| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2005-Sep-28 03:04:05 |
| Detected languages |
English - United States
|
| Comments | |
| CompanyName | |
| ProductName | Brontok.A |
| FileVersion | 1.00.0004 |
| ProductVersion | 1.00.0004 |
| InternalName | Brontok.A |
| OriginalFilename | Brontok.A.HVM31 |
| Info | Matching compiler(s): |
Microsoft Visual Basic 5.0
Microsoft Visual Basic v5.0/v6.0 Microsoft Visual Basic v5.0 - v6.0 Microsoft Visual Basic v6.0 |
| Info | Interesting strings found in the binary: |
Contains domain names:
|
| Suspicious | The PE is possibly packed. |
Section .text is both writable and executable.
Section .rsrc is both writable and executable. |
| Malicious | VirusTotal score: 69/73 (Scanned on 2020-03-10 02:36:47) |
Bkav:
W32.AchaentY.Trojan
MicroWorld-eScan: Win32.Brontok.AP@mm FireEye: Generic.mg.78b832e5b174a831 CAT-QuickHeal: Worm.Brontok.DC3 McAfee: W32/Rontokbro.b@MM Cylance: Unsafe VIPRE: Worm.Win32.Brontok.1!cobra (v) SUPERAntiSpyware: Worm.Brontok-A Sangfor: Malware K7AntiVirus: Trojan ( 004c351a1 ) Alibaba: Trojan:Win32/starter.ali1000030 K7GW: Trojan ( 004c351a1 ) Cybereason: malicious.5b174a Arcabit: Win32.Brontok.EF9751 Invincea: heuristic BitDefenderTheta: AI:Packer.4E295F281D Cyren: W32/Brontok.C.gen!Eldorado Symantec: W32.Rontokbro.B@mm TotalDefense: Win32/Robknot.B Baidu: Win32.Worm-Email.Brontok.a APEX: Malicious Paloalto: generic.ml ClamAV: Win.Worm.Brontok-6 Kaspersky: Email-Worm.Win32.VB.ay BitDefender: Win32.Brontok.AP@mm NANO-Antivirus: Trojan.Win32.Brontok.gfvy AegisLab: Worm.Win32.VB.kZz1 Rising: Worm.VB.au (CLOUD) Ad-Aware: Win32.Brontok.AP@mm Emsisoft: Win32.Brontok.AP@mm (B) Comodo: Worm.Win32.Brontok.B@1xyc F-Secure: Worm.WORM/VB.ay.2 DrWeb: BackDoor.Generic.1138 Zillya: Worm.Brontok.Win32.11 TrendMicro: WORM_RONTOKBRO.B McAfee-GW-Edition: BehavesLike.Win32.Vilsel.mt Fortinet: W32/Brontok.A@mm Trapmine: malicious.high.ml.score CMC: Email-Worm.Win32.Brontok!O Sophos: W32/Brontok-B SentinelOne: DFI - Malicious PE F-Prot: W32/VB.MZ Jiangmin: I-Worm/Brontok.a Webroot: W32.Malware.Gen Avira: WORM/VB.ay.2 MAX: malware (ai score=85) Antiy-AVL: Worm[Email]/Win32.Brontok.c Endgame: malicious (high confidence) Microsoft: Worm:Win32/Brontok@mm ViRobot: I-Worm.Win32.Brontok.81920.H ZoneAlarm: Email-Worm.Win32.VB.ay AhnLab-V3: HEUR/Fakon.mwf.X1381 Acronis: suspicious VBA32: TScope.Trojan.VB ALYac: Win32.Brontok.AP@mm Malwarebytes: Worm.Brontok Panda: W32/Brontok.GA.worm Zoner: Trojan.Win32.745 ESET-NOD32: Win32/Brontok.B TrendMicro-HouseCall: WORM_RONTOKBRO.B Tencent: Trojan.Win32.FakeFolder.v Yandex: I-Worm.Brontok.ER Ikarus: Email-Worm.Win32.Brontok.A GData: Win32.Trojan.Rontokbro.A MaxSecure: Email-Worm.Brontok.Gen AVG: Win32:Brontok [Wrm] Avast: Win32:Brontok [Wrm] CrowdStrike: win/malicious_confidence_100% (W) Qihoo-360: HEUR/QVM03.0.0C1B.Malware.Gen |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xb8 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 2005-Sep-28 03:04:05 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 6.0 |
| SizeOfCode | 0xf000 |
| SizeOfInitializedData | 0x5000 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00001178 (Section: .text) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0x10000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x1000 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 1.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x28000 |
| SizeOfHeaders | 0x1000 |
| Checksum | 0x87878787 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| MSVBVM60.DLL |
#696
#697 MethCallEngine #626 #519 #705 #631 #525 EVENT_SINK_AddRef #527 #529 DllFunctionCall EVENT_SINK_Release #600 EVENT_SINK_QueryInterface __vbaExceptHandler #711 #712 #606 #713 #607 #531 #536 #645 #648 #571 #576 #685 #578 #100 #616 #618 #542 #543 #546 #580 |
|---|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.4 |
| ProductVersion | 1.0.0.4 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | English - United States |
| Comments | |
| CompanyName | |
| ProductName | Brontok.A |
| FileVersion (#2) | 1.00.0004 |
| ProductVersion (#2) | 1.00.0004 |
| InternalName | Brontok.A |
| OriginalFilename | Brontok.A.HVM31 |
| Resource LangID | English - United States |
|---|
| XOR Key | 0x886973f3 |
|---|---|
| Unmarked objects | 0 |
| 13 (8169) | 1 |
No comments yet.