× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 408902db1089ca8776a09a90f38bd3b525b91682895f9829682a5d075781a082
File name: .
Detection ratio: 24 / 68
Analysis date: 2018-09-25 19:44:37 UTC ( 7 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40516828 20180925
Arcabit Trojan.Generic.D26A3CDC 20180925
BitDefender Trojan.GenericKD.40516828 20180925
Cybereason malicious.8b7a5e 20180225
Cyren W32/VBInject.PY.gen!Eldorado 20180925
Emsisoft Trojan.Dropper (A) 20180925
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Injector.EAPJ 20180925
F-Prot W32/VBInject.PY.gen!Eldorado 20180925
F-Secure Trojan.GenericKD.40516828 20180925
Fortinet W32/Injector.EAPJ!tr 20180925
GData Trojan.GenericKD.40516828 20180925
Sophos ML heuristic 20180717
Kaspersky HEUR:Trojan.Win32.Generic 20180925
Malwarebytes Trojan.MalPack.VB 20180925
MAX malware (ai score=87) 20180925
McAfee Packed-FMF!1E035EEA14B6 20180925
McAfee-GW-Edition Artemis!Trojan 20180925
Microsoft VirTool:Win32/VBInject 20180925
eScan Trojan.GenericKD.40516828 20180925
Panda Trj/GdSda.A 20180925
Qihoo-360 HEUR/QVM03.0.1B01.Malware.Gen 20180925
Rising Trojan.Injector!8.C4 (TFE:dGZlOgV2EMnyyGdYiA) 20180925
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180925
AegisLab 20180925
AhnLab-V3 20180925
Alibaba 20180921
Antiy-AVL 20180925
Avast 20180925
Avast-Mobile 20180925
AVG 20180925
Avira (no cloud) 20180925
AVware 20180925
Babable 20180918
Baidu 20180925
Bkav 20180925
CAT-QuickHeal 20180923
ClamAV 20180924
CMC 20180925
Comodo 20180925
CrowdStrike Falcon (ML) 20180723
Cylance 20180925
DrWeb 20180925
eGambit 20180925
Ikarus 20180925
Jiangmin 20180925
K7AntiVirus 20180925
K7GW 20180925
Kingsoft 20180925
NANO-Antivirus 20180925
Palo Alto Networks (Known Signatures) 20180925
SentinelOne (Static ML) 20180925
Sophos AV 20180925
SUPERAntiSpyware 20180907
Symantec 20180925
Symantec Mobile Insight 20180924
TACHYON 20180925
Tencent 20180925
TheHacker 20180924
TotalDefense 20180925
TrendMicro 20180925
TrendMicro-HouseCall 20180925
Trustlook 20180925
VBA32 20180925
VIPRE 20180925
ViRobot 20180925
Webroot 20180925
Yandex 20180924
Zillya 20180925
Zoner 20180924
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
pC TOOls

Product EMSisoft GMBH
Original name Embracingly5.exe
Internal name Embracingly5
File version 1.08.0005
Description ThUNderbird
Comments STArAPp
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 2:13 AM 12/21/2018
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-24 10:08:35
Entry Point 0x0000136C
Number of sections 3
PE sections
Overlays
MD5 9da688d877cb2f40fefb763aedd26d6b
File type data
Offset 974848
Size 5504
Entropy 7.57
PE imports
_adj_fdiv_m32
__vbaChkstk
__vbaPrintObj
EVENT_SINK_Release
__vbaRedim
__vbaVarDup
Ord(516)
_adj_fdivr_m64
_adj_fprem
__vbaFreeStrList
_adj_fpatan
EVENT_SINK_AddRef
__vbaGetOwner3
__vbaStrToUnicode
__vbaVarVargNofree
_adj_fdiv_m32i
__vbaStrCopy
__vbaFreeStr
__vbaExceptHandler
__vbaSetSystemError
__vbaFreeVarList
DllFunctionCall
__vbaFPException
__vbaFileClose
_adj_fdivr_m16i
__vbaStrMove
__vbaI4Cy
_adj_fdiv_r
Ord(100)
__vbaVarTstNe
_CItan
__vbaFreeVar
Ord(570)
_adj_fprem1
__vbaLateMemCallLd
__vbaObjSetAddref
__vbaAryConstruct2
__vbaFreeObj
__vbaFileOpen
_adj_fdiv_m64
__vbaStrBool
__vbaHresultCheckObj
_CIsqrt
_CIsin
__vbaR8Str
_CIlog
Ord(606)
__vbaVarTstGt
_allmul
_CIcos
Ord(616)
EVENT_SINK_QueryInterface
_adj_fptan
Ord(593)
__vbaVarMove
__vbaFPInt
__vbaErrorOverflow
_CIatan
__vbaNew2
_adj_fdivr_m32i
__vbaAryDestruct
_CIexp
__vbaInStrVar
__vbaStrToAnsi
__vbaStrI4
_adj_fdivr_m32
__vbaStrCat
__vbaFpR8
Ord(598)
Ord(698)
_adj_fdiv_m16i
Number of PE resources by type
RT_ICON 13
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 14
ENGLISH US 1
PE resources
ExifTool file metadata
CodeSize
933888

SubsystemVersion
4.0

Comments
STArAPp

LinkerVersion
6.0

ImageVersion
1.8

FileSubtype
0

FileVersionNumber
1.8.0.5

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
ThUNderbird

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
40960

EntryPoint
0x136c

OriginalFileName
Embracingly5.exe

MIMEType
application/octet-stream

LegalCopyright
pC TOOls

FileVersion
1.08.0005

TimeStamp
2018:09:24 11:08:35+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Embracingly5

ProductVersion
1.08.0005

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
the MASk PROductions

LegalTrademarks
DROpbox, INC.

ProductName
EMSisoft GMBH

ProductVersionNumber
1.8.0.5

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 1e035eea14b642ddc7336728d3ae9e8c
SHA1 0f563958b7a5e22c0472155d1711c5fb6f22d077
SHA256 408902db1089ca8776a09a90f38bd3b525b91682895f9829682a5d075781a082
ssdeep
12288:aWMa304kshdbVzPGQKXKzpwKD9WgVXBcy1lslw28E1uTU:aaHNhZdCgpBO1uTU

authentihash e89f9278d80857b2359e63edab7c05e0b13204849ddfa839a528b72a3a1555a6
imphash af79ad86386558acda71a8a1dd532d2a
File size 957.4 KB ( 980352 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (88.6%)
Win32 Executable (generic) (4.8%)
OS/2 Executable (generic) (2.1%)
Generic Win/DOS Executable (2.1%)
DOS Executable Generic (2.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-09-25 19:44:37 UTC ( 7 months, 3 weeks ago )
Last submission 2018-10-06 03:21:15 UTC ( 7 months, 2 weeks ago )
File names Embracingly5
onye.exe
output.114096868.txt
Embracingly5.exe
.
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.