6a95c2f88e0c09a91d69ffb98bc6fce8

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2011-Feb-27 00:16:59

Plugin Output

Info Matching compiler(s): Microsoft Visual C++
Microsoft Visual C++ v6.0
Microsoft Visual C++ v5.0/v6.0 (MFC)
Info The PE contains common functions which appear in legitimate applications. Possibly launches other programs:
  • WinExec
Has Internet access capabilities:
  • URLDownloadToFileA
Malicious VirusTotal score: 49/68 (Scanned on 2018-12-13 07:32:28) MicroWorld-eScan: Trojan.Downloader.JTGZ
CAT-QuickHeal: Trojandownloader.Generic
McAfee: Artemis!6A95C2F88E0C
Cylance: Unsafe
AegisLab: Trojan.Win32.Generic.a!c
TheHacker: Trojan/Downloader.small
K7GW: Trojan ( 0040f8b51 )
K7AntiVirus: Trojan ( 0040f8b51 )
TrendMicro: Mal_DLDER
NANO-Antivirus: Trojan.Win32.Small.dbqpbh
F-Prot: W32/Heuristic-217!Eldorado
Symantec: Heur.AdvML.M
TrendMicro-HouseCall: Mal_DLDER
Paloalto: generic.ml
Kaspersky: HEUR:Trojan-Downloader.Win32.Generic
BitDefender: Trojan.Downloader.JTGZ
SUPERAntiSpyware: Trojan.Agent/Gen-Small
Rising: Downloader.Small!8.B41 (CLOUD)
Ad-Aware: Trojan.Downloader.JTGZ
Sophos: Mal/DownLdr-AC
Comodo: Malware@#x8e4x3c1lrk3
F-Secure: Trojan.Downloader.JTGZ
DrWeb: Trojan.DownLoader5.60705
Zillya: Downloader.Small.Win32.52679
McAfee-GW-Edition: BehavesLike.Win32.Downloader.lz
Fortinet: W32/Generic!tr.dldr
Trapmine: malicious.moderate.ml.score
Emsisoft: Trojan.Downloader.JTGZ (B)
Cyren: W32/Heuristic-217!Eldorado
Jiangmin: TrojanDownloader.Generic.tqx
Webroot: W32.Downloader.Gen
Avira: HEUR/Malware
MAX: malware (ai score=100)
Antiy-AVL: Trojan[Downloader]/Win32.Unknown
Kingsoft: Win32.Troj.Undef.(kcloud)
Endgame: malicious (high confidence)
Arcabit: Trojan.Downloader.JTGZ
Microsoft: TrojanDownloader:Win32/Small
VBA32: suspected of Trojan.Downloader.gen.h
ALYac: Trojan.Downloader.JTGZ
Malwarebytes: Trojan.Agent.PMA
Yandex: Trojan.DL.Small!jERp3Ic2y6I
Ikarus: Backdoor.Win32.SuspectCRC
GData: Trojan.Downloader.JTGZ
AVG: FileRepMalware
Cybereason: malicious.88e0c0
Avast: FileRepMalware
CrowdStrike: malicious_confidence_90% (W)
Qihoo-360: Win32/Trojan.390

Hashes

MD5 6a95c2f88e0c09a91d69ffb98bc6fce8
SHA1 efb10a2db52d5379e72b392791b456253c5033d4
SHA256 819b2db1876d85846811799664d512b2f1af13e329f5debe60926c3b03424745
SHA3 59182b0b1310c402e4657f3ded2a61f2ccc17d701adc6b62886d6ec810684d40
SSDeep 48:CAqPm5OzCiG3vEU6pXmH2/DZKP4oyl10BPn:dcm5OzG38U6p2WL4P4oyn
Imports Hash ad10feef4f139a487ecc69df3996fb79

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xe8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2011-Feb-27 00:16:59
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 6.0
SizeOfCode 0x1000
SizeOfInitializedData 0x2000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00001132 (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x2000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x1000
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x4000
SizeOfHeaders 0x1000
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 546286398cf461de605a0dd2a33d0a6e
SHA1 57e3023daa27a04c5558bcac79595533dabccc32
SHA256 4f4d604824c198d18b7b65b8425f0276e1a54e7f3825764728ba107e0b333b36
SHA3 a53df0aecb11a484398536cd38310795cb996a22c1ab4c8a8e1fe3499590801c
VirtualSize 0x27c
VirtualAddress 0x1000
SizeOfRawData 0x1000
PointerToRawData 0x1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 1.27444

.rdata

MD5 ad84d2155bdb090c9ae2032039842a26
SHA1 f77d3c6365d4fad763c7a01e0dcedffc51ef120f
SHA256 08a68afa097034e3d1f28cbd653d07548f95a27007308f77ad01fffac248bf9c
SHA3 eb038f9ec6ceb29256979eabb9f01f2174695ee18bd254e774d40eccea723640
VirtualSize 0x242
VirtualAddress 0x2000
SizeOfRawData 0x1000
PointerToRawData 0x2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.922078

.data

MD5 0dcb515068fbb80598cb6414e31de2b9
SHA1 3bb2044b1a5e864b02eb2a5edf5fb09ada26025f
SHA256 09d5854a861cb42a1e2cfffd70fb7939082f390129234638117f648bea340b5a
SHA3 e4149d22760710e8072c69887d915fa03834d6e79690feafc91f929e4e0a58aa
VirtualSize 0x9c
VirtualAddress 0x3000
SizeOfRawData 0x1000
PointerToRawData 0x3000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.255534

Imports

KERNEL32.dll WinExec
GetTempPathA
GetWindowsDirectoryA
urlmon.dll URLDownloadToFileA
MSVCRT.dll _controlfp
_snprintf
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3

Delayed Imports

Version Info

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0xda6ca77f
Unmarked objects 0
C objects (VS98 build 8168) 11
14 (7299) 1
Linker (VS98 build 8168) 2
Unmarked objects (#2) 3
Total imports 19
19 (8034) 3
C++ objects (VS98 build 8168) 2

Errors