× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1c5c3cc32a08b813fa114e586f700d7dc2fd9db246c239ec2c7bf6c6ea2ee641
File name: afffb32fa2bc762cacbe4760326a18c6.virus
Detection ratio: 44 / 67
Analysis date: 2018-05-20 12:54:08 UTC ( 9 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Quackbot.53 20180520
AhnLab-V3 Trojan/Win32.Emotet.R228365 20180520
ALYac Gen:Variant.Quackbot.53 20180520
Antiy-AVL Trojan/Win32.SGeneric 20180520
Arcabit Trojan.Quackbot.53 20180520
Avast Win32:Malware-gen 20180520
AVG Win32:Malware-gen 20180520
Avira (no cloud) TR/Crypt.ZPACK.eobzx 20180520
AVware Trojan.Win32.Generic!BT 20180520
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9990 20180518
BitDefender Gen:Variant.Quackbot.53 20180520
Comodo Heur.Packed.Unknown 20180520
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180418
Cylance Unsafe 20180520
Cyren W32/Emotet.BA.gen!Eldorado 20180520
DrWeb Trojan.Emotet.215 20180520
eGambit Unsafe.AI_Score_73% 20180520
Emsisoft Gen:Variant.Quackbot.53 (B) 20180520
Endgame malicious (high confidence) 20180507
ESET-NOD32 Win32/Emotet.BH 20180520
F-Prot W32/Emotet.BA.gen!Eldorado 20180520
F-Secure Gen:Variant.Quackbot.53 20180520
Fortinet W32/Kryptik.GGRY!tr 20180520
GData Win32.Trojan-Spy.Emotet.QD 20180520
Ikarus Trojan-Banker.Emotet 20180520
Sophos ML heuristic 20180503
K7AntiVirus Trojan ( 005300431 ) 20180520
K7GW Trojan ( 005300431 ) 20180520
Kaspersky Trojan-Banker.Win32.Emotet.aomv 20180520
MAX malware (ai score=80) 20180520
McAfee Emotet-FHJ!AFFFB32FA2BC 20180520
McAfee-GW-Edition BehavesLike.Win32.VirRansom.ch 20180520
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180520
eScan Gen:Variant.Quackbot.53 20180520
Qihoo-360 HEUR/QVM20.1.4A39.Malware.Gen 20180520
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/EncPk-ANX 20180520
Symantec Packed.Cupx!gen2 20180519
TrendMicro TROJ_GEN.R039C0OEJ18 20180520
TrendMicro-HouseCall TROJ_GEN.R039C0OEJ18 20180520
VBA32 BScope.P2P-Worm.Palevo 20180518
VIPRE Trojan.Win32.Generic!BT 20180520
Yandex Trojan.PWS.Emotet! 20180518
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.aomv 20180520
AegisLab 20180520
Alibaba 20180518
Avast-Mobile 20180520
Babable 20180406
Bkav 20180518
CAT-QuickHeal 20180520
ClamAV 20180520
CMC 20180520
Cybereason None
Jiangmin 20180520
Kingsoft 20180520
Malwarebytes 20180520
NANO-Antivirus 20180520
nProtect 20180520
Palo Alto Networks (Known Signatures) 20180520
Panda 20180520
Rising 20180520
SUPERAntiSpyware 20180520
Symantec Mobile Insight 20180518
Tencent 20180520
TheHacker 20180516
TotalDefense 20180520
Trustlook 20180520
ViRobot 20180520
Webroot 20180520
Zillya 20180519
Zoner 20180519
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-16 04:06:35
Entry Point 0x000015E3
Number of sections 4
PE sections
Overlays
MD5 19e15611a8a93fa546a28d761780c2e1
File type data
Offset 155648
Size 2148
Entropy 2.85
PE imports
ObjectCloseAuditAlarmA
CryptReleaseContext
MakeSelfRelativeSD
CertEnumPhysicalStore
GetDeviceCaps
GetObjectType
SetViewportExtEx
GetClipBox
GetNamedPipeClientProcessId
GetQueuedCompletionStatus
GetCurrentProcess
GetProcessIoCounters
FreeUserPhysicalPages
GetOEMCP
GetSystemDefaultLangID
GetNumberOfConsoleInputEvents
GetCommandLineA
IsValidLocale
EndDeferWindowPos
MapDialogRect
GetSystemMetrics
GetIconInfo
BeginPaint
CreateIconIndirect
SendMessageA
SCardGetStatusChangeA
Number of PE resources by type
RT_STRING 7
RT_BITMAP 3
RT_DIALOG 2
Number of PE resources by language
NEUTRAL 12
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:05:16 05:06:35+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
12288

LinkerVersion
10.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x15e3

InitializedDataSize
143360

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 afffb32fa2bc762cacbe4760326a18c6
SHA1 124e900b4f8814eafab2a6baa98b0dbb3658d2d8
SHA256 1c5c3cc32a08b813fa114e586f700d7dc2fd9db246c239ec2c7bf6c6ea2ee641
ssdeep
3072:b4hR1tOBfQVHCdLwfrYsA3s9k+RFMWb+1883Zt88mWIv:sRrOBfQV2LCrN92+RFMWb+1XjW

authentihash ef67af39d33cb2e3808eec560cac6aacfb13de15ac62248ed60f755e476a95ea
imphash d692eff1c54ac181edcfab20a4216aac
File size 154.1 KB ( 157796 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.3%)
Win32 Executable (generic) (23.5%)
OS/2 Executable (generic) (10.6%)
Clipper DOS Executable (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-05-20 12:54:08 UTC ( 9 months ago )
Last submission 2018-05-20 12:54:08 UTC ( 9 months ago )
File names afffb32fa2bc762cacbe4760326a18c6.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!