× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5afe22ee02ddaf11bae6337b0f6ab1cfc8990aa89c4b55e606d0f58e65bec94d
File name: emotet_e2_5afe22ee02ddaf11bae6337b0f6ab1cfc8990aa89c4b55e606d0f58...
Detection ratio: 49 / 71
Analysis date: 2019-01-18 12:27:37 UTC ( 1 month ago ) View latest
Antivirus Result Update
Acronis suspicious 20190117
Ad-Aware Trojan.Agent.DNQQ 20190118
AhnLab-V3 Trojan/Win32.Emotet.R252036 20190118
ALYac Trojan.Agent.DNQQ 20190118
Arcabit Trojan.Agent.DNQQ 20190118
Avast Win32:BankerX-gen [Trj] 20190118
AVG Win32:BankerX-gen [Trj] 20190118
Avira (no cloud) TR/AD.Emotet.tcybs 20190117
BitDefender Trojan.Agent.DNQQ 20190118
Bkav HW32.Packed. 20190118
CAT-QuickHeal Trojan.Emotet 20190118
ClamAV Win.Malware.Emotet-6818669-0 20190118
Comodo Malware@#zpm2i4nyfvn 20190118
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cylance Unsafe 20190118
Cyren W32/Trojan.XBHU-9325 20190118
DrWeb Trojan.EmotetENT.348 20190118
Emsisoft Trojan.Emotet (A) 20190118
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GORG 20190118
F-Secure Trojan.Agent.DNQQ 20190118
Fortinet W32/GenKryptik.CWQS!tr 20190118
GData Trojan.Agent.DNQQ 20190118
Ikarus Trojan-Banker.Emotet 20190118
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.foc 20190118
K7AntiVirus Trojan ( 00545bf91 ) 20190118
K7GW Trojan ( 00545bf91 ) 20190118
Kaspersky Trojan-Banker.Win32.Emotet.bzwa 20190118
Malwarebytes Trojan.Emotet 20190118
MAX malware (ai score=100) 20190118
McAfee RDN/Generic.dx 20190118
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20190117
Microsoft Trojan:Win32/Emotet.M 20190118
eScan Trojan.Agent.DNQQ 20190118
NANO-Antivirus Trojan.Win32.EmotetENT.fmbwsa 20190118
Palo Alto Networks (Known Signatures) generic.ml 20190118
Panda Trj/RnkBend.A 20190117
Qihoo-360 HEUR/QVM20.1.9659.Malware.Gen 20190118
Rising Trojan.Emotet!8.B95 (CLOUD) 20190118
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/EncPk-AOI 20190118
Symantec Trojan.Emotet 20190117
Trapmine malicious.high.ml.score 20190102
TrendMicro TrojanSpy.Win32.EMOTET.THOAAGAI 20190118
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THOAAGAI 20190118
VBA32 SScope.Malware-Cryptor.Emotet 20190118
Webroot W32.Trojan.Emotet 20190118
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bzwa 20190118
AegisLab 20190118
Alibaba 20180921
Antiy-AVL 20190118
Avast-Mobile 20190117
AVware 20180925
Babable 20180917
Baidu 20190117
CMC 20190118
Cybereason 20190109
eGambit 20190118
F-Prot 20190118
Kingsoft 20190118
SUPERAntiSpyware 20190116
TACHYON 20190117
Tencent 20190118
TheHacker 20190114
TotalDefense 20190117
Trustlook 20190118
ViRobot 20190118
Yandex 20190117
Zillya 20190118
Zoner 20190118
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2003-01-09 08:13:11
Entry Point 0x00002432
Number of sections 7
PE sections
PE imports
IsValidAcl
SetUserFileEncryptionKey
GetFileTime
GetSystemDefaultLangID
EnumSystemLocalesA
Heap32ListFirst
OpenThread
GetConsoleCP
GetCommandLineW
GetNumberOfConsoleInputEvents
CloseHandle
GetMailslotInfo
PathGetCharTypeA
UpdateLayeredWindowIndirect
GetMessagePos
GetRegisteredRawInputDevices
GetKeyboardLayout
GetCapture
ShowOwnedPopups
CreateCaret
GetCursor
SetClassWord
RegisterClipboardFormatW
SCardGetStatusChangeW
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
TURKISH DEFAULT 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
102400

LinkerVersion
4.0

ImageVersion
5.0

FileVersionNumber
10.0.4.33

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

InitializedDataSize
4096

EntryPoint
0x2432

MIMEType
application/octet-stream

TimeStamp
2003:01:09 09:13:11+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
6.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
12288

FileSubtype
0

ProductVersionNumber
10.0.4.33

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 5df725abd020cbf0e8d12cc9118a63c2
SHA1 46427111217f5aeffdb72db2121fad89dea3709b
SHA256 5afe22ee02ddaf11bae6337b0f6ab1cfc8990aa89c4b55e606d0f58e65bec94d
ssdeep
1536:5c56o4by2Cw7mdxvJ7r3CEdLkm9RfuIgMi+6oOZAl1RkfZNcT3idePMCcG:0V4z1mdlA6TTffH7WAWRNcTidKncG

authentihash cec2646cd1b4e9af8dffd38cbc1e3c59d558ed7d45a3299272a74fa0c2d9d50d
imphash f1c2f48930f89598d5c3c33b837bf25d
File size 140.0 KB ( 143360 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-16 11:00:32 UTC ( 1 month ago )
Last submission 2019-01-17 06:14:49 UTC ( 1 month ago )
File names emotet_e2_5afe22ee02ddaf11bae6337b0f6ab1cfc8990aa89c4b55e606d0f58e65bec94d_2019-01-16__111002.exe_
A74043B6.exe
pK5uXbkx34CBqKvKb.exe
rippleslide.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!