30
PE resources
ExifTool file metadata
EDpDJvWBMUreoSWMgbSe
IPIRkOrkWMKOcRjJxbx2

SubsystemVersion
4.0

LinkerVersion
5.0

ImageVersion
0.0

FileVersionNumber
3.7.0.0

JJiUflpA5hv
NmdU3KMyDFG

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

LegalCopyright
Sappy 2000 2010

CharacterSet
Unicode

InitializedDataSize
4096

nfsNFqo4u8
8ProLidTplp

EntryPoint
0x17bfc0

Tag5K3apinproNFb1YMgRI
tj2ugQcxNDv7H

OriginalFileName
Gully.exe

MIMEType
application/octet-stream

J1LM7HSgIJASIedWQAGO
mto8keXPXbprb8WYrrXR

FileVersion
3, 7, 9

TimeStamp
2005:07:03 04:22:58+01:00

FileType
Win32 EXE

PEType
PE32

SRqxJ7DFMfAAWEt
4yy3DcW4whHHrNN

ProductVersion
3 7 502

hGBxcIgX3r16bsKUewD
VxiwFQjq1aQu

UninitializedDataSize
1515520

MachineType
Intel 386 or later, and compatibles

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

Tag2QoUvGNpRJqTolnCkRH
JGJftcHFDV

uJVvSFKGC21sLmsXN8
mgiYvT1eInT2DYx

fiBMkEJvEWPB5MRgIWev
NYVC62LkdUBMDwGf

CompanyName
He&m

CodeSize
40960

FileSubtype
0

ProductVersionNumber
3.7.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

u6Nro15J5knIn
axferH83jt3w8Q4

l3MtiF2kHQ3EsjodFu6
g4bJRmOC4VGL3SIW

File identification
MD5 085f286a6f2c31943aff11f301684b74
SHA1 b3e86c139d779aa3b715380af751c73e28016440
SHA256 2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304
ssdeep
768:JkRxwKSbI/hSYfPTavBQwZLLLrS7QvlieRaAVlpMauq28nblG:aRG3StDav2w9vlfaAVYa3285

authentihash 156ab63c6c89ef45e146e5eb40461933db8b52f347f0c5b4d917721aa8c023f1
imphash eff659f95d8517fd146fbb6f239133e7
File size 41.0 KB ( 41984 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe upx

VirusTotal metadata
First submission 2013-04-20 16:40:07 UTC ( 4 lata, 6 miesięcy temu )
Last submission 2015-09-29 04:31:07 UTC ( 2 lata temu )
Nazwy plików aa
2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304-41984
t2.exe
jNMd8yO.wbs
SEGSDPL.jpeg
085f286a6f2c31943aff11f301684b74
Gully.exe
hostsn.exe
hostsn.exeê
B2605.exe
sample.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Brak komentarzy. Żaden z członków społeczności VirusTotal nie skomentował tego. Bądź pierwszy, by to zrobić!

Skomentuj

?
Dodaj komentarz

Nie jesteś zalogowany. Tylko zarejestrowani użytkownicy mogą dodawać komentarze, zalogować się i mieć swój głos!

Brak ocen. Nikt jeszcze nie oddał swojego głosu, bądź pierwszy!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Code injections in the following processes
Runtime DLLs
DNS requests
TCP connections