Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2021-Jan-27 11:31:12 |
Detected languages |
English - United States
|
Suspicious | The PE is possibly packed. | Unusual section name found: .data2 |
Info | The PE contains common functions which appear in legitimate applications. |
[!] The program may be hiding some of its imports:
|
Malicious | VirusTotal score: 47/60 (Scanned on 2017-05-26 06:52:33) |
Bkav:
HW32.Packed.674C
MicroWorld-eScan: Trojan.GenericKD.5158286 CAT-QuickHeal: TrojanSpy.Ursnif McAfee: RDN/Generic.grp Malwarebytes: Ransom.Cerber K7AntiVirus: Spyware ( 00505c591 ) K7GW: Spyware ( 00505c591 ) Baidu: Win32.Trojan.WisdomEyes.16070401.9500.9999 F-Prot: W32/Agent.ANX.gen!Eldorado Symantec: Trojan Horse ESET-NOD32: Win32/Spy.Ursnif.AO TrendMicro-HouseCall: TSPY_URSNIF.AUSIOC Paloalto: generic.ml Kaspersky: Trojan-Spy.Win32.Ursnif.rvs BitDefender: Trojan.GenericKD.5158286 NANO-Antivirus: Trojan.Win32.Ursnif.epfsdw AegisLab: Ml.Attribute.Gen!c Avast: Win32:Malware-gen Ad-Aware: Trojan.GenericKD.5158286 Sophos: Troj/Gozi-HM Comodo: TrojWare.Win32.Troldesh.B F-Secure: Trojan.GenericKD.5158286 DrWeb: Trojan.Gozi.23 VIPRE: VirTool.Win32.Obfuscator.da!j (v) Invincea: trojan.win32.skeeyah.a!rfn McAfee-GW-Edition: BehavesLike.Win32.PWSZbot.fc Emsisoft: Trojan.GenericKD.5158286 (B) SentinelOne: static engine - malicious Cyren: W32/Trojan.AZGX-5780 Webroot: W32.Infostealer.Zeus Avira: TR/Crypt.Xpack.mayzd Antiy-AVL: Trojan/Win32.Kryptik Microsoft: Trojan:Win32/Dynamer!rfn Endgame: malicious (high confidence) Arcabit: Trojan.Generic.D4EB58E ViRobot: Trojan.Win32.Agent.331264.G[h] ZoneAlarm: Trojan-Spy.Win32.Ursnif.rvs GData: Trojan.GenericKD.5158286 AhnLab-V3: Trojan/Win32.Cerber.C1970349 ALYac: Gen:Variant.Midie.37830 AVware: VirTool.Win32.Obfuscator.da!j (v) Ikarus: Trojan.Inject Fortinet: W32/Kryptik.FSNS!tr AVG: SCGeneric_c1.BSY Panda: Trj/Genetic.gen CrowdStrike: malicious_confidence_100% (W) Qihoo-360: Trojan.Generic |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xb8 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 4 |
TimeDateStamp | 2021-Jan-27 11:31:12 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 13.1 |
SizeOfCode | 0x4ee00 |
SizeOfInitializedData | 0x1c00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00001DE5 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x50000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 5.1 |
ImageVersion | 5.1 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x54000 |
SizeOfHeaders | 0x400 |
Checksum | 0x5495f |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
user32.dll |
PostMessageW
InsertMenuA LoadIconA DispatchMessageW LoadMenuW LoadCursorA PeekMessageA GetPropA DrawStateA GetMessageW CharToOemA IsCharLowerW wsprintfA GetClassLongA LoadBitmapA FlashWindow |
---|---|
clusapi.dll |
CloseCluster
CloseClusterNode |
shlwapi.dll |
PathCompactPathW
UrlCanonicalizeA UrlGetPartW UrlGetLocationW PathCombineA PathIsRootW PathCommonPrefixW UrlEscapeW UrlCombineW PathStripPathA UrlCompareA UrlHashW |
kernel32.dll |
IsBadStringPtrA
LoadLibraryExW SetErrorMode CreateMailslotW GetTickCount FindFirstFileA lstrcpy GetStringTypeW CreateFileMappingA GetProcAddress GetTempFileNameA OpenFileMappingA GetGeoInfoW GetConsoleTitleA WaitForSingleObjectEx GetACP CopyFileW CreateNamedPipeW LoadLibraryA MoveFileExA CreateMutexA EncodePointer DeleteFileA FormatMessageW GetPrivateProfileStringW CreateSemaphoreA GetBinaryTypeA GetCommandLineA GetVersionExW |
resutils.dll |
ResUtilDupString
ClusWorkerTerminate ResUtilGetBinaryValue ClusWorkerStart |