Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 1992-Jun-19 22:22:17 |
Detected languages |
English - United States
Russian - Russia |
Comments | |
CompanyName | Xfer KeyGen |
FileDescription | Xfer KeyGen 1.0 Installation |
FileVersion | 1.0 |
LegalCopyright | Xfer KeyGen |
Suspicious | Strings found in the binary may indicate undesirable behavior: |
May have dropper capabilities:
|
Malicious | This program may be a miner. |
Contains a valid Monero address:
|
Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
Suspicious | The PE header may have been manually modified. |
The resource timestamps differ from the PE header:
|
Suspicious | The file contains overlay data. |
1948577 bytes of data starting at offset 0x4d400.
The overlay data has an entropy of 7.99962 and is possibly compressed or encrypted. Overlay data amounts for 86.0302% of the executable. |
Malicious | VirusTotal score: 51/72 (Scanned on 2024-10-05 06:32:30) |
ALYac:
Application.Generic.3558935
APEX: Malicious AVG: Win64:CoinminerX-gen [Trj] Alibaba: Trojan:Win32/Miners.cb6a34b1 Antiy-AVL: Trojan/Win32.SGeneric Arcabit: Application.Generic.D364E17 Avast: Win64:CoinminerX-gen [Trj] BitDefender: Application.Generic.3558935 CTX: exe.unknown.generic ClamAV: Win.Trojan.Miner-10015797-0 CrowdStrike: win/grayware_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: Tool.Nssm.6 ESET-NOD32: a variant of Win64/CoinMiner.IZ potentially unwanted Elastic: malicious (high confidence) Emsisoft: Application.Generic.3558935 (B) FireEye: Application.Generic.3558935 Fortinet: W32/CoinMiner.FQ!tr GData: Application.Generic.3558935 Google: Detected Ikarus: Trojan.Win64.CoinMiner K7AntiVirus: Unwanted-Program ( 0052f55b1 ) K7GW: Unwanted-Program ( 0052f55b1 ) Kaspersky: HEUR:Trojan.Win32.Miner.gen Kingsoft: malware.kb.a.962 Lionic: Trojan.Win32.Miner.4!c Malwarebytes: Generic.Malware.AI.DDS MaxSecure: Trojan-Ransom.Win32.Crypmod.zfq McAfee: Artemis!3F6C3C5776FD McAfeeD: ti!4DA53A499B4D MicroWorld-eScan: Application.Generic.3558935 Microsoft: Trojan:Win64/DisguisedXMRigMiner NANO-Antivirus: Trojan.Win64.Miner.kfditp Paloalto: generic.ml Panda: Trj/CI.A Rising: Trojan.Kryptik@AI.86 (RDML:vGUTHnScOZJ3+BNucqbgyQ) SentinelOne: Static AI - Malicious PE Skyhigh: BehavesLike.Win32.Dropper.vc Sophos: Generic Reputation PUA (PUA) Symantec: ML.Attribute.HighConfidence Tencent: Win32.Risktool.Bitcoinminer.Mqil TrendMicro: TROJ_GEN.R002C0DLV23 TrendMicro-HouseCall: TROJ_GEN.R002C0DLV23 VIPRE: Application.Generic.3558935 Varist: W64/ABRisk.DMXH-3500 Webroot: W32.Trojan.Miner Yandex: Trojan.Miner!G+9G/zlHK/U ZoneAlarm: not-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.gen huorong: HackTool/CoinMiner.p |
e_magic | MZ |
---|---|
e_cblp | 0x50 |
e_cp | 0x2 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0xf |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0x1a |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x100 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 8 |
TimeDateStamp | 1992-Jun-19 22:22:17 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 2.0 |
SizeOfCode | 0x24600 |
SizeOfInitializedData | 0x28a00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00025468 (Section: CODE) |
BaseOfCode | 0x1000 |
BaseOfData | 0x26000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x54000 |
SizeOfHeaders | 0x400 |
Checksum | 0x5b023 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x4000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
kernel32.dll |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
---|---|
user32.dll |
GetKeyboardType
MessageBoxA |
advapi32.dll |
RegQueryValueExA
RegOpenKeyExA RegCloseKey |
oleaut32.dll |
SysFreeString
SysReAllocStringLen |
kernel32.dll (#2) |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
advapi32.dll (#2) |
RegQueryValueExA
RegOpenKeyExA RegCloseKey |
kernel32.dll (#3) |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
gdi32.dll |
StretchDIBits
StretchBlt SetWindowOrgEx SetTextColor SetStretchBltMode SetRectRgn SetROP2 SetPixel SetDIBits SetBrushOrgEx SetBkMode SetBkColor SelectObject SaveDC RestoreDC OffsetRgn MoveToEx IntersectClipRect GetStockObject GetPixel GetDIBits ExtSelectClipRgn ExcludeClipRect DeleteObject DeleteDC CreateSolidBrush CreateRectRgn CreateDIBitmap CreateDIBSection CreateCompatibleDC CreateCompatibleBitmap CreateBrushIndirect CreateBitmap CombineRgn BitBlt |
user32.dll (#2) |
GetKeyboardType
MessageBoxA |
advapi32.dll (#3) |
RegQueryValueExA
RegOpenKeyExA RegCloseKey |
kernel32.dll (#4) |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
gdi32.dll (#2) |
StretchDIBits
StretchBlt SetWindowOrgEx SetTextColor SetStretchBltMode SetRectRgn SetROP2 SetPixel SetDIBits SetBrushOrgEx SetBkMode SetBkColor SelectObject SaveDC RestoreDC OffsetRgn MoveToEx IntersectClipRect GetStockObject GetPixel GetDIBits ExtSelectClipRgn ExcludeClipRect DeleteObject DeleteDC CreateSolidBrush CreateRectRgn CreateDIBitmap CreateDIBSection CreateCompatibleDC CreateCompatibleBitmap CreateBrushIndirect CreateBitmap CombineRgn BitBlt |
user32.dll (#3) |
GetKeyboardType
MessageBoxA |
shell32.dll |
SHGetFileInfoA
|
comctl32.dll |
ImageList_Draw
ImageList_SetBkColor ImageList_Create InitCommonControls |
ole32.dll |
OleInitialize
|
oleaut32.dll (#2) |
SysFreeString
SysReAllocStringLen |
winmm.dll |
timeKillEvent
timeSetEvent |
shell32.dll (#2) |
SHGetFileInfoA
|
cabinet.dll |
FDIDestroy
FDICopy FDICreate |
ole32.dll (#2) |
OleInitialize
|
shell32.dll (#3) |
SHGetFileInfoA
|
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 1.0.0.0 |
ProductVersion | 0.0.0.0 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
FileType |
VFT_APP
|
Language | English - United States |
Comments | |
CompanyName | Xfer KeyGen |
FileDescription | Xfer KeyGen 1.0 Installation |
FileVersion (#2) | 1.0 |
LegalCopyright | Xfer KeyGen |
Resource LangID | Russian - Russia |
---|
StartAddressOfRawData | 0x42d000 |
---|---|
EndAddressOfRawData | 0x42d008 |
AddressOfIndex | 0x42608c |
AddressOfCallbacks | 0x42e010 |
SizeOfZeroFill | 0 |
Characteristics |
IMAGE_SCN_TYPE_REG
|
Callbacks | (EMPTY) |