Static | ZeroBOX

PE Compile Time

2018-01-13 19:08:37

PE Imphash

0bdef4d92a94790d7d279561a490c5bb

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000e4b0 0x0000e600 6.47950399534
.rdata 0x00010000 0x00001e9a 0x00002000 6.04262842842
.data 0x00012000 0x00001958 0x00000200 3.34490004294
.reloc 0x00014000 0x00000ff2 0x00001000 6.48193918305

Imports

Library WS2_32.dll:
0x4101f0 ioctlsocket
0x4101f4 __WSAFDIsSet
0x4101f8 WSAStartup
0x4101fc send
0x410200 connect
0x410204 setsockopt
0x410208 bind
0x41020c listen
0x410210 accept
0x410214 getsockname
0x410218 htonl
0x41021c gethostname
0x410220 socket
0x410224 select
0x410228 recv
0x41022c ntohs
0x410230 htons
0x410234 sendto
0x410238 gethostbyaddr
0x41023c inet_ntoa
0x410240 gethostbyname
0x410244 inet_addr
0x410248 getpeername
0x41024c closesocket
Library dbghelp.dll:
0x410254 StackWalk64
Library KERNEL32.dll:
0x41008c GetComputerNameA
0x410090 GetTickCount
0x410094 GetCurrentProcess
0x410098 GetModuleHandleA
0x41009c GetSystemInfo
0x4100a0 GetVersionExA
0x4100a4 lstrcmpiA
0x4100a8 lstrlenA
0x4100ac Sleep
0x4100b0 lstrcpynA
0x4100b4 InterlockedExchange
0x4100b8 GetCurrentThreadId
0x4100bc ExitProcess
0x4100c0 GetOverlappedResult
0x4100c4 WaitForSingleObject
0x4100c8 GetLastError
0x4100cc WriteFile
0x4100d0 ReadFile
0x4100d4 CreateFileA
0x4100d8 DisconnectNamedPipe
0x4100dc ConnectNamedPipe
0x4100e0 CreateNamedPipeA
0x4100e4 CloseHandle
0x4100e8 LoadLibraryA
0x4100f0 DeleteFileA
0x4100f4 IsBadWritePtr
0x4100f8 IsBadCodePtr
0x4100fc lstrcpyA
0x410100 lstrcmpA
0x410104 VirtualProtect
0x410108 IsBadReadPtr
0x41010c VirtualFree
0x410110 WriteProcessMemory
0x410114 VirtualAllocEx
0x410118 VirtualAlloc
0x41011c SetFilePointer
0x410120 GetFileSize
0x410124 SetFileAttributesA
0x410128 GetDiskFreeSpaceA
0x410130 GetProcAddress
0x410134 LocalFree
0x41013c LocalAlloc
0x410140 CreateProcessA
0x410144 GetTempPathA
0x41014c GetSystemTime
0x410150 DeviceIoControl
0x410154 CreateFileW
0x410158 GetModuleFileNameA
0x41015c ResumeThread
0x410160 SetThreadContext
0x410164 TerminateProcess
0x410168 GetThreadContext
0x41016c lstrcatA
0x410170 CreateThread
0x410174 GetDriveTypeA
0x410178 GetCommandLineA
0x410180 SetErrorMode
0x410188 GetLocalTime
0x41019c HeapSize
0x4101a4 MultiByteToWideChar
0x4101a8 lstrlenW
0x4101ac GetStartupInfoW
0x4101b0 GetProcessHeap
0x4101b4 HeapAlloc
0x4101b8 HeapReAlloc
0x4101bc HeapFree
0x4101c0 FreeLibrary
0x4101c4 CreateEventA
0x4101c8 GetSystemDirectoryA
Library USER32.dll:
0x4101e4 wsprintfA
0x4101e8 CharToOemA
Library ADVAPI32.dll:
0x41000c RegCreateKeyExA
0x410018 SetServiceStatus
0x41001c RegDeleteValueA
0x410020 RegGetKeySecurity
0x410024 RegSetKeySecurity
0x410028 RegSetValueExA
0x41002c GetLengthSid
0x410030 GetFileSecurityA
0x410038 EqualSid
0x410044 SetFileSecurityA
0x41004c GetAce
0x410050 DeleteAce
0x410058 RegQueryValueExA
0x41005c RegEnumKeyA
0x410060 RegOpenKeyExA
0x410064 RegEnumValueA
0x410068 GetUserNameW
0x41006c LookupAccountNameW
0x410070 LookupAccountNameA
0x410074 GetUserNameA
0x410078 RegCloseKey
0x410080 FreeSid
Library SHELL32.dll:
0x4101d8 ShellExecuteA
0x4101dc ShellExecuteExW
Library OLEAUT32.dll:

!This program cannot be run in DOS mode.
`.rdata
@.data
.reloc
L$$QSSSSSSSh
T$(RSSSj
D$ _^[3
Wjd_W3
D$,PUU
;H |(j
QQSUVWj
_^][YY
uw9V ~r
jdjdjdh
?[u.G@W
;HHu$V
+Y4;YPw,
9E|tV9
M|PPPPV
s]j(XS
urSUVW
r"SSSSh
PSSSSSSh
aaaah~
5aaaaY;E
vHWUVj
QQSVW3
ulSWjMh
SWj:hL
Y5aaaaP
5aaaaP
5aaaaP
j_WVh
SSSh^@@
tAOt%OuI
EpYY;x
F;uH~"
'9}\u"
9}0tI9}Xt
+AH+QLRP
Xj@Sh@5A
HHtEHt#HuM
PSSSSh
PSSSSh
~@WVhd
uyWVjFh8
T9G$u&
@YY_[^
mail.ru
google.com
yahoo.com
microsoft.com
GetBestInterface
GetIfEntry
GetAdaptersInfo
Iphlpapi.dll
123.45.67.89
GetAdaptersAddresses
%u.%u.%u.%u.%s
loader_id
born_date
net_type
start_srv
work_srv
flags_upd
localcfg
lid_file_upd
kernel32
IsWow64Process
rbl_ip
rbl_bl
DnsQuery_A
dnsapi.dll
GetNetworkParams
iphlpapi.dll
\\.\pipe\
%SYS_JR
%SYS_N
%SYS_RN
%RND_SPACE
%RND_char
qwertyuiopasdfghjklzxcvbnm
%RND_CHAR
QWERTYUIOPASDFGHJKLZXCVBNM
%RND_hex
0123456789abcdef
%RND_HEX
0123456789ABCDEF
%RND_DIGIT
0123456789
%RND_NUM
except_info
ret=%p
_ax=%p
_bx=%p
_cx=%p
_dx=%p
_si=%p
_di=%p
_bp=%p
_sp=%p
va=%08X%08X uef=%p
ver=%d date=%s %s
c=%08x a=%p
Jan 13 2018
12:08:32
GetSystemWow64DirectoryA
rresolv
plg_init
priority
=%X%08X
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
Incorrect respons
Too small respons
Too big smtp respons (%d bytes)
Error sending command (sent = %d/%d)
rcpt to:<%s>
mail from:<%s>
AUTH LOGIN
helo %s
ehlo %s
mx connect error
LocalHost
%OUTLOOK_HST
%OUTLOOK_MID
%04x%08.8lx$%08.8lx$%08x@%s
----=_NextPart_%03d_%04X_%08.8lX.%08.8lX
%OUTLOOK_BND_
127.0.0.1
%s, %u %s %u %.2u:%.2u:%.2u %s%.2u%.2u
%M5DATE
%P5DATE
%TO_HASH
%TO_USER
%TO_EMAIL
%TO_DOMAIN
%FROM_USER
%FROM_DOMAIN
%FROM_EMAIL
no locks and using MX is disabled
Time sending was exhausted
Too many errors in the block
INSERT_ORIGINAL_EMAIL
smtp_retr
smtp_ban
smtp_herr
Type = %d:
works = %d
cur_thr = %d
num_thr = %d
integr = %d
integr_nl = %d
fCntrl = %d
time_ok_filt = %d
cntr = %d
time_nl_filt = %d
last_time_work = %d
last_time_getem = %d
last_time_calc = %d
last_time_nl = %d
nl_cntr = %d
last_err = %d
errs = %d,%d,%d,%d,%d,%d,%d,%d,%d,%d
ID = %u:
lib = %d
ok = %d
err = %d
lis = %d
lok = %d
lerr = %d
cfg = %d
25 = %d
mac = %d
task = %d
ems = %d
local_time
drivers\
}srv_time
time_cfg
_allmul
_alldiv
-2147483648
ntdll.dll
RtlExpandEnvironmentStrings_U
RtlSetLastWin32Error
NtTerminateProcess
RtlFreeSid
RtlInitUnicodeString
NtSetInformationThread
NtSetInformationToken
RtlNtStatusToDosError
NtClose
NtOpenProcessToken
NtDuplicateToken
RtlAllocateAndInitializeSid
NtFilterToken
RtlLengthSid
NtQueryInformationToken
WS2_32.dll
StackWalk64
dbghelp.dll
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
GetProcAddress
LoadLibraryA
GetVolumeInformationA
GetComputerNameA
GetTickCount
GetCurrentProcess
GetModuleHandleA
GetSystemInfo
GetVersionExA
lstrcmpiA
lstrlenA
lstrcpynA
InterlockedExchange
GetCurrentThreadId
ExitProcess
GetOverlappedResult
WaitForSingleObject
GetLastError
WriteFile
ReadFile
CreateFileA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
CloseHandle
CreateEventA
GetEnvironmentVariableA
DeleteFileA
IsBadWritePtr
IsBadCodePtr
lstrcpyA
lstrcmpA
VirtualProtect
IsBadReadPtr
VirtualFree
WriteProcessMemory
VirtualAllocEx
VirtualAlloc
SetFilePointer
GetFileSize
SetFileAttributesA
GetDiskFreeSpaceA
GetWindowsDirectoryA
GetSystemDirectoryA
LocalFree
GetFileAttributesExA
LocalAlloc
CreateProcessA
GetTempPathA
SystemTimeToFileTime
GetSystemTime
DeviceIoControl
CreateFileW
GetModuleFileNameA
ResumeThread
SetThreadContext
TerminateProcess
GetThreadContext
lstrcatA
CreateThread
GetDriveTypeA
GetCommandLineA
SetUnhandledExceptionFilter
SetErrorMode
InterlockedIncrement
GetLocalTime
GetTimeZoneInformation
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
HeapSize
GetSystemTimeAsFileTime
MultiByteToWideChar
lstrlenW
GetStartupInfoW
KERNEL32.dll
wsprintfA
CharToOemA
USER32.dll
LookupAccountNameW
GetUserNameW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
SetSecurityDescriptorDacl
DeleteAce
GetAce
GetSecurityDescriptorDacl
SetFileSecurityA
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
EqualSid
GetSecurityDescriptorOwner
GetFileSecurityA
GetLengthSid
RegSetValueExA
RegSetKeySecurity
RegGetKeySecurity
RegDeleteValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegCreateKeyExA
CreateProcessWithLogonW
ADVAPI32.dll
ShellExecuteA
ShellExecuteExW
SHELL32.dll
OLEAUT32.dll
0123456789ABCDEF
0%020;0D0M0V0_0h0q0z0
1$11161C1Q1V1c1q1v1
2'2,292B2G2T2^2c2p2
3"3O3a3h3
3$4O4p4
56$6)6/6K6\6k6
8O9V9e9
9:8:\:
>&>+>?>_>m>
0"00060?0M0S0\0j0t0|0
1.1M1[1a1l1s1
770767<7D7V7`7l7v7
:*;L;l;
<'<R<Y<
=*=<=L=\=c=
>)>0>@>Q>
7V8e8l8
:%:g:s;
>$>F>Q>]>c>
?F?P?a?t?
#0.0H0r0
0#1,1\1n1{1
1U2a2l2
6#666I6c6i6
7&7+7;7@7M7R7n7
;S<m<z<
?(?B?R?j?
1U2W3-4B4O5
5,565;5H5^5q5z5
7)7.7W7
:8;B;J;P;[;g;q;y;
;<@<K<T<\<
= =-=7=D=T=z=
>&>/>W>
?&?7?@?E?X?|?
!01080
3Z4_4t4
718h8z8
9L:Z:k:{:
;=;[;l;
<)<B<h<
=5=:=L=V=f=t=
>#>)>2>@>T>^>g>r>x>~>
Q0e0j0
1G1L1a1o1
2'2/2;2Z2`2
4C4L4p4|4
5&515Z5u5
6.6h6~6
757B7^7d7
8(8]8w8
9(939>9H9O9V9c9j9t9{9
:$:.:8:B:L:V:`:j:t:~:
;!;+;5;?;I;S;];g;q;{;
<1<B<K<
>L>Q>a>
1$1/161a1h1v1
3 3B3p3w3
5(5L5_5s5
6'6X6^6g6u6
7#787E7X7a7
838P8]8u8}8
9(9-949Y9c9h9n9u9
9 :%:1:x:
>">*>:>a>q>
>(?=?`?l?
0 0:0S0`0t0
0"131v1}1
4&4<4N4c4
425`6|6
7+797h7t7
8I8V8_8m8
99:N:q:
;:;Q;U;Y;];a;e;i;m;q;u;y;};
>">J>Y>
[1i1!2(2/262=2D2K2R2Y2`2g2n2u2|2
2+3r3y3
3424L4b4i4t4
5S6]6m6
6)747K7P7n7t7}7
;O<d<x<
<=J=P=^=
>!>%>)>->;>G>V>b>E?^?c?q?x?
091?1E1K1Q1W1]1g1q1{1
2!2+252?2E2J2P2U2[2a2g2m2s2y2
5&555;5@5Q5U5[5e5o5u5{5
6*6J6S6a6r6
707D7M7b7r7
8-8Q8l8
9)919>9J9W9\9m9t9
;e;r;x;
<*<u<z<
>(>K>P>b>k>p>
191W1s1
12$232:2~2
3(3`3e3t3{3
4*414B4]4
5I5_5n5y5
6?6E6K6Q6c6
8!8,8H8f8
9]9k9w9
9:6:M:n:
;4;G;L;X;b;
;.<A<m<
="=(===N=U=[=c=k=s=z=
%0D0}0
0)1Z1c1
22o2t2
5"5Z5m5
7$7;7R7Z7
;#;B;K;V;
<C<J<`<t<z<
3O3i3w3
`2<4@4D4H4L4P4T4X4\4L5P5T5X5\5`5d5h5l5p5t5x5|5
n%systemroot%\system32\cmd.exe
wusa.exe
useless
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Generic.4!c
Elastic Windows.Trojan.Tofsee
MicroWorld-eScan Backdoor.Tofsee.DW
ClamAV Win.Trojan.Tofsee-7102058-0
FireEye Generic.mg.92e466525e810b79
CAT-QuickHeal Backdoor.TofseePMF.S28195247
McAfee BackDoor-FDRN!92E466525E81
Malwarebytes Tofsee.Trojan.SpamBot.DDS
Zillya Trojan.Tofsee.Win32.3321
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Backdoor.Tofsee.DW
K7GW Trojan ( 004b8ae41 )
K7AntiVirus Trojan ( 0059425c1 )
Baidu Win32.Trojan.Tofsee.a
VirIT Clean
Cyren W32/Tofsee.Q.gen!Eldorado
Symantec Trojan.Ascesso!gm
tehtris Clean
ESET-NOD32 a variant of Win32/Tofsee.AX
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Malware:Win32/km_24aa149.None
NANO-Antivirus Trojan.Win32.Tofsee.jkpmhc
ViRobot Trojan.Win32.Coinminer.11045888
Rising Trojan.Tofsee!1.AF3A (CLASSIC)
Emsisoft Backdoor.Tofsee.DW (B)
F-Secure Backdoor.BDS/Backdoor.Gen
DrWeb BackDoor.Tofsee.199
VIPRE Backdoor.Tofsee.DW
TrendMicro TROJ_GEN.R002C0CKL22
McAfee-GW-Edition BehavesLike.Win32.Generic.lh
Trapmine malicious.moderate.ml.score
CMC Clean
Sophos Mal/Tinba-AH
Ikarus Backdoor.Win32.Tofsee
GData Win32.Backdoor.Tofsee.C
Jiangmin Trojan.Invader.bin
Webroot Clean
Avira BDS/Backdoor.Gen
MAX malware (ai score=80)
Antiy-AVL Trojan[Backdoor]/Win32.Tofsee
Gridinsoft Backdoor.Win32.Tofsee.cl
Xcitium MalCrypt.Indus!@1qrzi1
Arcabit Backdoor.Tofsee.DW
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Generic
Microsoft Backdoor:Win32/Tofsee.MAK!MTB
Google Detected
AhnLab-V3 Backdoor/Win32.Tofsee.R284452
Acronis Clean
VBA32 BScope.Backdoor.Tofsee
ALYac Backdoor.Tofsee.DW
TACHYON Clean
DeepInstinct MALICIOUS
Cylance unsafe
Panda Trj/Genetic.gen
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0CKL22
Tencent Trojan.Win32.Tofsee.xa
Yandex Trojan.GenAsa!XvO1cEIyueE
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.7164915.susgen
Fortinet W32/Tofsee.AX!tr
BitDefenderTheta Gen:NN.ZexaF.36132.eqW@aiBfOGn
AVG Win32:BackdoorX-gen [Trj]
Avast Win32:BackdoorX-gen [Trj]
No IRMA results available.