× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5af9a75384efd76752a0de8f072d9321a0259be8b33a33674a8cd0bda64b8657
File name: 27680eddc1a242fa2a0da62ea48ea05b
Detection ratio: 45 / 71
Analysis date: 2019-01-05 23:41:01 UTC ( 3 months, 1 week ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Ulise.21599 20190105
AhnLab-V3 Malware/Gen.Generic.C2912129 20190105
ALYac Gen:Variant.Ulise.21599 20190105
Arcabit Trojan.Ulise.D545F 20190105
Avast Win32:Trojan-gen 20190105
AVG Win32:Trojan-gen 20190105
BitDefender Gen:Variant.Ulise.21599 20190105
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.a0ae3d 20180225
Cylance Unsafe 20190106
Cyren W32/Emotet.LS.gen!Eldorado 20190105
eGambit Unsafe.AI_Score_98% 20190106
Emsisoft Gen:Variant.Ulise.21599 (B) 20190105
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOHA 20190105
F-Prot W32/Emotet.LS.gen!Eldorado 20190105
F-Secure Gen:Variant.Ulise.21599 20190105
Fortinet W32/GenKryptik.CVIK!tr 20190105
GData Gen:Variant.Ulise.21599 20190105
Ikarus Trojan.Win32.Crypt 20190105
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.fbl 20190105
K7AntiVirus Riskware ( 0040eff71 ) 20190105
K7GW Riskware ( 0040eff71 ) 20190105
Kaspersky Trojan-Banker.Win32.Emotet.bxpp 20190105
MAX malware (ai score=83) 20190106
McAfee GenericRXGT-CF!27680EDDC1A2 20190105
McAfee-GW-Edition BehavesLike.Win32.Worm.ch 20190105
Microsoft Trojan:Win32/Randet.A!plock 20190105
eScan Gen:Variant.Ulise.21599 20190105
Palo Alto Networks (Known Signatures) generic.ml 20190106
Panda Trj/GdSda.A 20190105
Qihoo-360 Win32/Trojan.b15 20190106
Rising Backdoor.Dridex!8.3226 (CLOUD) 20190105
Sophos AV Mal/Generic-S 20190105
Symantec ML.Attribute.HighConfidence 20190105
TACHYON Banker/W32.Emotet.200704.D 20190105
Tencent Win32.Trojan-banker.Emotet.Hqvo 20190106
Trapmine malicious.high.ml.score 20190103
TrendMicro TROJ_GEN.R002C0GA419 20190105
TrendMicro-HouseCall TROJ_GEN.R002C0GA419 20190105
VIPRE Trojan.Win32.Generic!BT 20190105
ViRobot Trojan.Win32.Z.Ulise.200704.A 20190105
Webroot W32.Trojan.Gen 20190106
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bxpp 20190105
Acronis 20181227
AegisLab 20190105
Alibaba 20180921
Antiy-AVL 20190105
Avast-Mobile 20190105
Avira (no cloud) 20190105
Babable 20180918
Baidu 20190104
Bkav 20190104
CAT-QuickHeal 20190105
ClamAV 20190105
CMC 20190105
Comodo 20190105
DrWeb 20190105
Kingsoft 20190106
Malwarebytes 20190105
NANO-Antivirus 20190105
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190102
TheHacker 20190104
TotalDefense 20190105
Trustlook 20190106
VBA32 20190104
Yandex 20181229
Zillya 20190105
Zoner 20190105
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-27 18:24:21
Entry Point 0x00003B00
Number of sections 6
PE sections
PE imports
CloseServiceHandle
GetSecurityDescriptorGroup
GetSecurityDescriptorControl
AllocateAndInitializeSid
InitiateSystemShutdownExW
LookupAccountSidA
GetWindowsAccountDomainSid
InitializeSecurityDescriptor
DescribePixelFormat
SelectClipPath
GetBkMode
PlayEnhMetaFile
GetSystemPaletteUse
GetDIBits
GdiFlush
GetLayout
FreeConsole
LoadLibraryW
GetUserGeoID
ExitThread
EnumSystemLocalesA
FileTimeToLocalFileTime
GetBinaryTypeW
GetSystemDefaultLCID
SetErrorMode
TerminateJobObject
GetSystemPowerStatus
WritePrivateProfileStringW
GetCPInfo
GetStringTypeA
GetSystemTimeAsFileTime
FindFirstFileW
GetACP
WritePrivateProfileStructW
ExpandEnvironmentStringsA
LocalFree
GetThreadId
GetDefaultCommConfigW
GetVersion
VirtualAlloc
NetSessionGetInfo
LoadTypeLib
VarCyCmp
IsPwrHibernateAllowed
DefMDIChildProcW
GetRawInputDeviceList
GetClassNameA
GetClassWord
MessageBoxIndirectW
GetWindowWord
GetDC
GetQueueStatus
GetLastActivePopup
GetRawInputData
GetClassLongA
LoadMenuIndirectA
GetActiveWindow
DefDlgProcA
EnumThreadWindows
ModifyMenuW
GetDesktopWindow
IsMenu
GetFocus
GetMenuStringA
InvalidateRgn
GetKeyboardType
IsChild
DeletePrinterDriverExW
DeletePrinterDriverW
SCardGetProviderIdA
GetColorProfileHeader
strspn
fputws
fgetwc
HICON_UserFree
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
94208

ImageVersion
0.0

ProductName
Microsoft Windows Operating

FileVersionNumber
5.1.2600.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
8.1

FileTypeExtension
exe

OriginalFileName
FINDGF.EXE

MIMEType
application/octet-stream

Subsystem
Windows command line

FileVersion
5.1.2600.0 (xpclient.010817-1148)

TimeStamp
2018:12:27 19:24:21+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
xind

ProductVersion
5.1.2600.0

FileDescription
SandM RXf GP DF

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights rese

MachineType
Intel 386 or later, and compatibles

CompanyName
Lovenet Corporation

CodeSize
102400

FileSubtype
0

ProductVersionNumber
5.1.2600.0

EntryPoint
0x3b00

ObjectFileType
Executable application

File identification
MD5 27680eddc1a242fa2a0da62ea48ea05b
SHA1 01e5e05a0ae3d389629ad71a34c6a45f65956f97
SHA256 5af9a75384efd76752a0de8f072d9321a0259be8b33a33674a8cd0bda64b8657
ssdeep
3072:arxxmJc6QRyeZ9iQN21mgHboUNDENEbPeJ:arrZRq4A3HnNIabm

authentihash 2e58e3c1c8d286b318529758001d82ce16b9be3f02cc49e86ad3108b381deb60
imphash bea2cf47857df51fca0af145cfe53872
File size 196.0 KB ( 200704 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.3%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-04 10:24:45 UTC ( 3 months, 2 weeks ago )
Last submission 2019-01-05 23:41:01 UTC ( 3 months, 1 week ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!