× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 210e5bdace62cbb2ffc47cde38bdf17ea0709557616772b05a5d13c646487314
File name: ZT4mL87aigAP.exe
Detection ratio: 46 / 70
Analysis date: 2018-11-28 04:32:55 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Generic.23221242 20181128
AegisLab Trojan.Multi.Generic.4!c 20181128
AhnLab-V3 Malware/Gen.Generic.C2860153 20181127
ALYac Trojan.Agent.Emotet 20181128
Arcabit Trojan.Generic.D16253FA 20181127
Avast FileRepMalware 20181128
AVG FileRepMalware 20181128
BitDefender Trojan.Generic.23221242 20181128
Bkav HW32.Packed. 20181127
ClamAV Win.Trojan.Emotet-6758494-0 20181127
Comodo Malware@#1zld06925w4xd 20181128
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.87c737 20180225
Cylance Unsafe 20181128
Cyren W32/Trojan.XFHW-9097 20181128
eGambit Unsafe.AI_Score_99% 20181128
Emsisoft Trojan.Generic.23221242 (B) 20181128
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CSFR 20181128
F-Secure Trojan.Generic.23221242 20181128
Fortinet W32/GenKryptik.CRRV!tr 20181128
GData Trojan.Generic.23221242 20181128
Ikarus Trojan-Banker.Emotet 20181127
Sophos ML heuristic 20181108
K7AntiVirus Riskware ( 0040eff71 ) 20181127
K7GW Riskware ( 0040eff71 ) 20181128
Kaspersky Trojan-Banker.Win32.Emotet.brvo 20181128
Malwarebytes Trojan.Emotet 20181128
McAfee Emotet-FKM!D0E707D87C73 20181128
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20181128
Microsoft Trojan:Win32/Emotet.AC!bit 20181127
eScan Trojan.Generic.23221242 20181128
Palo Alto Networks (Known Signatures) generic.ml 20181128
Panda Trj/RnkBend.A 20181127
Qihoo-360 Win32/Trojan.391 20181128
Rising Trojan.Kryptik!1.B4D6 (CLASSIC) 20181128
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181128
Symantec Trojan.Emotet 20181128
Trapmine malicious.high.ml.score 20181126
TrendMicro TSPY_EMOTET.THAABGAH 20181128
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMGD3.hp 20181128
VBA32 BScope.Malware-Cryptor.Emotet 20181127
VIPRE Trojan.Win32.Generic!BT None
Webroot W32.Trojan.Emotet 20181128
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.brvo 20181128
Alibaba 20180921
Antiy-AVL 20181128
Avast-Mobile 20181127
Avira (no cloud) 20181127
Babable 20180918
Baidu 20181127
CAT-QuickHeal 20181127
CMC 20181127
DrWeb 20181128
F-Prot 20181128
Jiangmin 20181128
Kingsoft 20181128
MAX 20181128
NANO-Antivirus 20181128
SUPERAntiSpyware 20181128
Symantec Mobile Insight 20181121
TACHYON 20181128
Tencent 20181128
TheHacker 20181126
TotalDefense 20181127
Trustlook 20181128
ViRobot 20181127
Yandex 20181127
Zillya 20181127
Zoner 20181128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description remtsv
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-19 14:43:13
Entry Point 0x00004CF0
Number of sections 6
PE sections
PE imports
GetLogColorSpaceA
GetTextExtentExPointA
GetMiterLimit
GetTextColor
GetPaletteEntries
GetFontLanguageInfo
GetSystemTime
GetQueuedCompletionStatus
FindResourceExA
GetThreadPriority
GetPrivateProfileStringA
GetOverlappedResult
WriteProfileStringA
GetSystemDefaultUILanguage
FindVolumeClose
GetTapeStatus
GetExitCodeProcess
GetVolumeInformationW
GlobalGetAtomNameA
GetCurrentThread
FreeConsole
FindFirstFileW
lstrcatW
GetCommandLineW
IsValidLanguageGroup
GetProcessAffinityMask
DeleteSecurityContext
GetUserNameExA
FreeCredentialsHandle
GetScrollRange
GetScrollPos
GetShellWindow
GetWindowRect
IsWindowEnabled
LoadKeyboardLayoutA
DestroyCaret
InsertMenuItemA
GetWindowRgn
GetDlgCtrlID
GetDoubleClickTime
IsZoomed
FindWindowW
DrawFocusRect
IsClipboardFormatAvailable
SetTimer
CountClipboardFormats
GetTopWindow
LoadImageA
GetCursor
GetFocus
DeregisterShellHookWindow
GetUrlCacheEntryInfoExA
GetUrlCacheEntryInfoW
GetPrinterDriverW
SCardGetProviderIdA
GetStandardColorSpaceProfileW
GetColorProfileHeader
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 1
CHINESE SIMPLIFIED 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
0.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
remtsv

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x4cf0

MIMEType
application/octet-stream

TimeStamp
1995:11:19 15:43:13+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TVersion
1.0

CodeSize
16384

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 d0e707d87c737b1c35be7ef5908aedfd
SHA1 9a2b1e230226575528a6128876b9eaad10f5848f
SHA256 210e5bdace62cbb2ffc47cde38bdf17ea0709557616772b05a5d13c646487314
ssdeep
3072:/YX2tp7YvRv1mpPOBzCTJHRXx1mNrM263yaTHD7D:/e2Yvl1KmBzY5RnmW2H0P

authentihash 493b17fb952c73f91bceb41a03527277dec839a465be6b8321cb82537fd98353
imphash 02cd317aa50536e85d96ff245984e540
File size 136.0 KB ( 139264 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-26 17:06:08 UTC ( 2 months, 4 weeks ago )
Last submission 2018-11-26 17:06:08 UTC ( 2 months, 4 weeks ago )
File names Z4TSCqN0cW.exe
pwdstatus.exe
3XwVMxBK.exe
ZT4mL87aigAP.exe
3PUdnQenAX.exe
fwQUcWwDxK.exe
wUJBLkWvm.exe
depsensor.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.