487901443f9e51ad732b1cd856b03c69

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2019-Jul-09 14:20:02

Plugin Output

Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryExW
  • LoadLibraryA
Possibly launches other programs:
  • CreateProcessW
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Leverages the raw socket API to access the Internet:
  • ntohl
Enumerates local disk drives:
  • GetDriveTypeW
Suspicious The file contains overlay data. 7860941 bytes of data starting at offset 0x69000.
The overlay data has an entropy of 7.99761 and is possibly compressed or encrypted.
Overlay data amounts for 94.8127% of the executable.
Malicious VirusTotal score: 41/71 (Scanned on 2021-03-04 09:12:37) MicroWorld-eScan: Trojan.GenericKD.34172621
McAfee: Artemis!487901443F9E
Cylance: Unsafe
Sangfor: Trojan.Win32.Ymacco.AB2D
CrowdStrike: win/malicious_confidence_100% (W)
Alibaba: Trojan:Win32/Ymacco.b9d0f5b5
K7GW: Trojan ( 0056ab5e1 )
K7AntiVirus: Trojan ( 0056ab5e1 )
Cyren: W64/Trojan.MGCZ-6623
Symantec: Trojan.Gen.MBT
APEX: Malicious
Paloalto: generic.ml
BitDefender: Trojan.GenericKD.34172621
NANO-Antivirus: Riskware.Win64.HackAV.hnraxn
Avast: FileRepMalware
Ad-Aware: Trojan.GenericKD.34172621
Emsisoft: Trojan.GenericKD.34172621 (B)
Comodo: Malware@#3vbvyvccf6u2k
DrWeb: Trojan.Hosts.47404
VIPRE: Trojan.Win32.Generic!BT
TrendMicro: TROJ_GEN.R002C0DKM20
McAfee-GW-Edition: BehavesLike.Win64.HToolLazagne.wc
MaxSecure: Trojan.Malware.104220782.susgen
FireEye: Trojan.GenericKD.34172621
Sophos: Mal/Generic-S + Troj/Agent-BFDX
GData: Trojan.GenericKD.34172621
Kingsoft: Win32.Troj.Generic_a.a.(kcloud)
Gridinsoft: Trojan.Win64.Gen.vb
Arcabit: Trojan.Generic.D2096ECD
AegisLab: Trojan.Win32.Generic.4!c
Microsoft: Trojan:Win32/Ymacco.AB2D
VBA32: Trojan.Hosts
ALYac: Trojan.GenericKD.34172621
MAX: malware (ai score=99)
Malwarebytes: RiskWare.DontStealOurSoftware
ESET-NOD32: Python/Riskware.HackAV.A
TrendMicro-HouseCall: TROJ_GEN.R002C0DKM20
Tencent: Win32.Risk.Riskware.Pdmn
AVG: FileRepMalware
Cybereason: malicious.43f9e5
Panda: Trj/CI.A

Hashes

MD5 487901443f9e51ad732b1cd856b03c69
SHA1 4b3d2e271666fe17ef7e9db34743babf814abae8
SHA256 2de955cb5926261634ce51565e5cc9fd52ebccd9c3b7f8b5dd1db369cb1f9731
SHA3 5791364bdf332f0053e82615c1e2e631738b1b1ee1593cbd4d3854373bc44ce3
SSDeep 196608:JWCfUgRrs7TpVVuWJysVYvsOgtdIQLOMIdiwoEbPva8Mho:TfDRrG8WJvtaL/dNDvba
Imports Hash a62ff465f3ead2e578f02d3a2d749b7b

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2019-Jul-09 14:20:02
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x21400
SizeOfInitializedData 0x47800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000000089B4 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.2
ImageVersion 0.0
SubsystemVersion 5.2
Win32VersionValue 0
SizeOfImage 0x7c000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 118d860be8b5ef84801d3590b63c697a
SHA1 ed769eea78d7ff835456b9df70ae945487ed1a95
SHA256 1a23b2edc63583994db0d3f3b490ca8af32526eb7a38ef7b9f32dc90f9207957
SHA3 70a92db1a3781db727032e5374479abda5ad11e693ab04b82c52c506cd398233
VirtualSize 0x21390
VirtualAddress 0x1000
SizeOfRawData 0x21400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.46391

.rdata

MD5 c7c30ea54de0af8459276ec8ef3f9ab1
SHA1 8e286bd2383ed974a671406d777825f860dbd782
SHA256 57de8ee75aa251250369790452ccc645b7d56fd916a071382a44232f855b4ce6
SHA3 7006627b68e0a55dcbd69cd375a2c4097908a2142d8903d98f4e085ef4c040f8
VirtualSize 0xf3c8
VirtualAddress 0x23000
SizeOfRawData 0xf400
PointerToRawData 0x21800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.85444

.data

MD5 c229bcbda01da0475768ccb43a6d6ddc
SHA1 32eb208e5b8e467c0c25069f75d8db61340100ad
SHA256 26bf1ce7ad18845c908dcf49ef396c989a6f94a6bb67f7898878fd045933cff6
SHA3 601c43a883b10f3c4c457560251f2c82bf330412fcae5a2c1b596730823b01c6
VirtualSize 0xf108
VirtualAddress 0x33000
SizeOfRawData 0xc00
PointerToRawData 0x30c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 1.84446

.pdata

MD5 b17954c41ce2b463e7e9449034b8effd
SHA1 79d6d219750e1e60b1ea825d626648b48913cfce
SHA256 401dd44c253a82e21e266c4e6d2ce637bb05fd953d521db564e19eefb2713305
SHA3 66b263d0a1a6efd0ffb9dab74841737002a8860b7a4e26a34f00e90be3414e6d
VirtualSize 0x1d04
VirtualAddress 0x43000
SizeOfRawData 0x1e00
PointerToRawData 0x31800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.22959

.gfids

MD5 89b55f0393e019393a93908a53d1cb7a
SHA1 94be5176ab6fc86d03a49d973a5e7901c02ab220
SHA256 ae6dc1e153c4020a222ea2ea3a04700b6026ec09e37c46d5e717e50c8deff96d
SHA3 12709837bbe0488a534408d43f074edee6f94bd586e140dc85432ec8d6118bb4
VirtualSize 0xac
VirtualAddress 0x45000
SizeOfRawData 0x200
PointerToRawData 0x33600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.74158

.rsrc

MD5 0d558db3ffd249216660b0b44c3d8b72
SHA1 a20674a5650b1565adf3d737d708489ea6a9ed79
SHA256 f4c98dc913d095ff6758c4a3419fb370b7bc7da7228b854020f3ad55550d9838
SHA3 724f06db7d6874846a8a4b44216b23976dc5c9c2aea249c38401113020d1cd88
VirtualSize 0x34e04
VirtualAddress 0x46000
SizeOfRawData 0x35000
PointerToRawData 0x33800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.6897

.reloc

MD5 a863830437d17bfa07f80f1311f3452b
SHA1 3bc934f3c394ff2fb27c5d360d2331c3ecf1dc63
SHA256 a83862f8f2c8af3f1b0491be6b8f8b3a45b7b65e8386a648f48fa9f6cf48e845
SHA3 6f6b69bba6ae5aa4792311989953ff4a1872ea83b93548db3fb07214b6c7d3ed
VirtualSize 0x698
VirtualAddress 0x7b000
SizeOfRawData 0x800
PointerToRawData 0x68800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 4.99579

Imports

KERNEL32.dll GetLastError
SetDllDirectoryW
GetModuleFileNameW
GetProcAddress
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetTempPathW
WaitForSingleObject
Sleep
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
LoadLibraryExW
GetShortPathNameW
FormatMessageW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
SetEndOfFile
HeapReAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetCommandLineA
ReadFile
CreateFileW
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameW
GetFullPathNameA
CreateDirectoryW
RemoveDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
SetStdHandle
SetConsoleCtrlHandler
DeleteFileW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
CompareStringW
LCMapStringW
GetCurrentDirectoryW
FlushFileBuffers
SetEnvironmentVariableA
GetFileAttributesExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetProcessHeap
WriteConsoleW
GetTimeZoneInformation
HeapSize
RaiseException
WS2_32.dll ntohl

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x26dd8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.08264
MD5 630ecb16b7f091942f8f087530bb0c28
SHA1 26f40dfb269ab9a45d84b92c6990beac834b2f9d
SHA256 3d194bc5b5757f3445ed5af1f169f3ea23c3dbc4c16fa6d1a0fdaaa1837d1741
SHA3 260731372b879e2efc01872976ec6f5aee09813a810e9c0022979698d2c32673

2

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.05629
MD5 5096923956b255386181e7c44af9b552
SHA1 9d3f9d245fd7721707ad0dda9d133bc9398684af
SHA256 46c2b0eb26f174d48398a544b85203ec233adb7e17d1ced37c888eff8fcfd4c5
SHA3 d03024b793e39522b3ee98a5f6e0f548a989115ac2614924a5cfa436c2070a6b

3

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x568
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.5741
MD5 5a64b725f24048ed51af35b9ee7d2fff
SHA1 a7bc3d4bf5cc5c36d68c78a5f5b323fcd59ee53e
SHA256 c46f3921297eea0c08a032e0d0e0378643892fd1e95814fe6728c944574399cc
SHA3 4aec1e212baa392dfd28bceb7027f12f5767f9337caea3a3f5a22c8cdcef2164

4

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x909b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.95079
Detected Filetype PNG graphic file
MD5 20d36c0a435caad0ae75d3e5f474650c
SHA1 e9e536a2c9d009666e5de2b3e5823269204aabb6
SHA256 c3d7626d87aa28c33a054d30be26108fd09ea01ba470d41c94d7bdf6b80b83f2
SHA3 a842fc9423038b5b29fc431bb998e715979788e40d387431f74457de25a57fac

5

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.29119
MD5 b21a1cea6c1a6796700a0c7ee394ff2b
SHA1 c9b5246eddedabf11534c9c984e305a86151be9f
SHA256 01e270742614e92e2a2252ba46cee5b95ad5f13448ac3516f48fb3ee0af3e6c8
SHA3 9f392589e26f353c6962e2b9055ac344bfbfe2d82b95cce9441273a296beff95

6

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.43869
MD5 a12bdfb484bb481e1f106beb19aa4765
SHA1 18228c2e61981dd29f67cd938ef2a2303d75b81b
SHA256 b0835a0afca51295ee6e3827b5e4f79f0632f353c9d10dd78c0dcec478fab8b8
SHA3 01196ee531896c2f7ab6c87039bc68252b76609e8e0a26f63a0571485e3b506e

7

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.89356
MD5 3343c0fa901ae372eb7c9d1159386193
SHA1 16944a8dcace69148c0628b723e0fa124279a79d
SHA256 0cd74e1b2fd85cc9e251e8ab5aca5a303329809c6b0ab70a3e440f9df1aab2be
SHA3 a7f6a8159086a1eac7b0d564a6c2f3ccc302ff083602fcb01d9b09a3f45b9a22

0

Type RT_GROUP_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.16096
Detected Filetype Icon file
MD5 d8383189777b59428b77a44da5ae15ac
SHA1 3dae933e8b3bfc98b6e13442844cdcdb1954f8da
SHA256 4a56e2370fc4f96246f1c36852d187166c3679caa19b554e34f8313c9b3b7ce5
SHA3 2b8d5dd63e26634fab0999f05d2280085bfefbd58dc9503b61723d2924ebf71c

101

Type RT_GROUP_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x68
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.71858
Detected Filetype Icon file
MD5 d06bb5f499a7e63fdebdde478b53af68
SHA1 f4b46ca808dc838d436be1d2c13a40d51bdd8f4f
SHA256 038506ab04814afcdce660ffc0de198ebe40a5b0d8e090799549e208c689fed5
SHA3 af3d6a80a0ad9e117953a9e1466a44d29b3d32a19a456a9297995e94ead2efd7

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x414
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.30516
MD5 b6758e02d35503157b257703e94be8fa
SHA1 fa3289a4091a9e78db4f2beec7656d26c5c17bc7
SHA256 fb22d04dbc9f0714826dda74563a97d75412452383d755e947989f86c7280d7a
SHA3 3cd46eef97936d732b39af79c9e1ae81b2cccf34f2e8cb67d55826862c5f1770

Version Info

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2019-Jul-09 14:20:02
Version 0.0
SizeofData 720
AddressOfRawData 0x2fa78
PointerToRawData 0x2e278

TLS Callbacks

Load Configuration

Size 0x94
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140033010

RICH Header

XOR Key 0x2165d1bb
Unmarked objects 0
241 (40116) 7
243 (40116) 170
242 (40116) 13
ASM objects (VS2015 UPD3 build 24123) 7
C++ objects (VS2015 UPD3 build 24123) 28
C objects (VS2015 UPD3 build 24123) 19
Imports (65501) 5
Total imports 114
C objects (VS2015 UPD3 build 24210) 17
Resource objects (VS2015 UPD3 build 24210) 1
Linker (VS2015 UPD3 build 24210) 1

Errors

<-- -->