× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1058c90279709895ba493065491fae7401d99cf95b8bdf0c370ead8fc014445d
File name: emotet_e1_1058c90279709895ba493065491fae7401d99cf95b8bdf0c370ead8...
Detection ratio: 50 / 70
Analysis date: 2019-01-26 07:22:45 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31549906 20190126
AhnLab-V3 Malware/Gen.Generic.C2950548 20190125
ALYac Trojan.Agent.Emotet 20190126
Arcabit Trojan.Generic.D1E169D2 20190126
Avast Win32:BankerX-gen [Trj] 20190126
AVG Win32:BankerX-gen [Trj] 20190126
Avira (no cloud) TR/AD.Emotet.jxcsg 20190126
BitDefender Trojan.GenericKD.31549906 20190126
ClamAV Win.Malware.Emotet-6827470-0 20190126
Comodo Malware@#182cfo2udz60z 20190126
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.78d9a4 20190109
Cylance Unsafe 20190126
Cyren W32/Emotet.MT.gen!Eldorado 20190126
DrWeb Trojan.Emotet.583 20190126
Emsisoft Trojan.GenericKD.31549906 (B) 20190126
Endgame malicious (high confidence) 20181108
ESET-NOD32 Win32/Emotet.BN 20190126
F-Prot W32/Emotet.MT.gen!Eldorado 20190126
F-Secure Trojan.GenericKD.31549906 20190126
Fortinet W32/Kryptik.GOUV!tr 20190126
GData Win32.Trojan-Spy.Emotet.UV 20190126
Ikarus Trojan-Banker.Emotet 20190125
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005460841 ) 20190126
K7GW Trojan ( 005460841 ) 20190126
Kaspersky Trojan-Banker.Win32.Emotet.cawm 20190126
Malwarebytes Trojan.Emotet 20190126
McAfee RDN/PWS-Banker 20190126
McAfee-GW-Edition BehavesLike.Win32.Dropper.hm 20190126
Microsoft Trojan:Win32/Emotet 20190126
eScan Trojan.GenericKD.31549906 20190126
NANO-Antivirus Trojan.Win32.Emotet.fmhblf 20190126
Palo Alto Networks (Known Signatures) generic.ml 20190126
Panda Trj/GdSda.A 20190125
Qihoo-360 HEUR/QVM20.1.B29F.Malware.Gen 20190126
Rising Trojan.Emotet!8.B95 (CLOUD) 20190126
SentinelOne (Static ML) static engine - malicious 20190124
Sophos AV Mal/Emotet-Q 20190126
Symantec Trojan.Emotet 20190125
Tencent Win32.Trojan-banker.Emotet.Llhh 20190126
Trapmine malicious.high.ml.score 20190123
TrendMicro TrojanSpy.Win32.EMOTET.THOABCAI 20190126
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THOABCAI 20190126
VBA32 BScope.Trojan.Refinka 20190125
ViRobot Trojan.Win32.Z.Emotet.558080 20190125
Webroot W32.Trojan.Emotet 20190126
Yandex Trojan.PWS.Emotet! 20190125
Zillya Trojan.Emotet.Win32.11942 20190125
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cawm 20190126
Acronis 20190124
AegisLab 20190126
Alibaba 20180921
Avast-Mobile 20190126
AVware 20180925
Babable 20180918
Baidu 20190125
Bkav 20190125
CAT-QuickHeal 20190125
CMC 20190125
eGambit 20190126
Jiangmin 20190126
Kingsoft 20190126
MAX 20190126
SUPERAntiSpyware 20190123
TACHYON 20190126
TheHacker 20190125
TotalDefense 20190126
Trustlook 20190126
Zoner 20190125
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights res

Product F1j5HfqhrQ3
File version 6.1.760
Description Canadian M
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-21 11:43:44
Entry Point 0x00001000
Number of sections 4
PE sections
PE imports
InitializeAcl
CreateRestrictedToken
ClusterRegCloseKey
CertDuplicateCRLContext
SetTextAlign
EndPage
BitBlt
LCIDToLocaleName
FlushFileBuffers
SetThreadPreferredUILanguages
ResumeThread
GetModuleHandleW
VarI4FromDate
VarI4FromCy
IsPwrHibernateAllowed
CloseDesktop
GetScrollPos
DdeAddData
CreateIconIndirect
WTHelperGetProvCertFromChain
Ord(29)
CoLoadLibrary
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
GERMAN 1
PE resources
ExifTool file metadata
SpecialBuild
6, 3, 0, 2b

SubsystemVersion
5.0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.3.0.2

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Canadian M

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
406528

EntryPoint
0x1000

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights res

FileVersion
6.1.760

TimeStamp
2019:01:21 12:43:44+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
6.1.7600

UninitializedDataSize
0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corpo

CodeSize
159744

ProductName
F1j5HfqhrQ3

ProductVersionNumber
6.3.0.2

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 37a1ab3bf5b00d2c502d38c0eefeae8f
SHA1 4f0f94c78d9a4f087b3f55e6fa3b7ecf6f82ad66
SHA256 1058c90279709895ba493065491fae7401d99cf95b8bdf0c370ead8fc014445d
ssdeep
3072:BwwwlzFALOaSQP0LFtaXD10jpEZ7xq7ZUYnNoFdPF3hgHey8Qk:vyALOavP0LFkYO7yUYnNKdP9hgJ8Q

authentihash f70e48c2a6a0a3bab6a015116342adee0a0ab34944dd6da4373519667c41a832
imphash ba1ccff3586faac4d5e71b371cb2e99f
File size 545.0 KB ( 558080 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-21 12:09:20 UTC ( 2 months ago )
Last submission 2019-01-21 15:51:46 UTC ( 2 months ago )
File names i8kqjy03RbD.exe
Tjyqb.exe
91FRnbQtyabx.exe
mMvXXN4A.exe
S5LjecOz16j.exe
8J9la1TcK.exe
eE8O1Uc5Paw.exe
8lxAtEdNz.exe
detectwab.exe
tP6w0Edn.exe
398.exe
nciIfTUN4c1N.exe
wDeyCasCOm.exe
964.exe
mVbOti8cX.exe
emotet_e1_1058c90279709895ba493065491fae7401d99cf95b8bdf0c370ead8fc014445d_2019-01-21__115003.exe_
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!