× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 02f64d80d63704ae5a0eaac4a2a47bb334ba9a1fc84c2ffab7b79a7fafcb5d2c
File name: emotet_e1_02f64d80d63704ae5a0eaac4a2a47bb334ba9a1fc84c2ffab7b79a7...
Detection ratio: 50 / 70
Analysis date: 2019-02-15 06:13:02 UTC ( 3 months, 1 week ago )
Antivirus Result Update
Acronis suspicious 20190213
Ad-Aware Gen:Variant.Razy.460980 20190215
AhnLab-V3 Malware/Gen.Generic.C3000966 20190214
ALYac Gen:Variant.Razy.460980 20190215
Antiy-AVL Trojan[Banker]/Win32.Emotet 20190215
Arcabit Trojan.Razy.D708B4 20190214
Avast Win32:MalwareX-gen [Trj] 20190215
AVG Win32:MalwareX-gen [Trj] 20190215
Avira (no cloud) TR/Crypt.ZPACK.fsbod 20190215
BitDefender Gen:Variant.Razy.460980 20190215
CAT-QuickHeal Trojan.Emotet 20190214
ClamAV Win.Malware.Emotet-6853712-0 20190214
Comodo Malware@#oyfmcn91t393 20190215
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cylance Unsafe 20190215
Cyren W32/Trojan.USSM-4175 20190215
DrWeb Trojan.EmotetENT.379 20190215
Emsisoft Trojan.Emotet (A) 20190215
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Injector.DZBB 20190215
F-Prot W32/Emotet.OE.gen!Eldorado 20190215
Fortinet W32/Emotet.DZBB!tr 20190215
GData Gen:Variant.Razy.460980 20190215
Ikarus Trojan-Banker.Emotet 20190214
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005473a41 ) 20190215
K7GW Trojan ( 005473a41 ) 20190215
Kaspersky Trojan-Banker.Win32.Emotet.cejp 20190215
Malwarebytes Trojan.Emotet 20190215
MAX malware (ai score=100) 20190215
McAfee Emotet-FLY!565D532BB864 20190215
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20190215
Microsoft Trojan:Win32/Emotet.AC!bit 20190215
eScan Gen:Variant.Razy.460980 20190215
NANO-Antivirus Trojan.Win32.EmotetENT.fmtztw 20190215
Palo Alto Networks (Known Signatures) generic.ml 20190215
Panda Trj/Genetic.gen 20190214
Qihoo-360 Win32/Trojan.431 20190215
Rising Trojan.Kryptik!8.8 (CLOUD) 20190215
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Emotet-Q 20190215
Symantec Trojan.Emotet 20190215
Tencent Win32.Trojan-banker.Emotet.Suxx 20190215
Trapmine malicious.moderate.ml.score 20190123
TrendMicro TrojanSpy.Win32.EMOTET.THBOHAI 20190215
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THBOHAI 20190215
VBA32 BScope.Trojan.Emotet 20190214
Webroot W32.Trojan.Emotet 20190215
Yandex Trojan.PWS.Emotet! 20190215
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cejp 20190215
AegisLab 20190215
Alibaba 20180921
Avast-Mobile 20190214
Babable 20180918
Baidu 20190215
Bkav 20190214
CMC 20190214
Cybereason 20190109
eGambit 20190215
F-Secure 20190215
Jiangmin 20190215
Kingsoft 20190215
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190207
TACHYON 20190215
TheHacker 20190212
TotalDefense 20190215
Trustlook 20190215
ViRobot 20190215
Zillya 20190214
Zoner 20190215
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserv

Product Microsoft® Windows® Operating S
Internal name kbdgeoqw (3
File version 6.1.7600.16385 (win7_rtm.090713-
Description Georgian (QWERTY) Keyboa
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-07 17:20:08
Entry Point 0x00002403
Number of sections 5
PE sections
PE imports
EnumServicesStatusA
IsTokenRestricted
HeapCompact
SetCurrentConsoleFontEx
GetFileType
GetCPInfo
GetProcessShutdownParameters
UnhandledExceptionFilter
WaitForSingleObject
GetCommandLineW
SetConsoleScreenBufferInfoEx
IsDebuggerPresent
MultiByteToWideChar
CloseHandle
GetCurrentThreadId
GetCommConfig
GetThreadLocale
IsPwrHibernateAllowed
GetClipboardViewer
GetForegroundWindow
GetMenuInfo
GetTabbedTextExtentA
VkKeyScanA
IsZoomed
GetMenuState
GetShellWindow
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
102400

LinkerVersion
13.0

ImageVersion
6.0

FileSubtype
2

FileVersionNumber
5.1.2600.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Georgian (QWERTY) Keyboa

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x2403

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserv

FileVersion
6.1.7600.16385 (win7_rtm.090713-

TimeStamp
2019:02:07 18:20:08+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
kbdgeoqw (3

ProductVersion
6.1.7600.

SubsystemVersion
6.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
12288

ProductName
Microsoft Windows Operating S

ProductVersionNumber
5.1.2600.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Execution parents
File identification
MD5 565d532bb86445cabc9bc1ecfad6b32f
SHA1 b1cc659a176a7cfa122330accfefac2d4d24b809
SHA256 02f64d80d63704ae5a0eaac4a2a47bb334ba9a1fc84c2ffab7b79a7fafcb5d2c
ssdeep
3072:2wehMvFegb8IRk1Vwdso7i42EuiT8iYfFTH+iT5:2/hNgwIRQwmyNuHTH1

authentihash 839dd5954a1f02132a471c06f90dce3486d28ea1da40266a449b69f6b84e58c1
imphash 5881652ca7d7f3fbdbfd2540d778c6a6
File size 160.0 KB ( 163840 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-07 09:22:49 UTC ( 3 months, 2 weeks ago )
Last submission 2019-02-07 15:49:54 UTC ( 3 months, 2 weeks ago )
File names kbdgeoqw (3
emotet_e1_02f64d80d63704ae5a0eaac4a2a47bb334ba9a1fc84c2ffab7b79a7fafcb5d2c_2019-02-07__092501.exe_
926.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!