× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 50ee85432dc1870c51cf570fb55343cb98492d891073609cf147fb57557d60a9
File name: emotet_e1_50ee85432dc1870c51cf570fb55343cb98492d891073609cf147fb5...
Detection ratio: 23 / 71
Analysis date: 2019-01-19 06:54:03 UTC ( 4 months, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190119
AegisLab Trojan.Win32.Malicious.4!c 20190119
CAT-QuickHeal Trojan.Emotet.X4 20190118
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.934b0d 20190109
Cylance Unsafe 20190119
eGambit Unsafe.AI_Score_99% 20190119
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190119
Malwarebytes Trojan.Emotet 20190119
McAfee Artemis!F411282757B2 20190119
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dh 20190119
Microsoft Trojan:Win32/Emotet.AC!bit 20190119
Palo Alto Networks (Known Signatures) generic.ml 20190119
Qihoo-360 Win32/Trojan.5a7 20190119
Rising Trojan.Emotet!8.B95/N3#91% (RDM+:cmRtazoRpj8aWLyzbAR1TCWpv8y1) 20190119
SentinelOne (Static ML) static engine - malicious 20190118
Sophos AV Mal/EncPk-OJ 20190119
Symantec ML.Attribute.HighConfidence 20190118
Trapmine malicious.high.ml.score 20190103
Webroot W32.Malware.Gen 20190119
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190119
Ad-Aware 20190119
AhnLab-V3 20190118
Alibaba 20180921
ALYac 20190119
Antiy-AVL 20190119
Arcabit 20190119
Avast 20190119
Avast-Mobile 20190118
AVG 20190119
Avira (no cloud) 20190119
Babable 20180918
Baidu 20190118
BitDefender 20190119
Bkav 20190119
ClamAV 20190119
CMC 20190118
Comodo 20190119
Cyren 20190119
DrWeb 20190119
Emsisoft 20190119
ESET-NOD32 20190119
F-Prot 20190119
F-Secure 20190119
Fortinet 20190119
GData 20190119
Ikarus 20190118
Jiangmin 20190119
K7AntiVirus 20190119
K7GW 20190119
Kingsoft 20190119
MAX 20190119
eScan 20190119
NANO-Antivirus 20190119
Panda 20190118
SUPERAntiSpyware 20190116
TACHYON 20190119
Tencent 20190119
TheHacker 20190118
TotalDefense 20190119
TrendMicro 20190119
TrendMicro-HouseCall 20190119
Trustlook 20190119
VBA32 20190118
VIPRE 20190119
ViRobot 20190118
Yandex 20190118
Zillya 20190118
Zoner 20190119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) America Online, Inc. 1999 - 2004

Product America Online
Internal name MISCUTIL
File version 9.00.001
Description Utilities
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-19 01:22:32
Entry Point 0x0001C0C9
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
InitiateSystemShutdownA
GetServiceDisplayNameW
CryptHashSessionKey
GetSidIdentifierAuthority
TreeResetNamedSecurityInfoW
LogonUserA
QueryUsersOnEncryptedFile
EqualPrefixSid
GetClusterFromResource
JetTerm2
GetLogColorSpaceA
GetCurrentPositionEx
GetPolyFillMode
GetObjectW
GetFontLanguageInfo
GetObjectType
GetSystemTime
GetSystemWindowsDirectoryA
GetModuleFileNameW
DeactivateActCtx
GetTapeStatus
GetPrivateProfileIntW
IsValidLocale
FlushFileBuffers
GetOverlappedResult
GetVolumePathNamesForVolumeNameW
IsWow64Process
GetAtomNameA
GetVolumeInformationA
GetWindowsDirectoryA
GetConsoleMode
WriteProfileStringA
GetConsoleCursorInfo
GetCurrentDirectoryA
GetLocalTime
GetLogicalDrives
GetTapePosition
GetProfileSectionA
GetSystemPowerStatus
GetCurrentThread
EnumResourceTypesA
EnumResourceNamesW
GetTimeFormatW
GetShortPathNameA
MapViewOfFile
GetModuleHandleA
ReadFile
GlobalAddAtomA
FindResourceExW
GetCurrentProcess
GetExitCodeThread
GetComputerNameExW
FindAtomW
GetSystemDirectoryA
GetPrivateProfileSectionW
LocalFree
GetThreadSelectorEntry
QueryIdleProcessorCycleTime
GetTimeZoneInformation
FlsGetValue
DebugActiveProcess
GetPrivateProfileStringA
GetFileType
LocalUnlock
GetThreadLocale
LoadTypeLib
VariantTimeToSystemTime
GetRecordInfoFromGuids
SystemTimeToVariantTime
RasGetEapUserIdentityA
RpcRaiseException
RpcServerListen
SetupDiGetClassDescriptionExW
ExtractIconA
HashData
SHDeleteValueA
GetMenuPosFromID
DecryptMessage
ReleaseCapture
ExcludeUpdateRgn
GetComboBoxInfo
PostQuitMessage
FlashWindowEx
GetMenuState
GetDialogBaseUnits
LookupIconIdFromDirectoryEx
DestroyCaret
GetTabbedTextExtentW
GetWindowRgn
LockWorkStation
GetMenuItemRect
GetLastActivePopup
IsWindowVisible
GetWindowPlacement
DrawMenuBar
DrawTextW
FindWindowW
GetThreadDesktop
LoadAcceleratorsA
GetPriorityClipboardFormat
DdeClientTransaction
ChangeMenuA
GetKeyboardLayout
GetMenuItemCount
DeferWindowPos
CreateIconFromResource
LoadCursorW
GetWindowLongW
GetWindowTextA
CharNextW
GetMenuContextHelpId
GetFileVersionInfoSizeW
FindNextUrlCacheEntryW
InternetGoOnline
DeleteUrlCacheEntryW
mmioSendMessage
DeletePortW
shutdown
getservbyname
realloc
fputws
fgetws
strcmp
CoTaskMemFree
MkParseDisplayName
CoUninitialize
CoGetClassObjectFromURL
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:01:19 02:22:32+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
130048

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

EntryPoint
0x1c0c9

InitializedDataSize
108544

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

Execution parents
File identification
MD5 f411282757b2d46b849f768dac234494
SHA1 71bc918934b0d9fafb002f5202b711f95c5e497a
SHA256 50ee85432dc1870c51cf570fb55343cb98492d891073609cf147fb57557d60a9
ssdeep
3072:h0uNbl8Jy/X8tNYZUr20vom//lllDVxCShvYIIYHbfhHCs/z8TjjRmESoUK7e8:WM38tNYZUr20vN/lDHC

authentihash 31b6a4950264babf1e789d096c8b24338f88baaa2e3a3ff13410d09268d48b93
imphash 14f3674ec338ccda1a7724b272bd0ccb
File size 225.0 KB ( 230400 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Microsoft Visual C++ compiled executable (generic) (46.2%)
Win32 Dynamic Link Library (generic) (18.4%)
Win32 Executable (generic) (12.6%)
Win16/32 Executable Delphi generic (5.8%)
OS/2 Executable (generic) (5.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-19 01:26:46 UTC ( 4 months, 1 week ago )
Last submission 2019-01-19 23:13:17 UTC ( 4 months ago )
File names 477.exe
MISCUTIL
351.exe
emotet_e1_50ee85432dc1870c51cf570fb55343cb98492d891073609cf147fb57557d60a9_2019-01-19__013001.exe_
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!