| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2006-Sep-18 10:22:54 |
| Detected languages |
Chinese - PRC
|
| CompanyName | 1 |
| ProductName | kill |
| FileVersion | 1.00 |
| ProductVersion | 1.00 |
| InternalName | tel.xls |
| OriginalFilename | tel.xls.exe |
| Info | Matching compiler(s): |
Microsoft Visual Basic v5.0/v6.0
Microsoft Visual Basic v5.0 - v6.0 Microsoft Visual Basic v6.0 |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
May have dropper capabilities:
|
| Malicious | VirusTotal score: 62/71 (Scanned on 2023-05-27 12:18:37) |
ALYac:
Trojan.VB-atg
APEX: Malicious AVG: Win32:VB-BBA [Trj] AhnLab-V3: Worm/Win32.AutoRun.R4172 Alibaba: Worm:Win32/Texel.39abea3e Arcabit: Win32.Worm.VB.DG Avast: Win32:VB-BBA [Trj] Avira: TR/Crypt.CFI.Gen Baidu: Win32.Worm.VB.sj BitDefender: Win32.Worm.VB.DG BitDefenderTheta: AI:Packer.FD5FEF2B1D Bkav: W32.QQRob.Trojan ClamAV: Win.Trojan.Generic-8593886-0 CrowdStrike: win/malicious_confidence_100% (W) Cybereason: malicious.e4bbf2 Cylance: unsafe Cynet: Malicious (score: 99) Cyren: W32/Trojan.UYVL-6286 DeepInstinct: MALICIOUS DrWeb: Trojan.Unsecure ESET-NOD32: Win32/VB.OSI Elastic: malicious (high confidence) Emsisoft: Win32.Worm.VB.DG (B) F-Secure: Trojan.TR/Crypt.CFI.Gen FireEye: Generic.mg.38f0d47e4bbf2c5f Fortinet: W32/AutoRun.RPV!worm GData: Win32.Worm.VB.DG Google: Detected Ikarus: Virus.Win32.Texel Jiangmin: Trojan/VB.ads K7AntiVirus: P2PWorm ( 0051e64b1 ) K7GW: P2PWorm ( 0051e64b1 ) Kaspersky: Virus.Win32.Texel.a Lionic: Virus.Win32.Texel.n!c MAX: malware (ai score=100) Malwarebytes: Malware.AI.3283652613 MaxSecure: Virus.W32.Texel.A McAfee: W32/Generic.p!worm McAfee-GW-Edition: W32/Generic.p!worm MicroWorld-eScan: Win32.Worm.VB.DG Microsoft: Worm:Win32/Cacfu.A NANO-Antivirus: Virus.Win32.Texel.bcexhy Panda: W32/Guarder.D.worm Rising: Trojan.Win32.VB.ync (CLASSIC) SUPERAntiSpyware: Trojan.Agent/Gen-Cacfu Sangfor: Worm.Win32.VB.OSI SentinelOne: Static AI - Suspicious PE Sophos: Troj/QQRob-AAT Symantec: Infostealer.QQRob.A TACHYON: Trojan/W32.VB-Small.45056.AO Tencent: Trojan.Win32.VB.twq Trapmine: suspicious.low.ml.score TrendMicro: WORM_VB.CKH TrendMicro-HouseCall: WORM_VB.CKH VIPRE: Win32.Worm.VB.DG ViRobot: Trojan.Win32.VB.45056.V VirIT: Trojan.Win32.VB.DH Webroot: W32.Worm.Gen Xcitium: Worm.Win32.VB.~DC@15oyp Yandex: Trojan.GenAsa!9UJWxyQqbKw Zillya: Worm.VB.Win32.24700 ZoneAlarm: Virus.Win32.Texel.a |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xb8 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 2006-Sep-18 10:22:54 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 6.0 |
| SizeOfCode | 0x8000 |
| SizeOfInitializedData | 0x2000 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x000018E0 (Section: .text) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0x9000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x1000 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 1.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0xb000 |
| SizeOfHeaders | 0x1000 |
| Checksum | 0x17dce |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| MSVBVM60.DLL |
__vbaVarSub
_CIcos _adj_fptan __vbaVarMove __vbaStrI4 __vbaFreeVar __vbaLenBstr __vbaStrVarMove __vbaLineInputStr __vbaEnd __vbaFreeVarList _adj_fdiv_m64 __vbaVarIndexStore __vbaFreeObjList _adj_fprem1 #518 __vbaStrCat __vbaLsetFixstr #553 __vbaSetSystemError #661 __vbaHresultCheckObj _adj_fdiv_m32 #593 #594 __vbaOnError __vbaObjSet _adj_fdiv_m16i __vbaObjSetAddref _adj_fdivr_m16i __vbaVarIndexLoad __vbaBoolVarNull _CIsin #632 __vbaChkstk __vbaFileClose EVENT_SINK_AddRef __vbaStrCmp __vbaVarTstEq __vbaObjVar DllFunctionCall __vbaVarOr __vbaVarLateMemSt _adj_fpatan __vbaFixstrConstruct EVENT_SINK_Release __vbaNew #600 _CIsqrt __vbaVarAnd EVENT_SINK_QueryInterface __vbaVarMul __vbaExceptHandler __vbaStrToUnicode __vbaPrintFile __vbaDateStr _adj_fprem _adj_fdivr_m64 #607 #608 __vbaFPException __vbaInStrVar __vbaStrVarVal __vbaVarCat __vbaDateVar #645 _CIlog __vbaErrorOverflow __vbaFileOpen __vbaNew2 _adj_fdiv_m32i _adj_fdivr_m32i __vbaStrCopy __vbaVarSetObj __vbaFreeStrList __vbaVarNot #576 _adj_fdivr_m32 _adj_fdiv_r #100 __vbaI4Var __vbaVarCmpEq #610 __vbaVarAdd __vbaLateMemCall __vbaStrToAnsi __vbaFpI4 __vbaVarTstGe __vbaVarCopy __vbaVarLateMemCallLd #617 __vbaVarSetObjAddref _CIatan __vbaStrMove __vbaCastObj __vbaStrVarCopy _allmul #545 _CItan #546 _CIexp __vbaFreeObj __vbaFreeStr #580 |
|---|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.0 |
| ProductVersion | 1.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | Chinese - PRC |
| CompanyName | 1 |
| ProductName | kill |
| FileVersion (#2) | 1.00 |
| ProductVersion (#2) | 1.00 |
| InternalName | tel.xls |
| OriginalFilename | tel.xls.exe |
| Resource LangID | Chinese - PRC |
|---|
| XOR Key | 0x8897fe31 |
|---|---|
| Unmarked objects | 0 |
| 14 (7299) | 1 |
| 9 (8783) | 1 |
| 13 (VS98 SP6 build 8804) | 1 |