625ac05fd47adc3c63700c3b30de79ab

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2019-Aug-30 22:26:59
Detected languages English - United States

Plugin Output

Info Matching compiler(s): Microsoft Visual C++
Microsoft Visual C++ v6.0
Microsoft Visual C++ v5.0/v6.0 (MFC)
Suspicious Strings found in the binary may indicate undesirable behavior: Contains another PE executable:
  • This program cannot be run in DOS mode.
Contains domain names:
  • http://www.practicalmalwareanalysis.com
  • http://www.practicalmalwareanalysis.com/updater.exe
  • practicalmalwareanalysis.com
  • www.practicalmalwareanalysis.com
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
Possibly launches other programs:
  • WinExec
Can create temporary files:
  • CreateFileA
  • GetTempPathA
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Manipulates other processes:
  • OpenProcess
Malicious The PE is possibly a dropper. Resource 101 detected as a PE Executable.
Malicious VirusTotal score: 61/71 (Scanned on 2023-10-25 09:12:33) Bkav: W32.AIDetectMalware
Lionic: Trojan.Win32.Genome.ts0c
DrWeb: Trojan.DownLoader5.60705
MicroWorld-eScan: Gen:Variant.Cerbu.64782
FireEye: Generic.mg.625ac05fd47adc3c
Skyhigh: GenericRXEW-DZ!625AC05FD47A
ALYac: Gen:Variant.Cerbu.64782
Malwarebytes: Small.Trojan.Downloader.DDS
VIPRE: Gen:Variant.Cerbu.64782
Sangfor: Suspicious.Win32.Save.ins
K7AntiVirus: Trojan-Downloader ( 005663e81 )
BitDefender: Gen:Variant.Cerbu.64782
K7GW: Trojan-Downloader ( 005663e81 )
CrowdStrike: win/malicious_confidence_100% (W)
BitDefenderTheta: AI:Packer.6911D1B71F
VirIT: Trojan.Win32.Generic.BAQU
Symantec: ML.Attribute.HighConfidence
Elastic: malicious (high confidence)
ESET-NOD32: Win32/TrojanDownloader.Small.BFX
APEX: Malicious
ClamAV: Win.Trojan.Agent-375080
Kaspersky: HEUR:Trojan.Win32.Gofot.gen
Alibaba: TrojanDownloader:Win32/Gofot.7e5f679f
NANO-Antivirus: Trojan.Win32.Kazy.cwxmfl
Rising: Downloader.Small!8.B41 (TFE:5:KjqgWRiq2dI)
TACHYON: Trojan-Downloader/W32.Agent.36864.ADU
Sophos: Mal/Generic-R
F-Secure: Trojan.TR/Dldr.Small.romlh
Zillya: Downloader.Small.Win32.47818
TrendMicro: Mal_DLDER
Trapmine: malicious.high.ml.score
Emsisoft: Gen:Variant.Cerbu.64782 (B)
SentinelOne: Static AI - Suspicious PE
GData: Gen:Variant.Cerbu.64782
Jiangmin: Trojan/Invader.cph
Webroot: W32.Trojan.Gen
Google: Detected
Avira: TR/Dldr.Small.romlh
Varist: W32/Heuristic-217!Eldorado
Antiy-AVL: Trojan[Downloader]/Win32.AGeneric
Kingsoft: win32.troj.undef.a
Xcitium: Malware@#2oyf6g8q6fqyr
Arcabit: Trojan.Cerbu.DFD0E
SUPERAntiSpyware: Trojan.Agent/Gen-Downloader
ZoneAlarm: HEUR:Trojan.Win32.Gofot.gen
Microsoft: TrojanDownloader:Win32/Small!MSR
Cynet: Malicious (score: 100)
AhnLab-V3: Trojan/Win.DownLoader.C5520690
VBA32: BScope.Trojan.Downloader
MAX: malware (ai score=100)
DeepInstinct: MALICIOUS
Cylance: unsafe
TrendMicro-HouseCall: Mal_DLDER
Tencent: Malware.Win32.Gencirc.10b0badc
Yandex: Trojan.DL.Small!io4/0V8aERQ
Ikarus: Backdoor.Win32.SuspectCRC
MaxSecure: Trojan.Malware.23478.susgen
Fortinet: W32/Small.BFX!tr.dldr
AVG: Win32:DropperX-gen [Drp]
Cybereason: malicious.106dd2
Avast: Win32:DropperX-gen [Drp]

Hashes

MD5 625ac05fd47adc3c63700c3b30de79ab
SHA1 9369d80106dd245938996e245340a3c6f17587fe
SHA256 0fa1498340fca6c562cfa389ad3e93395f44c72fd128d7ba08579a69aaf3b126
SHA3 c3b6bcaf157261ab2fbabe314248397d8f706b8b62f5326d409d066ace3933eb
SSDeep 96:TF0MgAr71nxY9AAIvqZ2ZNHHsP4oynLKcm5OzG38U6p2WL4P4oyn:iJaPLjC2ZNHMP4oynLKL38jp2VP4oyn
Imports Hash aade0ea6fbdcd9b8e96fe999cae6f603

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xe8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 4
TimeDateStamp 2019-Aug-30 22:26:59
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 6.0
SizeOfCode 0x1000
SizeOfInitializedData 0x7000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000015CF (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x2000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x1000
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x9000
SizeOfHeaders 0x1000
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 77df9f7ebc4a2bc4bdf2b454d7635aee
SHA1 ce1ad9b4848f3750748dccf3254dfeab411d64f9
SHA256 6c4eaa50f1ae4063680708999485d4808fd552f5d69bedcd72d1c8fc46dca4e4
SHA3 e4b1c33ba589794e9e1db5c2dbd61521a31bf1e6267a116f1a8800c0ae2e0523
VirtualSize 0x720
VirtualAddress 0x1000
SizeOfRawData 0x1000
PointerToRawData 0x1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 3.12324

.rdata

MD5 d630e1eb49ed821e38202aefef911a39
SHA1 71abe02ec2eccc58c964d7ecfd30db198d597e2e
SHA256 1fef7dbad44e707f325017fd5611e38dc2643fde647b04980629e901db9ed9ca
SHA3 7eca1322ef6fe2b8deb7a8fa47cbc8d30403da04176cf482d2df9bafd862c81e
VirtualSize 0x3d2
VirtualAddress 0x2000
SizeOfRawData 0x1000
PointerToRawData 0x2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.59101

.data

MD5 d9a3822a7733a76776d8b6e64e364b9d
SHA1 26fa3a07b426599ec943c8e49700fc73840681ab
SHA256 4ac00d08ce7c86ad8bda1bbc02ce74c2556d3ba629f1be6c69423091aa7927f5
SHA3 a062780dde41861dd87ed412d1ff7ef090157b2dd42036f29ef62de70cc18ca3
VirtualSize 0x14c
VirtualAddress 0x3000
SizeOfRawData 0x1000
PointerToRawData 0x3000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.507577

.rsrc

MD5 398569177d4d82090d3e1747be560f9a
SHA1 0009060c22dee24e43dd4cab231a14e7dc52d0a1
SHA256 a519135a987a5b10bf0aafa985ef329dd37b9b422b4ff3482ea47ed83c52621e
SHA3 db3ab462ee4134039417c0e8f6122a7666e922ec70e866a18aa142031e6582ef
VirtualSize 0x4060
VirtualAddress 0x4000
SizeOfRawData 0x5000
PointerToRawData 0x4000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.712912

Imports

KERNEL32.dll GetProcAddress
LoadLibraryA
WinExec
WriteFile
CreateFileA
SizeofResource
CreateRemoteThread
FindResourceA
GetModuleHandleA
GetWindowsDirectoryA
MoveFileA
GetTempPathA
GetCurrentProcess
OpenProcess
CloseHandle
LoadResource
ADVAPI32.dll OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
MSVCRT.dll _snprintf
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_stricmp

Delayed Imports

101

Type BIN
Language English - United States
Codepage UNKNOWN
Size 0x4000
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0.852495
Detected Filetype PE Executable
MD5 6a95c2f88e0c09a91d69ffb98bc6fce8
SHA1 efb10a2db52d5379e72b392791b456253c5033d4
SHA256 819b2db1876d85846811799664d512b2f1af13e329f5debe60926c3b03424745
SHA3 59182b0b1310c402e4657f3ded2a61f2ccc17d701adc6b62886d6ec810684d40

Version Info

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0xdc881813
Unmarked objects 0
12 (7291) 1
C objects (VS98 build 8168) 11
14 (7299) 2
Linker (VS98 build 8168) 2
Total imports 36
19 (8034) 5
C++ objects (VS98 build 8168) 2
Resource objects (VS98 cvtres build 1720) 1

Errors

<-- -->