Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2017-Oct-22 02:33:41 |
Detected languages |
English - United States
|
Info | Matching compiler(s): | Microsoft Visual C++ 6.0 - 8.0 |
Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
|
Info | Cryptographic algorithms detected in the binary: |
Uses constants related to CRC32
Microsoft's Cryptography API |
Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
Suspicious | The PE is possibly a dropper. |
Resource 1 is possibly compressed or encrypted.
Resource 2 is possibly compressed or encrypted. Resource 7 is possibly compressed or encrypted. Resource 8 is possibly compressed or encrypted. Resource 9 is possibly compressed or encrypted. Resources amount for 77.0876% of the executable. |
Malicious | The PE's digital signature is invalid. |
Signer: Symantec Corporation
Issuer: VeriSign Class 3 Code Signing 2010 CA The file was modified after it was signed. |
Malicious | VirusTotal score: 65/72 (Scanned on 2025-01-16 11:46:30) |
ALYac:
Trojan.Ransom.BadRabbit
AVG: Win32:RansomX-gen [Ransom] AhnLab-V3: Trojan/Win.Diskcoder.R660164 Alibaba: Ransom:Win32/Agent.190220 Antiy-AVL: Trojan[Ransom]/Win32.BadRabbit.b Arcabit: Trojan.Ransom.BUZ Avast: Win32:RansomX-gen [Ransom] Avira: TR/Diskcoder.12352 BitDefender: Trojan.Ransom.BUZ Bkav: W32.RabInND.Worm CAT-QuickHeal: Ransom.BadRabbit.A5 CTX: dll.trojan.badrabbit ClamAV: Win.Trojan.Agent-6355731-0 CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 99) DeepInstinct: MALICIOUS DrWeb: Trojan.BadRabbit.3 ESET-NOD32: Win32/Diskcoder.D Elastic: malicious (high confidence) Emsisoft: Trojan.Ransom.BUZ (B) F-Secure: Trojan:W32/Rabbad.C FireEye: Generic.mg.1d724f95c61f1055 Fortinet: W32/Diskcoder.D!tr.ransom GData: Win32.Worm.BadRabbit.D Google: Detected Gridinsoft: Risk.Win32.Mimikatz.tr Ikarus: Trojan.Win32.Diskcoder Jiangmin: Trojan.BadRabbit.c K7AntiVirus: Ransomware ( 0051a4141 ) K7GW: Ransomware ( 0051a4141 ) Kaspersky: Trojan.Win32.Agentb.bxhn Kingsoft: Win32.Troj.BadRabbit.ac Lionic: Trojan.Win32.BadRabbit.4!c Malwarebytes: Malware.AI.4249922356 McAfee: Generic.adk McAfeeD: ti!579FD8A03854 MicroWorld-eScan: Trojan.Ransom.BUZ Microsoft: Ransom:Win32/Tibbar.A NANO-Antivirus: Trojan.Win32.Petya.euuhye Paloalto: generic.ml Panda: W32/Ransom.G.worm Rising: Ransom.BadRabbit!1.AC3A (CLASSIC) Sangfor: Suspicious.Win32.Save.a SentinelOne: Static AI - Suspicious PE Skyhigh: Generic.adk Sophos: Mal/Ransom-FK Symantec: Ransom.BadRabbit TACHYON: Ransom/W32.BadRabbit.410760 Tencent: Malware.Win32.Gencirc.10bdd57b Trapmine: malicious.high.ml.score TrendMicro: Ransom_BADRABBIT.A TrendMicro-HouseCall: Ransom_BADRABBIT.A VBA32: Trojan.BadRabbit VIPRE: Trojan.Ransom.BUZ Varist: W32/BadRabbit.CHEE-5527 ViRobot: Trojan.Win32.S.Ransom.410760 VirIT: Trojan.Win32.BadRabbit.A Xcitium: Malware@#3gadoxl0j791v Yandex: Trojan.GenAsa!mqi6oh25ijQ Zillya: Trojan.Diskcoder.Win32.101 Zoner: Trojan.Win32.63974 alibabacloud: Trojan:Win/Diskcoder.D huorong: Ransom/BadRabbit.a tehtris: Generic.Malware |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xe8 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 5 |
TimeDateStamp | 2017-Oct-22 02:33:41 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
|
Magic | PE32 |
---|---|
LinkerVersion | 10.0 |
SizeOfCode | 0xc000 |
SizeOfInitializedData | 0x54c00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00007938 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0xd000 |
ImageBase | 0x10000000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 5.1 |
ImageVersion | 0.0 |
SubsystemVersion | 5.1 |
Win32VersionValue | 0 |
SizeOfImage | 0x68000 |
SizeOfHeaders | 0x400 |
Checksum | 0x6fcb8 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
KERNEL32.dll |
InterlockedExchange
GetTempFileNameW PeekNamedPipe CreateProcessW ConnectNamedPipe GetModuleHandleW CreateNamedPipeW TerminateThread DisconnectNamedPipe DeleteFileW GlobalAlloc GetComputerNameExW GlobalFree ExitProcess GetModuleFileNameW DisableThreadLibraryCalls ResumeThread CreateMutexW FindResourceW FindNextFileW GetComputerNameW GetCurrentThread OpenProcess SizeofResource TerminateProcess GetLocalTime Process32FirstW LockResource Process32NextW CreateToolhelp32Snapshot GetCurrentProcessId LoadLibraryA VirtualProtect GetSystemTimeAsFileTime WideCharToMultiByte GetExitCodeProcess GetModuleHandleA InitializeCriticalSection HeapReAlloc EnterCriticalSection SetLastError LeaveCriticalSection GetTickCount MultiByteToWideChar GetSystemInfo CreateEventW CreateFileMappingW FindClose GetFileSizeEx GetEnvironmentVariableW FlushFileBuffers FlushViewOfFile GetLogicalDrives SetEvent WaitForSingleObject SetFilePointerEx SetEndOfFile GetDriveTypeW UnmapViewOfFile MapViewOfFile FindFirstFileW LocalFree LocalAlloc GetTimeZoneInformation GetSystemDefaultLCID HeapAlloc VirtualAlloc GetProcAddress ReadFile GetVersionExW LoadLibraryW WriteFile VirtualFree GetCurrentProcess FreeLibrary GetFileSize CloseHandle CreateFileW GetVersion GetLastError ExpandEnvironmentStringsW lstrcatW WaitForMultipleObjects CreateThread Sleep GetSystemDirectoryW GetProcessHeap HeapFree LoadResource |
---|---|
USER32.dll |
ExitWindowsEx
GetSystemMetrics CharUpperW wsprintfW wsprintfA |
ADVAPI32.dll |
RegFlushKey
CloseServiceHandle OpenSCManagerW RegQueryValueExW RegOpenKeyW QueryServiceStatus StartServiceW CreateProcessAsUserW DeleteService InitiateSystemShutdownExW DuplicateTokenEx SetTokenInformation DuplicateToken GetTokenInformation GetSidSubAuthorityCount OpenThreadToken GetSidSubAuthority SetThreadToken CredEnumerateW CredFree SetSecurityDescriptorDacl InitializeSecurityDescriptor CryptDuplicateKey CryptDuplicateHash CryptEncrypt CryptGenRandom CryptGetKeyParam CryptSetKeyParam CryptDeriveKey CryptHashData CryptDestroyHash CryptDestroyKey CryptCreateHash CryptImportKey CryptReleaseContext CryptAcquireContextW CryptGetHashParam CryptSetHashParam AdjustTokenPrivileges CheckTokenMembership FreeSid AllocateAndInitializeSid LookupPrivilegeValueW OpenProcessToken RegSetValueExW RegCloseKey RegOpenKeyExW CreateServiceW |
SHELL32.dll |
CommandLineToArgvW
|
ole32.dll |
CoCreateGuid
CoTaskMemFree StringFromCLSID |
CRYPT32.dll |
CryptStringToBinaryW
CryptImportPublicKeyInfo CryptBinaryToStringW CryptDecodeObjectEx |
SHLWAPI.dll |
PathFindFileNameW
StrChrW StrCmpW StrCmpIW StrToIntW PathAppendW StrStrW PathCombineW StrStrIW PathFindExtensionW StrCatW PathFileExistsW |
IPHLPAPI.DLL |
GetAdaptersInfo
GetIpNetTable |
WS2_32.dll |
select
ioctlsocket gethostbyname inet_ntoa ntohl WSAStartup connect inet_addr htons socket closesocket send recv __WSAFDIsSet |
MPR.dll |
WNetOpenEnumW
WNetEnumResourceW WNetCancelConnection2W WNetAddConnection2W WNetCloseEnum |
NETAPI32.dll |
NetApiBufferFree
NetWkstaGetInfo NetServerEnum NetServerGetInfo |
DHCPSAPI.DLL |
DhcpEnumSubnetClients
DhcpEnumSubnets DhcpRpcFreeMemory DhcpGetSubnetInfo |
msvcrt.dll |
memcpy
srand memset memmove free malloc sprintf rand |
Ordinal | 1 |
---|---|
Address | 0x79d7 |
Ordinal | 2 |
---|---|
Address | 0x7bf7 |
XOR Key | 0x761aa3aa |
---|---|
Unmarked objects | 0 |
ASM objects (VS2008 SP1 build 30729) | 4 |
C objects (VS2013 UPD5 build 40629) | 6 |
ASM objects (VS2013 UPD5 build 40629) | 1 |
Imports (VS2008 SP1 build 30729) | 27 |
Total imports | 215 |
175 (VS2010 SP1 build 40219) | 29 |
Exports (VS2010 SP1 build 40219) | 1 |
Linker (VS2010 SP1 build 40219) | 1 |