| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 1970-Jan-01 00:00:00 |
| Info | Interesting strings found in the binary: |
Contains domain names:
|
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to MD5
Uses constants related to SHA1 Uses constants related to SHA256 Uses constants related to SHA512 Uses constants related to AES |
| Suspicious | The PE is possibly packed. | Unusual section name found: .symtab |
| Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
| Malicious | VirusTotal score: 51/72 (Scanned on 2025-12-14 20:12:28) |
ALYac:
Gen:Variant.Bulz.370300
APEX: Malicious AVG: Win64:Trojan-gen AhnLab-V3: Trojan/Win.Cobalt.C5216359 Alibaba: Trojan:Win32/Goldmax.3e3 Arcabit: Trojan.Bulz.D5A67C Avast: Win64:Trojan-gen Avira: HEUR/AGEN.1318184 BitDefender: Gen:Variant.Bulz.370300 Bkav: W64.AIDetectMalware CTX: exe.trojan.goldmax ClamAV: Win.Malware.SUNSHUTTLE-9838970-0 CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS ESET-NOD32: WinGo/Agent.AE trojan Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Bulz.370300 (B) F-Secure: Heuristic.HEUR/AGEN.1318184 GData: Gen:Variant.Bulz.370300 Google: Detected Ikarus: Trojan-Ransom.FileCrypter K7AntiVirus: Trojan ( 005ea2e21 ) K7GW: Trojan ( 005ea2e21 ) Kaspersky: HEUR:Trojan.Win32.Generic Kingsoft: Win32.Trojan.Generic.a Lionic: Trojan.Win32.GoldMax.4!c Malwarebytes: Trojan.Dropper.GO MaxSecure: Trojan.Malware.7164915.susgen McAfeeD: ti!478B04C20BBF MicroWorld-eScan: Gen:Variant.Bulz.370300 Microsoft: Trojan:Win64/GoldMax.A!dha Paloalto: generic.ml Panda: Trj/CI.A Rising: Backdoor.[APT29]SunShuttle!1.D383 (CLASSIC) Sangfor: Trojan.Win32.Save.a SentinelOne: Static AI - Malicious PE Skyhigh: BackDoor-FELG!5DB340A70CB5 Sophos: Mal/GoldMax-A Symantec: Backdoor.GoldMax Tencent: Malware.Win32.Gencirc.1423f25d TrellixENS: BackDoor-FELG!5DB340A70CB5 VBA32: Trojan.Win64.GoldMax VIPRE: Gen:Variant.Bulz.370300 Varist: W64/ABTrojan.OCVQ-0084 Yandex: Trojan.Agent!On5vXt9/HSg Zillya: Trojan.Agent.Win32.3517125 ZoneAlarm: Mal/GoldMax-A alibabacloud: Trojan:Multi/GoldMax.A9hyq huorong: Backdoor/SunShuttle.a |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0x4 |
| e_cparhdr | 0 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0x8b |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 5 |
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| PointerToSymbolTable | 0x4f0c00 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_RELOCS_STRIPPED
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 3.0 |
| SizeOfCode | 0x24b000 |
| SizeOfInitializedData | 0x3fa00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000000064070 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.1 |
| ImageVersion | 1.0 |
| SubsystemVersion | 6.1 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x526000 |
| SizeOfHeaders | 0x1000 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x200000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.DLL |
WriteFile
WriteConsoleW WaitForMultipleObjects WaitForSingleObject VirtualQuery VirtualFree VirtualAlloc SwitchToThread SuspendThread SetWaitableTimer SetUnhandledExceptionFilter SetProcessPriorityBoost SetEvent SetErrorMode SetConsoleCtrlHandler ResumeThread PostQueuedCompletionStatus LoadLibraryA LoadLibraryW SetThreadContext GetThreadContext GetSystemInfo GetSystemDirectoryA GetStdHandle GetQueuedCompletionStatus GetProcessAffinityMask GetProcAddress GetEnvironmentStringsW GetConsoleMode FreeEnvironmentStringsW ExitProcess DuplicateHandle CreateThread CreateIoCompletionPort CreateEventA CloseHandle AddVectoredExceptionHandler |
|---|
No comments yet.