8cdaa3fd96ea034c87b416b46602c577

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2010-Apr-14 22:06:53

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: .ztyd
Section .ztyd is both writable and executable.
The PE only has 2 import(s).
Malicious VirusTotal score: 46/72 (Scanned on 2020-08-03 07:49:25) DrWeb: BackDoor.Shell.244
MicroWorld-eScan: Trojan.Metasploit.A
CAT-QuickHeal: HackTool.Metasploit.S9212471
ALYac: Trojan.Metasploit.A
Cylance: Unsafe
K7AntiVirus: Trojan ( 004fae881 )
K7GW: Trojan ( 004fae881 )
CrowdStrike: win/malicious_confidence_100% (D)
Arcabit: Trojan.Metasploit.A
Invincea: heuristic
Cyren: W64/S-c4a4ef26!Eldorado
Symantec: Packed.Generic.539
ESET-NOD32: a variant of Win64/Rozena.J
TrendMicro-HouseCall: Trojan.Win64.SHELMA.SM
Kaspersky: Trojan.Win64.Shelma.b
BitDefender: Trojan.Metasploit.A
Avast: Win64:Evo-gen [Susp]
Ad-Aware: Trojan.Metasploit.A
Sophos: Troj/Swrort-AI
F-Secure: Trojan.TR/Crypt.XPACK.Gen7
TrendMicro: Trojan.Win64.SHELMA.SM
Trapmine: malicious.high.ml.score
FireEye: Generic.mg.8cdaa3fd96ea034c
Emsisoft: Trojan.Metasploit.A (B)
SentinelOne: DFI - Malicious PE
F-Prot: W64/S-c4a4ef26!Eldorado
Jiangmin: Trojan.Generic.fxrt
Webroot: W32.Malware.Gen
Avira: TR/Crypt.XPACK.Gen7
MAX: malware (ai score=84)
Microsoft: Trojan:Win64/Meterpreter.E
Endgame: malicious (high confidence)
ZoneAlarm: Trojan.Win64.Shelma.b
GData: Win64.Trojan.Rozena.A
Cynet: Malicious (score: 100)
AhnLab-V3: Trojan/Win64.Shelma.R274246
Acronis: suspicious
McAfee: Trojan-FJIN!8CDAA3FD96EA
Malwarebytes: Trojan.MalPack
APEX: Malicious
Rising: Trojan.Kryptik!1.A2F4 (CLASSIC)
Ikarus: Trojan.Win64.Rozena
Fortinet: W64/Rozena.J!tr
AVG: Win64:Evo-gen [Susp]
Cybereason: malicious.d96ea0
MaxSecure: Trojan.Malware.300983.susgen

Hashes

MD5 8cdaa3fd96ea034c87b416b46602c577
SHA1 c86b9ba0a7dd7373cb374b7102f22b3c83dd539c
SHA256 6d6a455d68c6e96505dd47c84ebe709ae2dfafaf378174a2e3deb961ebfe149a
SHA3 7fd8cd6b821492c1da59d2208e288770ce9a6cd748b46ca73a9d64be6ef9c42c
SSDeep 24:eFGStrJ9u0/6fSLnZd0BQAVoaYNq9KZq4N0eND7SCvOXpmB:is0qS30BQVts9aN0SDuC2kB
Imports Hash b4c6fff030479aa3b12625be67bf4914

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xc8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 3
TimeDateStamp 2010-Apr-14 22:06:53
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32+
LinkerVersion 1.0
SizeOfCode 0x3000
SizeOfInitializedData 0x1000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000004000 (Section: .ztyd)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x4278
SizeOfHeaders 0x248
Checksum 0x4777
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 a4a5deae25708a9e05f50bcad7075c86
SHA1 e66374a7f405687da2de82ab3fbcad13858fa6b2
SHA256 04bf20abd166f5ae804746ecaaef3a31eca367efd50703d95f74efecb7edcd49
SHA3 9f76b581c24ca555ae9bbe26f28849a52cd6ba5d3fd0e52bbed4e187825e6793
VirtualSize 0x104e
VirtualAddress 0x1000
SizeOfRawData 0x1200
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 0.1681

.rdata

MD5 47f9cdaa654062a968aaf5604973ff02
SHA1 a8ce837cb314e0ee4a95d347e9234ff2809eb9ce
SHA256 b71e5c17ec76ab442c703cbb7ef51a879112907bff4f42e83395c6c7160225d5
SHA3 3ca88c5106b565c2e05df86cc6472fe3c077167c98b5e0b0ab737fd7fab9724d
VirtualSize 0x84
VirtualAddress 0x3000
SizeOfRawData 0x200
PointerToRawData 0x1600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.11583

.ztyd

MD5 31965fb68587c517430bc0f44e0e90cc
SHA1 dfe7de3a30f6891c0bf280354373d4c9c03067fb
SHA256 760141311a2fefee07f864ccb0cbf3c4934f3a30f0cb5a61e451146a6510039d
SHA3 a5d3a60a727ad1704946059c6b69402429522e2a6b12e792a9ed432bca153b33
VirtualSize 0x278
VirtualAddress 0x4000
SizeOfRawData 0x400
PointerToRawData 0x1800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.30143

Imports

KERNEL32.dll VirtualAlloc
ExitProcess

Delayed Imports

Version Info

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0x8e7f457d
Unmarked objects 0
Imports (VS2012 build 50727 / VS2005 build 50727) 3
Total imports 2
ASM objects (VS2008 SP1 build 30729) 1
Resource objects (VS2008 SP1 build 30729) 1

Errors

<-- -->