× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 186ff276e9a955faecfd2a6d2f13681836dd07a65b16d09cd49446c413a8ef69
File name: output.114552337.txt
Detection ratio: 50 / 70
Analysis date: 2018-11-26 15:49:20 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40783963 20181126
AegisLab Trojan.Win32.Malicious.4!c 20181126
AhnLab-V3 Malware/Gen.Generic.C2851081 20181126
ALYac Trojan.GenericKD.40783963 20181126
Arcabit Trojan.Generic.D26E505B 20181126
Avast FileRepMalware 20181126
AVG FileRepMalware 20181126
BitDefender Trojan.GenericKD.40783963 20181126
Bkav HW32.Packed. 20181126
CAT-QuickHeal Trojan.Fuerboos 20181126
Comodo Malware@#33nzc6n97w6gt 20181126
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.5bcb3d 20180225
Cylance Unsafe 20181126
Cyren W32/Emotet.JI.gen!Eldorado 20181126
DrWeb Trojan.EmotetENT.304 20181126
eGambit Unsafe.AI_Score_53% 20181126
Emsisoft Trojan.Emotet (A) 20181126
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNBY 20181126
F-Prot W32/Emotet.JI.gen!Eldorado 20181126
F-Secure Trojan.GenericKD.40783963 20181126
Fortinet W32/GenKryptik.CRRV!tr 20181126
GData Trojan.GenericKD.40783963 20181126
Ikarus Trojan-Banker.Emotet 20181126
Sophos ML heuristic 20181108
Jiangmin Trojan.Banker.Emotet.ecw 20181126
K7AntiVirus Trojan ( 00541eb91 ) 20181126
K7GW Trojan ( 00541eb91 ) 20181126
Kaspersky Trojan-Banker.Win32.Emotet.brjm 20181126
Malwarebytes Trojan.Emotet 20181126
McAfee Emotet-FIB!0E0776034E5E 20181126
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20181126
Microsoft Trojan:Win32/Emotet.AC!bit 20181126
eScan Trojan.GenericKD.40783963 20181126
NANO-Antivirus Trojan.Win32.EmotetENT.fknjto 20181126
Palo Alto Networks (Known Signatures) generic.ml 20181126
Panda Trj/Genetic.gen 20181125
Qihoo-360 HEUR/QVM20.1.63CA.Malware.Gen 20181126
Rising Trojan.Kryptik!1.B4D6 (CLASSIC) 20181126
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/Generic-S 20181126
Symantec Trojan.Emotet 20181126
Trapmine malicious.high.ml.score 20181126
TrendMicro TROJ_GEN.R020C0OKN18 20181126
TrendMicro-HouseCall TROJ_GEN.R020C0OKN18 20181126
VIPRE Trojan.Win32.Generic!BT 20181125
ViRobot Trojan.Win32.Agent.135168.EW 20181126
Webroot W32.Trojan.Emotet 20181126
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.brjm 20181126
Alibaba 20180921
Antiy-AVL 20181126
Avast-Mobile 20181126
Avira (no cloud) 20181126
Babable 20180918
Baidu 20181126
ClamAV 20181126
CMC 20181126
Kingsoft 20181126
MAX 20181126
SUPERAntiSpyware 20181121
Symantec Mobile Insight 20181121
TACHYON 20181126
Tencent 20181126
TheHacker 20181126
TotalDefense 20181126
Trustlook 20181126
VBA32 20181126
Yandex 20181123
Zillya 20181123
Zoner 20181126
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Internal name kb
Description Sinha
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-13 23:08:05
Entry Point 0x00003390
Number of sections 8
PE sections
PE imports
PrivilegeCheck
JetEndSession
GetSystemWow64DirectoryA
GetCommandLineW
SetTimer
GetForegroundWindow
GetScrollPos
GetDialogBaseUnits
GetClipboardSequenceNumber
IsChild
Number of PE resources by type
RT_STRING 2
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 3
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1995:11:13 15:08:05-08:00

FileType
Win32 EXE

PEType
PE32

CodeSize
12288

LinkerVersion
14.0

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0x3390

InitializedDataSize
0

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
6.0

UninitializedDataSize
0

Execution parents
File identification
MD5 0e0776034e5e096704cd28cbd40cdaa3
SHA1 a0a25395bcb3d5d592c49e5244ea2226801bad03
SHA256 186ff276e9a955faecfd2a6d2f13681836dd07a65b16d09cd49446c413a8ef69
ssdeep
3072:e1u8LBv/zUg+wxBtYhI97Q55Rt9JjHdanD1bqCD8ORGs:e1vLpUg/i67ut9enDle

authentihash 4deee6972de1f5cc432988bb6533ce729a244792a75d137f5b6ffb98bc82086a
imphash bb9091a5e2b09cebbae5475edf484323
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-23 06:11:11 UTC ( 2 months, 4 weeks ago )
Last submission 2018-11-28 09:12:28 UTC ( 2 months, 3 weeks ago )
File names kb
74bC.exe
S1cb7UBP0my.exe
output.114552337.txt
confatalk.exe
0e0776034e5e096704cd28cbd40cdaa3
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.