× Obsługa plików cookie w przeglądarce jest wyłączona! Ta strona wymaga włączonej obsługi plików cookie, aby działać poprawnie
SHA256: 2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304
Nazwa pliku: Gully.exe
Współczynnik wykrycia: 51 / 60
Data analizy: 2017-03-17 04:34:26 UTC ( 3 miesiące, 1 tydzień temu )
Antywirus Wynik Uaktualnij
Ad-Aware Gen:Variant.Kazy.166603 20170316
AegisLab Backdoor.W32.Azbreg.ubw!c 20170316
AhnLab-V3 Downloader/Win32.Dofoil.R65395 20170316
ALYac Gen:Variant.Kazy.166603 20170316
Antiy-AVL Trojan[Backdoor]/Win32.Azbreg 20170316
Arcabit Trojan.Kazy.D28ACB 20170316
Avast Win32:Malware-gen 20170316
AVG SHeur4.BGVM 20170316
Avira (no cloud) TR/Crypt.XPACK.Gen8 20170316
AVware Trojan.Win32.Zbocheman.fb (v) 20170316
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9924 20170316
BitDefender Gen:Variant.Kazy.166603 20170316
Bkav W32.GenericDorkbotF.Trojan 20170316
CAT-QuickHeal Worm.HamweqBot 20170316
Comodo TrojWare.Win32.Kryptik.AZFP 20170316
CrowdStrike Falcon (ML) malicious_confidence_67% (D) 20170130
Cyren W32/Trojan.XCFO-3673 20170316
DrWeb BackDoor.Ddoser.131 20170316
Emsisoft Gen:Variant.Kazy.166603 (B) 20170316
Endgame malicious (high confidence) 20170222
ESET-NOD32 Win32/AutoRun.KS 20170316
F-Secure Gen:Variant.Kazy.166603 20170316
Fortinet W32/Kryptik.AX!tr 20170316
GData Gen:Variant.Kazy.166603 20170316
Ikarus Trojan-Ransom.Win32.Gimemo 20170316
Invincea trojanspy.win32.usteal.d 20170203
Jiangmin Backdoor/Azbreg.aoe 20170316
Kaspersky Backdoor.Win32.Azbreg.ubw 20170316
McAfee Artemis!085F286A6F2C 20170316
McAfee-GW-Edition BehavesLike.Win32.Yahlover.pc 20170316
Microsoft Worm:Win32/Hamweq.A 20170316
eScan Gen:Variant.Kazy.166603 20170316
NANO-Antivirus Trojan.Win32.Azbreg.cunbvk 20170316
nProtect Backdoor/W32.Azbreg.41984 20170316
Palo Alto Networks (Known Signatures) generic.ml 20170317
Panda Trj/Dtcontx.D 20170316
Rising Trojan.Generic (cloud:ZqYLOpEFnbQ) 20170317
Sophos Troj/Agent-ABIP 20170317
SUPERAntiSpyware Trojan.Agent/Gen-Downloader 20170317
Symantec W32.Pilleuz 20170317
Tencent Win32.Backdoor.Azbreg.Eyp 20170317
TheHacker Posible_Worm32 20170315
TotalDefense Win32/Tnega.ASAZ 20170317
TrendMicro TROJ_IRCBRUTE.BC 20170317
TrendMicro-HouseCall TROJ_IRCBRUTE.BC 20170317
VBA32 BScope.Trojan.MTA.2507 20170316
VIPRE Trojan.Win32.Zbocheman.fb (v) 20170317
Webroot Trojan.Dropper.Gen 20170317
Yandex Backdoor.Azbreg!aanmHZdZk9A 20170315
Zillya Backdoor.Azbreg.Win32.1985 20170314
ZoneAlarm by Check Point Backdoor.Win32.Azbreg.ubw 20170316
Alibaba 20170228
ClamAV 20170316
CMC 20170316
F-Prot 20170316
K7AntiVirus 20170316
K7GW 20170316
Kingsoft 20170317
Malwarebytes 20170316
Trustlook 20170317
ViRobot 20170316
WhiteArmor 20170315
Zoner 20170316
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Sappy 2000 2010

Original name Gully.exe
File version 3, 7, 9
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-07-03 03:22:58
Entry Point 0x0017BFC0
Number of sections 3
PE sections
PE imports
SetBrushOrgEx
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
EndDialog
Number of PE resources by type
RT_DLGINCLUDE 16
RT_DIALOG 13
RT_VERSION 1
Number of PE resources by language
SPANISH COSTA RICA 30
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

FileTypeExtension
exe

UninitializedDataSize
1515520

InitializedDataSize
4096

ImageVersion
0.0

FileVersionNumber
3.7.0.0

JJiUflpA5hv
NmdU3KMyDFG

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
5.0

nfsNFqo4u8
8ProLidTplp

Subsystem
Windows GUI

Tag5K3apinproNFb1YMgRI
tj2ugQcxNDv7H

OriginalFileName
Gully.exe

EDpDJvWBMUreoSWMgbSe
IPIRkOrkWMKOcRjJxbx2

J1LM7HSgIJASIedWQAGO
mto8keXPXbprb8WYrrXR

FileVersion
3, 7, 9

TimeStamp
2005:07:03 04:22:58+01:00

FileType
Win32 EXE

PEType
PE32

SRqxJ7DFMfAAWEt
4yy3DcW4whHHrNN

ProductVersion
3 7 502

hGBxcIgX3r16bsKUewD
VxiwFQjq1aQu

SubsystemVersion
4.0

fiBMkEJvEWPB5MRgIWev
NYVC62LkdUBMDwGf

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
Sappy 2000 2010

u6Nro15J5knIn
axferH83jt3w8Q4

uJVvSFKGC21sLmsXN8
mgiYvT1eInT2DYx

MachineType
Intel 386 or later, and compatibles

CompanyName
He&m

CodeSize
40960

FileSubtype
0

ProductVersionNumber
3.7.0.0

EntryPoint
0x17bfc0

ObjectFileType
Executable application

Tag2QoUvGNpRJqTolnCkRH
JGJftcHFDV

l3MtiF2kHQ3EsjodFu6
g4bJRmOC4VGL3SIW

File identification
MD5 085f286a6f2c31943aff11f301684b74
SHA1 b3e86c139d779aa3b715380af751c73e28016440
SHA256 2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304
ssdeep
768:JkRxwKSbI/hSYfPTavBQwZLLLrS7QvlieRaAVlpMauq28nblG:aRG3StDav2w9vlfaAVYa3285

authentihash 156ab63c6c89ef45e146e5eb40461933db8b52f347f0c5b4d917721aa8c023f1
imphash eff659f95d8517fd146fbb6f239133e7
File size 41.0 KB ( 41984 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe upx

VirusTotal metadata
First submission 2013-04-20 16:40:07 UTC ( 4 lata, 2 miesiące temu )
Last submission 2015-09-29 04:31:07 UTC ( 1 rok, 8 miesięcy temu )
Nazwy plików aa
2f16a1a7f66c4291d67cf1a1b967c76d9f1555ed35e9b2c413ea02e00db84304-41984
t2.exe
085f286a6f2c31943aff11f301684b74
Gully.exe
hostsn.exe
hostsn.exeê
B2605.exe
sample.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Brak komentarzy. Żaden z członków społeczności VirusTotal nie skomentował tego. Bądź pierwszy, by to zrobić!

Skomentuj

?
Dodaj komentarz

Nie jesteś zalogowany. Tylko zarejestrowani użytkownicy mogą dodawać komentarze, zalogować się i mieć swój głos!

Brak ocen. Nikt jeszcze nie oddał swojego głosu, bądź pierwszy!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Code injections in the following processes
Runtime DLLs
DNS requests
TCP connections