× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2863a051a679a1a1880d4270c27dc5a01cc475be59545ad69efb99ad6fa1cf5c
File name: eca9239739dced27d1ddc9e1dc98a252
Detection ratio: 50 / 71
Analysis date: 2018-12-14 08:22:07 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40825610 20181214
AhnLab-V3 Malware/Gen.Generic.C2887716 20181213
ALYac Trojan.GenericKD.40825610 20181214
Arcabit Trojan.Generic.D26EF30A 20181214
Avast Win32:BankerX-gen [Trj] 20181214
AVG Win32:BankerX-gen [Trj] 20181214
BitDefender Trojan.GenericKD.40825610 20181214
CAT-QuickHeal Trojan.Dyzap.100452 20181213
Comodo Malware@#3ipr0cdbtolrg 20181214
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.739dce 20180225
Cylance Unsafe 20181214
Cyren W32/Emotet.KU.gen!Eldorado 20181214
DrWeb Trojan.Emotet.503 20181214
eGambit Unsafe.AI_Score_95% 20181214
Emsisoft Trojan.GenericKD.40825610 (B) 20181214
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNQV 20181213
F-Prot W32/Emotet.KU.gen!Eldorado 20181214
F-Secure Trojan.GenericKD.40825610 20181214
Fortinet Malicious_Behavior.SB 20181214
GData Trojan.GenericKD.40825610 20181214
Ikarus Trojan-Banker.Emotet 20181214
Sophos ML heuristic 20181128
K7AntiVirus Riskware ( 0040eff71 ) 20181213
K7GW Riskware ( 0040eff71 ) 20181213
Kaspersky Trojan-Banker.Win32.Emotet.bukv 20181213
Malwarebytes Trojan.Emotet 20181214
MAX malware (ai score=100) 20181214
McAfee Emotet-FID!ECA9239739DC 20181214
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20181214
Microsoft Trojan:Win32/Emotet.BF 20181214
eScan Trojan.GenericKD.40825610 20181214
NANO-Antivirus Trojan.Win32.Generic.fkzfgb 20181214
Palo Alto Networks (Known Signatures) generic.ml 20181214
Panda Trj/GdSda.A 20181213
Qihoo-360 Win32/Trojan.853 20181214
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20181214
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181214
Symantec Trojan.Emotet 20181214
TACHYON Banker/W32.Emotet.155648.AZ 20181214
Tencent Win32.Trojan-banker.Emotet.Anpp 20181214
Trapmine malicious.high.ml.score 20181205
TrendMicro TrojanSpy.Win32.EMOTET.THABAOAH 20181214
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THABAOAH 20181214
VBA32 TrojanBanker.Emotet 20181213
VIPRE Trojan.Win32.Generic!BT 20181214
Webroot W32.Trojan.Emotet 20181214
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bukv 20181214
AegisLab 20181213
Alibaba 20180921
Antiy-AVL 20181214
Avast-Mobile 20181213
Avira (no cloud) 20181214
AVware 20180925
Babable 20180918
Baidu 20181207
Bkav 20181213
ClamAV 20181214
CMC 20181213
Jiangmin 20181214
Kingsoft 20181214
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181212
TheHacker 20181213
TotalDefense 20181213
Trustlook 20181214
ViRobot 20181213
Yandex 20181213
Zillya 20181213
Zoner 20181214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation.

Product Micro
Internal name cfgmgr32.dl
File version 6.1.7601.1762
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-08 11:18:28
Entry Point 0x0000746E
Number of sections 8
PE sections
PE imports
GetFileSecurityW
GetTextExtentPointA
GetColorAdjustment
GetNamedPipeClientProcessId
FlushProcessWriteBuffers
GetPriorityClass
GetProcessAffinityMask
GetCurrentDirectoryW
SetThreadPriority
GetModuleHandleA
GetSystemDirectoryW
GlobalAlloc
GetNamedPipeClientComputerNameW
VirtualQueryEx
DebugBreak
GetTickCount
GetProcessVersion
DeleteTimerQueueEx
ExitThread
IsValidLanguageGroup
GetCurrentThread
LZInit
GetWindowTextLengthA
DrawMenuBar
DestroyCursor
FindClosePrinterChangeNotification
_time64
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
32768

UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
1.4.20030.62408

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
122880

EntryPoint
0x746e

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation.

FileVersion
6.1.7601.1762

TimeStamp
2018:12:08 03:18:28-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
cfgmgr32.dl

ProductVersion
6.1.7601.17621

SubsystemVersion
4.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corpor

LegalTrademarks
Mozilla, Netscape

ProductName
Micro

ProductVersionNumber
1.4.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 eca9239739dced27d1ddc9e1dc98a252
SHA1 0c1b759045839ac8f768e04f2c90ec9fd7f2196c
SHA256 2863a051a679a1a1880d4270c27dc5a01cc475be59545ad69efb99ad6fa1cf5c
ssdeep
1536:867Ojy88OcfgkOpeKtbSyVwr/Jpsi/RA3ffm15FK/HO5Se8MNf0A1E6im1O8P5lf:8xyrf3SbSyODJpx/Ro3mls0Trx0O3f

authentihash 646f5130a7d1a419a94c3f6815d64ceca6a194d1d0879e498ebc01818e433a19
imphash 9ef7953ced603bcb9da36a22ccfa7ece
File size 152.0 KB ( 155648 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-08 11:25:20 UTC ( 2 months, 2 weeks ago )
Last submission 2019-01-22 03:40:43 UTC ( 1 month ago )
File names eca9239739dced27d1ddc9e1dc98a252
998.exe
cfgmgr32.dl
30195005.exe
output.114661500.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!