× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 48251fb89c510fb3efa14c4b5b546fbde918ed8bb25f041a801e3874bd4f60f8
File name: Eclipsedwing-1.5.2.exe
Detection ratio: 2 / 61
Analysis date: 2017-04-14 10:44:35 UTC ( 9 months, 1 week ago ) View latest
Antivirus Result Update
Avast Win32:Stuxnet-C [Wrm] 20170414
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20170414
Ad-Aware 20170414
AegisLab 20170414
AhnLab-V3 20170414
Alibaba 20170414
ALYac 20170414
Antiy-AVL 20170414
Arcabit 20170414
AVG 20170414
Avira (no cloud) 20170414
AVware 20170410
Baidu 20170414
BitDefender 20170414
Bkav 20170414
CAT-QuickHeal 20170413
ClamAV 20170414
CMC 20170414
Comodo 20170414
CrowdStrike Falcon (ML) 20170130
Cyren 20170414
DrWeb 20170414
Emsisoft 20170414
Endgame 20170413
ESET-NOD32 20170414
F-Prot 20170414
F-Secure 20170414
Fortinet 20170414
GData 20170414
Ikarus 20170414
Sophos ML 20170413
Jiangmin 20170414
K7AntiVirus 20170414
K7GW 20170414
Kaspersky 20170414
Kingsoft 20170414
Malwarebytes 20170414
McAfee 20170412
McAfee-GW-Edition 20170414
Microsoft 20170414
eScan 20170414
NANO-Antivirus 20170414
nProtect 20170414
Palo Alto Networks (Known Signatures) 20170414
Panda 20170414
Qihoo-360 20170414
Rising None
SentinelOne (Static ML) 20170330
Sophos AV 20170414
SUPERAntiSpyware 20170414
Symantec 20170413
Symantec Mobile Insight 20170414
Tencent 20170414
TheHacker 20170412
TrendMicro 20170414
TrendMicro-HouseCall 20170414
Trustlook 20170414
VBA32 20170414
VIPRE 20170414
ViRobot 20170414
Webroot 20170414
WhiteArmor 20170409
Yandex 20170413
Zillya 20170414
Zoner 20170414
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-07-16 01:31:22
Entry Point 0x0000530F
Number of sections 5
PE sections
PE imports
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
RtlUnwind
GetCurrentProcessId
GetModuleHandleA
InterlockedExchange
QueryPerformanceCounter
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
Sleep
GetCurrentThreadId
InterlockedCompareExchange
__WSAFDIsSet
inet_addr
ntohs
getsockname
inet_ntoa
htons
select
adfw_create
adfw_setValidate
adfw_setID
adfw_delete
adfw_setProcess
mainWrapper
_amsg_exit
?terminate@@YAXXZ
malloc
memset
__p__fmode
_exit
_adjust_fdiv
__setusermatherr
free
_cexit
memcpy
exit
_XcptFilter
_access
__getmainargs
calloc
_initterm
_controlfp
__p__commode
__set_app_type
TbWaitServerSocket
TbRecv
TbCloseSocket
TbSetRemoteSocketData
TbInitStruct
TbDoRpcBind
TbPutRpcArray
TbPutLong
TbFreeStructBuffers
TbCloseStructSockets
TbBuffCpy
TbMakeSocket
TbDoSmbShutdown
TbDoSmbSendData
TbMakeTcpReq
TbMakeServerSocket
TbDoSmbStartupEx
TbDoRpcRequestEx
TbPutPointer
TbMalloc
TbPutBuff
TbSetCallbackSocketData
TbPutAlign
TbDoSmbStartup
Parameter_String_setValue
Parameter_Boolean_getValue
Parameter_U8_getValue
Parameter_Port_getValue
Params_getCallbackPortValues
Params_findParamchoice
Parameter_IPv4_getValue
Parameter_U32_getValue
Paramchoice_getValue
Parameter_getType
Parameter_Socket_setValue
Paramchoice_setValue
Parameter_S16_getValue
Params_validateCallbackPorts
Params_findParameter
Parameter_U8_setValue
Parameter_markInvalid
Parameter_String_getValue
Parameter_LocalFile_getValue
TfReadFileIntoBuffer
TfNrvCompress
TfRandomizeBuffer
TfRandomByte
TfFillRandom
TfStrcasecmp
TfFree
TfNrvCalculateMaxExpansion
TcLog
TcLogBuffer
Number of PE resources by type
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2010:07:16 02:31:22+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
18944

LinkerVersion
9.0

EntryPoint
0x530f

InitializedDataSize
23040

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 195efb4a896e41fe49395c3c165a5d2e
SHA1 6e2272c8f53692e8bf83686fab9336caf64b7971
SHA256 48251fb89c510fb3efa14c4b5b546fbde918ed8bb25f041a801e3874bd4f60f8
ssdeep
768:MSs0srOCHZg81Zhnc943D5NcTzQSKAzYYqn6IUI3lEfJ:VHsiCHZgwZhnc943DLcTzan6IUI3l

authentihash 3acecdb45040225eee7b469cf25cf9f0ed34f8d0e33b45109977ce1b6c2d8546
imphash 19916ab84dbb68ca7713a54c37348620
File size 42.0 KB ( 43008 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2017-04-14 10:44:35 UTC ( 9 months, 1 week ago )
Last submission 2017-12-14 12:32:05 UTC ( 1 month ago )
File names eclipsedwing-1.5.2.exe
Eclipsedwing-1.5.2.exe
Eclipsedwing-1.5.2.exe
Eclipsedwing-1.5.2.exe
Eclipsedwing-1.5.2.exe
2YdDK8sPd.xls
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!