× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 569069e7f0c4df6d52965c4169c37bde22581d2cade10e0f21e449d4f9b91e85
File name: HKTLNFKHn0DViHOj1J.exe
Detection ratio: 44 / 70
Analysis date: 2018-11-28 01:44:38 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Generic.23220814 20181127
AegisLab Trojan.Win32.Emotet.4!c 20181128
ALYac Trojan.Generic.23220814 20181127
Arcabit Trojan.Generic.D162524E 20181127
Avast FileRepMalware 20181127
AVG FileRepMalware 20181128
BitDefender Trojan.Generic.23220814 20181128
Bkav HW32.Packed. 20181127
CAT-QuickHeal Trojan.Drixed.100337 20181127
ClamAV Win.Trojan.Emotet-6756924-0 20181127
Comodo Malware@#wvllk83jwf6k 20181128
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.79d87a 20180225
Cylance Unsafe 20181128
Cyren W32/Trojan.WDNF-8431 20181128
DrWeb Trojan.EmotetENT.307 20181128
Emsisoft Trojan.Emotet (A) 20181127
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNDV 20181127
F-Secure Trojan.Generic.23220814 20181128
Fortinet W32/GenKryptik.CRRV!tr 20181128
GData Win32.Trojan-Spy.Emotet.RVCMMK 20181128
Ikarus Trojan-Banker.Emotet 20181127
Sophos ML heuristic 20181108
Kaspersky Trojan-Banker.Win32.Emotet.brsu 20181128
Malwarebytes Trojan.Emotet 20181127
McAfee RDN/Generic.grp 20181128
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20181128
Microsoft Trojan:Win32/Emotet!rfn 20181127
eScan Trojan.Generic.23220814 20181127
NANO-Antivirus Trojan.Win32.EmotetENT.fkqgfc 20181128
Palo Alto Networks (Known Signatures) generic.ml 20181128
Panda Trj/Genetic.gen 20181127
Qihoo-360 HEUR/QVM20.1.7651.Malware.Gen 20181128
Rising Trojan.Kryptik!1.B4D6 (CLOUD) 20181127
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181127
Symantec Trojan.Emotet 20181128
Trapmine malicious.high.ml.score 20181126
TrendMicro TSPY_EMOTET.THAABFAH 20181127
TrendMicro-HouseCall TSPY_EMOTET.THAABFAH 20181128
VBA32 BScope.Malware-Cryptor.Emotet 20181127
Webroot W32.Trojan.Emotet 20181128
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.brsu 20181127
AhnLab-V3 20181127
Alibaba 20180921
Antiy-AVL 20181128
Avast-Mobile 20181127
Avira (no cloud) 20181127
Babable 20180918
Baidu 20181127
CMC 20181127
eGambit 20181128
F-Prot 20181128
Jiangmin 20181127
K7AntiVirus 20181127
K7GW 20181127
Kingsoft 20181128
MAX 20181128
SUPERAntiSpyware 20181128
Symantec Mobile Insight 20181121
TACHYON 20181127
Tencent 20181128
TheHacker 20181126
TotalDefense 20181127
Trustlook 20181128
VIPRE 20181127
ViRobot 20181127
Yandex 20181127
Zillya 20181127
Zoner 20181128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Internal name o
Description ndwdwyf
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-19 14:43:13
Entry Point 0x00003210
Number of sections 7
PE sections
PE imports
JetGetBookmark
GetTextColor
GetSystemTime
GetCommandLineW
GetThreadPriority
GetCurrentThread
IsClipboardFormatAvailable
SetTimer
CountClipboardFormats
GetScrollRange
SetMenu
GetScrollPos
IsWindowEnabled
GetFocus
GetShellWindow
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 1
CHINESE SIMPLIFIED 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
0.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
ndwdwyf

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x3210

MIMEType
application/octet-stream

TimeStamp
1995:11:19 15:43:13+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
o

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TVersion
1.0

CodeSize
12288

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ed11e3879d87aabacdec7c2641def3e8
SHA1 98516cf79b448eb517c1b0586fd72338df41d105
SHA256 569069e7f0c4df6d52965c4169c37bde22581d2cade10e0f21e449d4f9b91e85
ssdeep
3072:1Rz/0rsTCOU5pM8/3Ix5HWb0dftAXD/lnkCUu6nzey6ulZ6wpQ2VOlmTm12+Mswv:1KrsTCOU5pM8/4x5HWb0dftAXD/lnkCd

authentihash fa8d4a6aede4b32294107d0e2ca751c116146411f2893379c4fd66d0fecaaa8f
imphash 351893dc31063b3148eef8d4a7246f58
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-26 11:05:46 UTC ( 2 months, 4 weeks ago )
Last submission 2018-11-26 11:05:46 UTC ( 2 months, 4 weeks ago )
File names HKTLNFKHn0DViHOj1J.exe
o
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.