Report #7188 check_circle

  • Creation Date: Feb. 21, 2020, 10:56 a.m.
  • Last Update: Feb. 21, 2020, 11:29 a.m.
  • File: 0u0z1T0A1d3b.exe
  • Results:
Binary
DLL
False cancel
Size
1.90MB
trid
63.0% Inno Setup installer
23.9% Win32 EXE PECompact compressed
5.7% DOS Borland compiled Executable
2.5% Win32 Executable
1.1% Win16/32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
f21fdfc152277d5112b366fdb62827f7
sha1
1811e7ca6a2d6dccdbc685a80951f40f42d13b99
crc32
0x13c7605
sha224
29cde03a190e549e0f7d58c60fbf6eeff8e36600c16ae4f2bd6044f0
sha256
4af1f863acb9f766e46024064763c9b10ddc07b9fabab245bb0c2161847161c9
sha384
0485baaf1bf4c40c931318fc35073a3c6a160d38c35187126742dc1ac5a74a1e7bf1d1ca8d58890c0d7c4f70edb1239e
sha512
224b937f925979d9a761c7915f4c1da89c4275809d7227111eb1947460c8a225bd330b79e8e2debf9fc469ee577fece720e283a7e85ca39cc7ee6a55d8850677
ssdeep
49152:mEEoTCSPROVzXD6T9WLITnUkcNVuV9zwu:mEEhE
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, network_dropper, CRC32_poly_Constant, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, win_files_operation, IsPE32, win_hook, contentis_base64, screenshot, Borland_Delphi_v40_v50, keylogger, win_mutex, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, IsWindowsGUI, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, android_meterpreter, win_registry, Borland_Delphi_30_additional, Borland_Delphi_v30, Big_Numbers4

Suspicious
True check_circle

Strings
List
if(!window.Silverlight)window.Silverlight={};Silverlight._silverlightCount=0;Silverlight.ua=null;Silverlight.available=false;Silverlight.fwlinkRoot="http://go.microsoft.com/fwlink/?LinkID=";Silverlight.StatusText="Get Microsoft Silverlight";Silverlight.EmptyText="";Silverlight.detectUserAgent=function(){var a=window.navigator.userAgent;Silverlight.ua={OS:"Unsupported",Browser:"Unsupported"};if(a.indexOf("Windows NT")>=0)Silverlight.ua.OS="Windows";else if(a.indexOf("PPC Mac OS X")>=0)Silverlight.ua.OS="MacPPC";else if(a.indexOf("Intel Mac OS X")>=0)Silverlight.ua.OS="MacIntel";if(Silverlight.ua.OS!="Unsupported")if(a.indexOf("MSIE")>=0){if(navigator.userAgent.indexOf("Win64")==-1)if(parseInt(a.split("MSIE")[1])>=6)Silverlight.ua.Browser="MSIE"}else if(a.indexOf("Firefox")>=0){var b=a.split("Firefox/")[1].split("."),c=parseInt(b[0]);if(c>=2)Silverlight.ua.Browser="Firefox";else{var d=parseInt(b[1]);if(c==1&&d>=5)Silverlight.ua.Browser="Firefox"}}else if(a.indexOf("Safari")>=0)Silverlight.ua.Browser="Safari"};Silverlight.detectUserAgent();Silverlight.isInstalled=function(d){var c=false,a=null;try{var b=null;if(Silverlight.ua.Browser=="MSIE")b=new ActiveXObject("AgControl.AgControl");else if(navigator.plugins["Silverlight Plug-In"]){a=document.createElement("div");document.body.appendChild(a);a.innerHTML='<embed type="application/x-silverlight" />';b=a.childNodes[0]}if(b.IsVersionSupported(d))c=true;b=null;Silverlight.available=true}catch(e){c=false}if(a)document.body.removeChild(a);return c};Silverlight.createObject=function(l,g,m,j,k,i,h){var b={},a=j,c=k;a.source=l;b.parentElement=g;b.id=Silverlight.HtmlAttributeEncode(m);b.width=Silverlight.HtmlAttributeEncode(a.width);b.height=Silverlight.HtmlAttributeEncode(a.height);b.ignoreBrowserVer=Boolean(a.ignoreBrowserVer);b.inplaceInstallPrompt=Boolean(a.inplaceInstallPrompt);var e=a.version.split(".");b.shortVer=e[0]+"."+e[1];b.version=a.version;a.initParams=i;a.windowless=a.isWindowless;a.maxFramerate=a.framerate;for(var d in c)if(c[d]&&d!="onLoad"&&d!="onError"){a[d]=c[d];c[d]=null}delete a.width;delete a.height;delete a.id;delete a.onLoad;delete a.onError;delete a.ignoreBrowserVer;delete a.inplaceInstallPrompt;delete a.version;delete a.isWindowless;delete a.framerate;if(Silverlight.isInstalled(b.version)){if(Silverlight._silverlightCount==0)if(window.addEventListener)window.addEventListener("onunload",Silverlight.__cleanup,false);else window.attachEvent("onunload",Silverlight.__cleanup);var f=Silverlight._silverlightCount++;a.onLoad="__slLoad"+f;a.onError="__slError"+f;window[a.onLoad]=function(a){if(c.onLoad)c.onLoad(document.getElementById(b.id),h,a)};window[a.onError]=function(a,b){if(c.onError)c.onError(a,b);else Silverlight.default_error_handler(a,b)};slPluginHTML=Silverlight.buildHTML(b,a)}else slPluginHTML=Silverlight.buildPromptHTML(b);if(b.parentElement)b.parentElement.innerHTML=slPluginHTML;else return slPluginHTML};Silverlight.supportedUserAgent=function(c){var a=Silverlight.ua,b=a.OS=="Unsupported"||a.Browser=="Unsupported"||a.OS=="Windows"&&a.Browser=="Safari"||a.OS.indexOf("Mac")>=0&&a.Browser=="IE";if(c=="1.1")return !(b||a.OS=="MacPPC");else return !b};Silverlight.buildHTML=function(c,d){var a=[],e,i,g,f,h;if(Silverlight.ua.Browser=="Safari"){a.push("<embed ");e="";i=" ";g='="';f='"';h=' type="application/x-silverlight"/>'+"<iframe style='visibility:hidden;height:0;width:0'/>"}else{a.push('<object type="application/x-silverlight"');e=">";i=' <param name="';g='" value="';f='" />';h="</object>"}a.push(' id="'+c.id+'" width="'+c.width+'" height="'+c.height+'" '+e);for(var b in d)if(d[b])a.push(i+Silverlight.HtmlAttributeEncode(b)+g+Silverlight.HtmlAttributeEncode(d[b])+f);a.push(h);return a.join("")};Silverlight.default_error_handler=function(e,b){var d,c=b.ErrorType;d=b.ErrorCode;var a="\nSilverlight error message \n";a+="ErrorCode: "+d+"\n";a+="ErrorType: "+c+" \n";a+="Message: "+b.ErrorMessage+" \n";if(c=="ParserError"){a+="XamlFile: "+b.xamlFile+" \n";a+="Line: "+b.lineNumber+" \n";a+="Position: "+b.charPosition+" \n"}else if(c=="RuntimeError"){if(b.lineNumber!=0){a+="Line: "+b.lineNumber+" \n";a+="Position: "+b.charPosition+" \n"}a+="MethodName: "+b.methodName+" \n"}alert(a)};Silverlight.createObjectEx=function(b){var a=b,c=Silverlight.createObject(a.source,a.parentElement,a.id,a.properties,a.events,a.initParams,a.context);if(a.parentElement==null)return c};Silverlight.buildPromptHTML=function(e){var a=null,g=Silverlight.fwlinkRoot,c=Silverlight.ua.OS,b="92822",d;if(e.shortVer=="1.1")e.inplaceInstallPrompt=false;if(e.inplaceInstallPrompt){var i;if(Silverlight.available){d="94376";i="94382"}else{d="92802";i="94381"}var h="93481",f="93483";if(c=="Windows"){b="92799";h="92803";f="92805"}else if(c=="MacIntel"){b="92808";h="92804";f="92806"}else if(c=="MacPPC"){b="92807";h="92815";f="92816"}a='<table border="0" cellpadding="0" cellspacing="0" width="205px"><tr><td><img title="Get Microsoft Silverlight" onclick="javascript:Silverlight.followFWLink({0});" style="border:0; cursor:pointer" src="{1}"/></td></tr><tr><td style="background:#C7C7BD; text-align: center; color: black; font-family: Verdana; font-size: 9px; padding-bottom: 0.05cm; ;padding-top: 0.05cm" >By clicking <b>Get Microsoft Silverlight</b> you accept the <a title="Silverlight License Agreement" href="{2}" target="_top" style="text-decoration: underline; color: #36A6C6"><b>Silverlight license agreement</b></a>.</td></tr><tr><td style="border-left-style: solid; border-right-style: solid; border-width: 2px; border-color:#c7c7bd; background: #817d77; color: #FFFFFF; text-align: center; font-family: Verdana; font-size: 9px">Silverlight updates automatically, <a title="Silverlight Privacy Statement" href="{3}" target="_top" style="text-decoration: underline; color: #36A6C6"><b>learn more</b></a>.</td></tr><tr><td><img src="{4}"/></td></tr></table>';a=a.replace("{2}",g+h);a=a.replace("{3}",g+f);a=a.replace("{4}",g+i)}else{if(e.shortVer=="1.1"){b="92821";if(Silverlight.available)d="94378";else d="92810";if(c=="Windows")b="92809";else if(c=="MacIntel")b="92813"}else{if(Silverlight.available)d="94377";else d="92801";if(c=="Windows")b="92800";else if(c=="MacIntel")b="92812";else if(c=="MacPPC")b="92811"}a='<div style="width: 205px; height: 67px; background-color: #FFFFFF"><img onclick="javascript:Silverlight.followFWLink({0});" style="border:0; cursor:pointer" src="{1}" alt="Get Microsoft Silverlight"/></div>'}a=a.replace("{0}",b);a=a.replace("{1}",g+d);return a};Silverlight.__cleanup=function(){for(var a=Silverlight._silverlightCount-1;a>=0;a--){window["__slLoad"+a]=null;window["__slError"+a]=null}if(window.removeEventListener)window.removeEventListener("unload",Silverlight.__cleanup,false);else window.detachEvent("onunload",Silverlight.__cleanup)};Silverlight.followFWLink=function(a){top.location=Silverlight.fwlinkRoot+String(a)};Silverlight.HtmlAttributeEncode=function(c){var a,b="";if(c==null)return null;for(var d=0;d<c.length;d++){a=c.charCodeAt(d);if(a>96&&a<123||a>64&&a<91||a>43&&a<58&&a!=47||a==95)b=b+String.fromCharCode(a);else b=b+"&#"+a+";"}return b}
http://borgestransportes.xpg.com.br/ProtectionManagement_Uninstall.jpg
http://borgestransportes.xpg.com.br/ConfigSecurityPolicy.jpg
http://www.anelie.vai.la
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">
<A HREF="http://www.atozed.com">IntraWeb: VCL for the Web</A>.
<A HREF="http://www.atozed.com">IntraWeb: VCL for the Web</A>.
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/DTD/wml_1.1.xml">
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/DTD/wml_1.1.xml">
// SDK 1.1 license available at http://go.microsoft.com/fwlink/?linkid=94243.
* http://www.apache.org/licenses/LICENSE-2.0
req.xmlHttpRequest.open(req.method,req.url,req.async,req.username,req.password);
* For details, see the Prototype web site: http://prototype.conio.net/
if(e.pageY > this.ssLayer.top)
frame.vssLayer.top = p*(frame.vspLayer.clip.height -
xLocker.style.top = '0px';
xLocker.style.left = '0px';
/*lp.top = lPoint.top + aRoot.offsetTop;
xNode.name = aNode.name
_barLayer.top;
this.name = name;
gSenderName = aSender.name;
element.style.left = left + 'px';;
element.style.left = left + 'px';
xName=xItem.name;
this.top = this.oTop - i;
element.style.left = 0;
layer.top = top;
tp.show();
t.Ht
this.top = top;
if(e.target.href) {
lScroll.Height = lp.top + aRoot.children[i].offsetTop + aRoot.children[i].offsetHeight;
var p = topmost().location.protocol + "//" + topmost().location.host + "
return [element.name, element.value];
return [element.name, element.value];
if (lp.top + aRoot.children[i].offsetTop + aRoot.children[i].offsetHeight > lScroll.Height) {
element.style.top = 0;
if (obj.name != null && obj.form && obj.form.name != "HiddenSubmitForm") {
this.clip.top = i;
if ((aSubmitForm.childNodes.item(j).name == obj.name) && (aSubmitForm.childNodes.item(j).type == "hidden") ) {
element.style.top =
element.style.left =
xLocker.style.backgroundColor = 'transparent';
lp.top = 0;
var p = IWTop().location.protocol + "//" + IWTop().location.host + "
h.EU
UP.LINK
Uh.VA
Font.Style
Font.Name
xLocker.style.backgroundImage = 'url(' + aLockImageURL + ')';
xLocker.style.visibility = 'hidden';
xLocker.style.backgroundRepeat = 'no-repeat';
xLocker.style.backgroundPosition = 'center';
zlib.dll not found in %s
msgWindow=window.open("","ShowMessage","menubar=no,scrollbars=yes,status=no,width=300,height=300,toolbar=no,location=no,resizable=no,directories=no");
logMessage('cloned! ' + xNode.name +':' + xNode.type + ':' + xNode.value)
this.div.style.overflow = "hidden";
aURL = GURLBase + '/callback' + aSessionInfo + '?callback=' + aCallback + '&' + aSender.name + '=' + aSender.value;
logMessage('cloning ' + aNode.name +':' + aNode.type + ':' + aNode.value);
_thumbLayer.top = t;
LocateInputElement(xItem.name, xSubmitForm, ProcessElement);
dragObjectStyle.top = (e.screenY + this._topOffset(e) - this.starty) + "px";
if(options.setTop) target.style.top = (p[1] - delta[1] + options.offsetTop) + 'px';
w=window.open(URL, Name, Options);
var top = parseFloat(element.style.top || 0) - (element._originalTop || 0);
this.style.clip = "rect(0px," + ARect.Width + "px," + ARect.Height + "px,0px)";
this.addField(el.name,el.options[el.selectedIndex].value);
xObj.style.top = aY;
logMessage(xItem.name + ' = ' + xItem.value);
(pY < (_dragObject.top-38))) {
this.frame.load(e.target);
xObj.style.left = aX;
if(options.setLeft) target.style.left = (p[0] - delta[0] + options.offsetLeft) + 'px';
return __method.call(object, event || window.event);
if((pY > (_dragObject.top+54)) ||
xControlName = xTarget.name;
var left = parseFloat(element.style.left || 0) - (element._originalLeft || 0);
_dragObject.top = pY;
AddChangedControl(xItem.name);
element._originalTop = top - parseFloat(element.style.top || 0);
if (aSender != null && xItem != null && xItem.name == aSender.name) {
target.style.top = offsets[1] + 'px';
target.style.left = offsets[0] + 'px';
var p = Position.page(source);
percentScroll = (pY - _dragObject.spLayer.top) /
var dobj=aSubmitForm.elements[obj.name];
xLocker.id = 'IWLocker';
this.addField(el.name,el.options[j].value);
this.e2.style.height = this.end + "px";
if (xTarget.name) {
lElement.style.top = lPoint.Y + 'px';
lElement.style.top = lPoint.Y + 'px';
e.clientY > absoluteRect.top + this._topOffset(e) &&
_dragObject.oTop = _dragObject.top;
p = (_scrollLayer.clip.top-15) /
p = (_scrollLayer.clip.top+15) /

Foremost
Matches
2840.gif, 78 B, 3255.gif, 857 B, 3257.gif, 888 B, 3259.gif, 300 B, 3259.gif, 297 B, 3260.gif, 1 KB, 3262.gif, 1 KB, 3265.gif, 1 KB, 3267.gif, 1 KB, 3269.gif, 1 KB, 3271.gif, 1 KB, 3273.gif, 1 KB, 3276.gif, 1 KB, 3278.gif, 1 KB, 3280.gif, 1 KB, 3282.gif, 1 KB, 3285.gif, 1 KB, 3287.gif, 814 B, 3289.gif, 782 B, 3290.gif, 1 KB, 3292.gif, 1 KB, 3295.gif, 1 KB, 3297.gif, 1 KB, 3299.gif, 803 B, 3301.gif, 1 KB, 3307.gif, 2 KB, 3312.gif, 426 B, 3319.gif, 2 KB, 3325.gif, 75 B, 3325.gif, 63 B, 3325.gif, 110 B, 3325.gif, 80 B, 3325.gif, 108 B, 3325.gif, 79 B, 3326.gif, 111 B, 3326.gif, 65 B, 3326.gif, 60 B, 3326.gif, 105 B, 3326.gif, 77 B, 3326.gif, 113 B, 3327.gif, 105 B, 3327.gif, 77 B, 3329.gif, 42 B, 3329.gif, 145 B, 3330.gif, 130 B, 3330.gif, 108 B, 3330.gif, 158 B, 3330.gif, 111 B, 3562.htm, 69 B, 0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 127.0.0.1, 1, localhost.
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

URLs
Allowed: http://go.microsoft.com/fwlink/?linkid=, http://www.w3.org/1999/xhtml, http://go.microsoft.com/fwlink/?linkid=94243.
hasURLs: True check_circle
Suspicious: http://borgestransportes.xpg.com.br/protectionmanagement_uninstall.jpg, http://www.apache.org/licenses/license-2.0, http://www.wapforum.org/dtd/wml_1.1.xml, http://www.wapforum.org/dtd/xhtml-mobile10.dtd, http://, http://www.atozed.com, http://www.anelie.vai.la, https://, http://borgestransportes.xpg.com.br/configsecuritypolicy.jpg, http://prototype.conio.net/
hasAllowed: True check_circle
hasSuspicious: True check_circle

Files
Allowed: user32.dll, kernel32.dll, uxtheme.dll, MSWSOCK.DLL, Fwpuclnt.dll, comctl32.dll, Wship6.dll, ole32.dll, imm32.dll, oleaut32.dll, WS2_32.DLL, gdi32.dll, urlmon.dll, DWMAPI.DLL, advapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasFiles: True check_circle
Suspicious: wapdb.dat
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 570880
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 1429844
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, mswsock.dll, comctl32.dll, wship6.dll, ole32.dll, imm32.dll, oleaut32.dll, ws2_32.dll, gdi32.dll, urlmon.dll, dwmapi.dll, advapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasLibs: True check_circle
Suspicious: fwpuclnt.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2016-11-20 13:46:28
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v6.0 - v7.0

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 6
.rsrc: 3
.text: 50
.itext: 5

pushpopmath
.data: 4
.rsrc: 90
.text: 15
.reloc: 97

ss register
.text: 1

garbagebytes
.data: 3
.rsrc: 1
.text: 45
.itext: 5

hookdetection
.rsrc: 2
.text: 2
.reloc: 5

software breakpoint
.rsrc: 3
.text: 7
.reloc: 36

fakeconditionaljumps
.text: 2

programcontrolflowchange
.data: 3
.rsrc: 1
.text: 43
.itext: 5

cpuinstructionsresultscomparison
.data: 4
.rsrc: 20
.text: 15
.reloc: 5

AVclass
diztakun
1
VirusTotal
md5
f21fdfc152277d5112b366fdb62827f7
sha1
1811e7ca6a2d6dccdbc685a80951f40f42d13b99
SCANS (DETECTION RATE = 72.31%)
AVG
result: FileRepMalware
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180323
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 004de77d1 )
update: 20180323
version: 10.42.26597
detected: True check_circle

ALYac
result: Trojan.Generic.19780109
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: FileRepMalware
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.ytbvp
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.BEMO-3053
update: 20180323
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.DownLoader23.19826
update: 20180323
version: 7.0.28.2020
detected: True check_circle

GData
result: Trojan.Generic.19780109
update: 20180323
version: A:25.16481B:25.11861
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.h
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180323
version: 65478
detected: True check_circle

Zoner
update: 20180323
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180323
version: 28732
detected: False cancel

F-Prot
update: 20180323
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180323
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericRXBO-WU!F21FDFC15227
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
result: Spyware.Banker!8.8D (TFE:4:TGEM7PPzkHN)
update: 20180323
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Diztakun!
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
result: Trojan.Diztakun.Win32.2835
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Generic.D12DD20D
update: 20180323
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180323
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan.Diztakun.Dzjj
update: 20180323
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180323
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180323
version: v4.3.5
detected: False cancel

Ad-Aware
result: Trojan.Generic.19780109
update: 20180323
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.W32.Diztakun!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.Generic.19780109 (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.Generic.19780109
update: 20180323
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.WYI!tr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan.Diztakun.bqz
update: 20180323
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180323
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180323
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Diztakun.C1677376
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
update: 20180323
version: 3.0.0.1
detected: False cancel

Kaspersky
result: UDS:DangerousObject.Multi.Generic
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Skeeyah.A!rfn
update: 20180323
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
update: 20180323
version: 1.0.0.1120
detected: False cancel

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: UDS:DangerousObject.Multi.Generic
update: 20180323
version: 1.0
detected: True check_circle

Cybereason
result: malicious.152277
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.WYI
update: 20180323
version: 17106
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0DBG18
update: 20180323
version: 9.862.0.1074
detected: True check_circle

BitDefender
result: Trojan.Generic.19780109
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_100% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 004de77d1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
result: static engine - malicious
update: 20180225
version: 1.0.15.206
detected: True check_circle

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Diztakun
update: 20180323
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.eivisk
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Trojan.Generic.19780109
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: GenericRXBO-WU!F21FDFC15227
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0DBG18
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
65
sha256
4af1f863acb9f766e46024064763c9b10ddc07b9fabab245bb0c2161847161c9
scan_id
4af1f863acb9f766e46024064763c9b10ddc07b9fabab245bb0c2161847161c9-1521840024
resource
f21fdfc152277d5112b366fdb62827f7
positives
47
scan_date
2018-03-23 21:20:24
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
21/2/2020 - 10:45:48.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 10:45:48.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
21/2/2020 - 10:45:48.637Open1480C:\malware.exeC:\
21/2/2020 - 10:45:48.637Unknown1480C:\malware.exeC:\
21/2/2020 - 10:45:48.637Open1480C:\malware.exeC:\imageres.dll
21/2/2020 - 10:45:48.637Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
21/2/2020 - 10:45:48.637Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
21/2/2020 - 10:45:48.637Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\imageres.dll.mui
21/2/2020 - 10:45:48.637Open1480C:\malware.exeC:\Windows\System32\pt-BR\imageres.dll.mui
21/2/2020 - 10:45:48.653Open1480C:\malware.exeC:\Windows\SysWOW64\pt\imageres.dll.mui
21/2/2020 - 10:45:48.653Open1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.mui
21/2/2020 - 10:45:48.653Read1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.muiimageres.dll.mui
21/2/2020 - 10:45:48.653Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
21/2/2020 - 10:45:48.653Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: False cancel

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query

Response

TCP
Info

UDP
Info

HTTP
Info

Summary
DNS
False cancel

TCP
False cancel

UDP
False cancel

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 56.13%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 56.34%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 63.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 76.26%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 61.79%
suspicious: False cancel

Add to Collection
Download