Architecture |
IMAGE_FILE_MACHINE_AMD64
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2011-Sep-16 22:46:10 |
Info | Interesting strings found in the binary: |
Contains domain names:
|
Info | The PE contains common functions which appear in legitimate applications. |
[!] The program may be hiding some of its imports:
|
Info | The PE is digitally signed. |
Signer: Jernej Simoncic
Issuer: GlobalSign ObjectSign CA |
Malicious | VirusTotal score: 25/67 (Scanned on 2021-10-07 17:50:40) |
Lionic:
Riskware.Win32.NetCat.1!c
Cynet: Malicious (score: 100) CAT-QuickHeal: HackTool.Netcat.E1 ALYac: Misc.HackTool.NetCat Sangfor: Hacktool.Win32.NetCat.bnr Alibaba: RiskWare:Win32/NetCat.3feb6f0a CrowdStrike: win/malicious_confidence_60% (D) Symantec: NetCat ESET-NOD32: a variant of Win64/RemoteAdmin.NetCat.A potentially unsafe Kaspersky: not-a-virus:RemoteAdmin.Win32.NetCat.bnr NANO-Antivirus: Trojan.Win64.RemoteAdmin.iupctw TrendMicro: HKTL_NETCAT FireEye: Generic.mg.523613a7b9dfa398 Sophos: NetCat (PUA) Ikarus: PUA.Netcat Jiangmin: RemoteAdmin.NetCat.cx MAX: malware (ai score=94) Antiy-AVL: Trojan/Generic.ASMalwS.27CB1B6 Microsoft: PUA:Win32/Presenoker Cylance: Unsafe TrendMicro-HouseCall: HKTL_NETCAT Yandex: Riskware.RemoteAdmin!dALKdVU+LqQ Fortinet: Riskware/NetCat Panda: Hacktool/Netcat MaxSecure: Trojan.Malware.73885908.susgen |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x80 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_AMD64
|
NumberofSections | 7 |
TimeDateStamp | 2011-Sep-16 22:46:10 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xf0 |
Characteristics |
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
Magic | PE32+ |
---|---|
LinkerVersion | 2.0 |
SizeOfCode | 0x6600 |
SizeOfInitializedData | 0x2c00 |
SizeOfUninitializedData | 0xc00 |
AddressOfEntryPoint | 0x0000000000001710 (Section: .text) |
BaseOfCode | 0x1000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 5.2 |
Win32VersionValue | 0 |
SizeOfImage | 0x10000 |
SizeOfHeaders | 0x400 |
Checksum | 0xef39 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
SizeofStackReserve | 0x200000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
KERNEL32.dll |
CloseHandle
CreatePipe CreateProcessA CreateThread DeleteCriticalSection DisconnectNamedPipe DuplicateHandle EnterCriticalSection ExitThread FreeConsole GetCurrentProcess GetCurrentProcessId GetCurrentThreadId GetLastError GetModuleHandleA GetProcAddress GetStartupInfoA GetStdHandle GetSystemTimeAsFileTime GetTickCount InitializeCriticalSection LeaveCriticalSection LoadLibraryA PeekNamedPipe QueryPerformanceCounter ReadFile RtlAddFunctionTable RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind SetUnhandledExceptionFilter Sleep TerminateProcess TerminateThread TlsGetValue UnhandledExceptionFilter VirtualProtect VirtualQuery WaitForMultipleObjects WriteFile |
---|---|
msvcrt.dll |
_close
_dup _itoa _kbhit _open _read _strcmpi _strnicmp _write |
msvcrt.dll (#2) |
_close
_dup _itoa _kbhit _open _read _strcmpi _strnicmp _write |
WSOCK32.dll |
WSACleanup
WSAGetLastError WSASetLastError WSAStartup __WSAFDIsSet accept bind closesocket connect gethostbyaddr gethostbyname getservbyname getservbyport getsockname htons inet_addr inet_ntoa listen ntohs recv recvfrom select send setsockopt shutdown socket |