625ac05fd47adc3c63700c3b30de79ab

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2019-Aug-30 22:26:59
Detected languages English - United States

Plugin Output

Info Matching compiler(s): Microsoft Visual C++
Microsoft Visual C++ v6.0
Microsoft Visual C++ v5.0/v6.0 (MFC)
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
Possibly launches other programs:
  • WinExec
Can create temporary files:
  • CreateFileA
  • GetTempPathA
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Manipulates other processes:
  • OpenProcess
Malicious The PE is possibly a dropper. Resource 101 detected as a PE Executable.
Malicious VirusTotal score: 52/70 (Scanned on 2019-02-05 01:49:49) MicroWorld-eScan: Gen:Trojan.Heur.RP.cqW@aqIk5pji
CAT-QuickHeal: TrojanDownloader.Small
Cylance: Unsafe
Zillya: Downloader.Small.Win32.47818
SUPERAntiSpyware: Trojan.Agent/Gen-Downloader
BitDefender: Gen:Trojan.Heur.RP.cqW@aqIk5pji
K7GW: Trojan-Downloader ( 000074d71 )
K7AntiVirus: Trojan-Downloader ( 000074d71 )
TrendMicro: Mal_DLDER
Cyren: W32/GenBl.625AC05F!Olympus
Symantec: Downloader
Avast: Win32:Malware-gen
ClamAV: Win.Trojan.Agent-375080
Kaspersky: HEUR:Trojan-Downloader.Win32.Generic
NANO-Antivirus: Trojan.Win32.Kazy.cwxmfl
Paloalto: generic.ml
AegisLab: Trojan.Win32.Generic.4!c
Tencent: Win32.Trojan-downloader.Generic.Wmja
Ad-Aware: Gen:Trojan.Heur.RP.cqW@aqIk5pji
Emsisoft: Gen:Trojan.Heur.RP.cqW@aqIk5pji (B)
Comodo: Suspicious@#2oyf6g8q6fqyr
F-Secure: Gen:Trojan.Heur.RP.cqW@aqIk5pji
DrWeb: Trojan.DownLoader5.60705
Invincea: heuristic
McAfee-GW-Edition: BehavesLike.Win32.Downloader.nz
Trapmine: malicious.high.ml.score
TheHacker: Trojan/Downloader.small
SentinelOne: static engine - malicious
F-Prot: W32/Heuristic-217!Eldorado
Jiangmin: Trojan/Invader.cph
Webroot: W32.Trojan.Gen
Avira: TR/Dropper.Gen
Antiy-AVL: Trojan[Downloader]/Win32.Unknown
Microsoft: TrojanDownloader:Win32/Small
Endgame: malicious (high confidence)
Arcabit: Trojan.Heur.RP.E9A4ED
ViRobot: Trojan.Win32.Z.Small.36864.AB
ZoneAlarm: HEUR:Trojan.Win32.Generic
GData: Gen:Trojan.Heur.RP.cqW@aqIk5pji
Sophos: Mal/DownLdr-AC
McAfee: GenericRXEW-DZ!625AC05FD47A
MAX: malware (ai score=100)
VBA32: BScope.Trojan.Downloader
Rising: Downloader.Small!8.B41 (CLOUD)
Yandex: Trojan.DL.Small!io4/0V8aERQ
Ikarus: Backdoor.Win32.SuspectCRC
eGambit: Unsafe.AI_Score_96%
Fortinet: W32/Generic.AC.345C6F!tr
AVG: Win32:Malware-gen
Cybereason: malicious.fd47ad
CrowdStrike: malicious_confidence_100% (W)
Qihoo-360: Win32/Trojan.67a

Hashes

MD5 625ac05fd47adc3c63700c3b30de79ab
SHA1 9369d80106dd245938996e245340a3c6f17587fe
SHA256 0fa1498340fca6c562cfa389ad3e93395f44c72fd128d7ba08579a69aaf3b126
SHA3 c3b6bcaf157261ab2fbabe314248397d8f706b8b62f5326d409d066ace3933eb
SSDeep 96:TF0MgAr71nxY9AAIvqZ2ZNHHsP4oynLKcm5OzG38U6p2WL4P4oyn:iJaPLjC2ZNHMP4oynLKL38jp2VP4oyn
Imports Hash aade0ea6fbdcd9b8e96fe999cae6f603

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xe8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 4
TimeDateStamp 2019-Aug-30 22:26:59
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 6.0
SizeOfCode 0x1000
SizeOfInitializedData 0x7000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000015CF (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x2000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x1000
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x9000
SizeOfHeaders 0x1000
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 77df9f7ebc4a2bc4bdf2b454d7635aee
SHA1 ce1ad9b4848f3750748dccf3254dfeab411d64f9
SHA256 6c4eaa50f1ae4063680708999485d4808fd552f5d69bedcd72d1c8fc46dca4e4
SHA3 e4b1c33ba589794e9e1db5c2dbd61521a31bf1e6267a116f1a8800c0ae2e0523
VirtualSize 0x720
VirtualAddress 0x1000
SizeOfRawData 0x1000
PointerToRawData 0x1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 3.12324

.rdata

MD5 d630e1eb49ed821e38202aefef911a39
SHA1 71abe02ec2eccc58c964d7ecfd30db198d597e2e
SHA256 1fef7dbad44e707f325017fd5611e38dc2643fde647b04980629e901db9ed9ca
SHA3 7eca1322ef6fe2b8deb7a8fa47cbc8d30403da04176cf482d2df9bafd862c81e
VirtualSize 0x3d2
VirtualAddress 0x2000
SizeOfRawData 0x1000
PointerToRawData 0x2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.59101

.data

MD5 d9a3822a7733a76776d8b6e64e364b9d
SHA1 26fa3a07b426599ec943c8e49700fc73840681ab
SHA256 4ac00d08ce7c86ad8bda1bbc02ce74c2556d3ba629f1be6c69423091aa7927f5
SHA3 a062780dde41861dd87ed412d1ff7ef090157b2dd42036f29ef62de70cc18ca3
VirtualSize 0x14c
VirtualAddress 0x3000
SizeOfRawData 0x1000
PointerToRawData 0x3000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.507577

.rsrc

MD5 398569177d4d82090d3e1747be560f9a
SHA1 0009060c22dee24e43dd4cab231a14e7dc52d0a1
SHA256 a519135a987a5b10bf0aafa985ef329dd37b9b422b4ff3482ea47ed83c52621e
SHA3 db3ab462ee4134039417c0e8f6122a7666e922ec70e866a18aa142031e6582ef
VirtualSize 0x4060
VirtualAddress 0x4000
SizeOfRawData 0x5000
PointerToRawData 0x4000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.712912

Imports

KERNEL32.dll GetProcAddress
LoadLibraryA
WinExec
WriteFile
CreateFileA
SizeofResource
CreateRemoteThread
FindResourceA
GetModuleHandleA
GetWindowsDirectoryA
MoveFileA
GetTempPathA
GetCurrentProcess
OpenProcess
CloseHandle
LoadResource
ADVAPI32.dll OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
MSVCRT.dll _snprintf
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_stricmp

Delayed Imports

101

Type BIN
Language English - United States
Codepage UNKNOWN
Size 0x4000
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0.852495
Detected Filetype PE Executable
MD5 6a95c2f88e0c09a91d69ffb98bc6fce8
SHA1 efb10a2db52d5379e72b392791b456253c5033d4
SHA256 819b2db1876d85846811799664d512b2f1af13e329f5debe60926c3b03424745
SHA3 59182b0b1310c402e4657f3ded2a61f2ccc17d701adc6b62886d6ec810684d40

Version Info

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0xdc881813
Unmarked objects 0
12 (7291) 1
C objects (VS98 build 8168) 11
14 (7299) 2
Linker (VS98 build 8168) 2
Total imports 36
19 (8034) 5
C++ objects (VS98 build 8168) 2
Resource objects (VS98 cvtres build 1720) 1

Errors