× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6504992aaa318be60ce362b05ec7938a020936f850edf9ea6b1b06cce7ea1a23
File name: emotet_e1_6504992aaa318be60ce362b05ec7938a020936f850edf9ea6b1b06c...
Detection ratio: 44 / 70
Analysis date: 2019-02-14 14:39:24 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190213
Ad-Aware Trojan.GenericKD.31687956 20190214
AhnLab-V3 Trojan/Win32.Emotet.R255078 20190214
ALYac Trojan.Agent.Emotet 20190214
Arcabit Trojan.Generic.D1E38514 20190213
Avast Win32:BankerX-gen [Trj] 20190214
AVG Win32:BankerX-gen [Trj] 20190214
Avira (no cloud) TR/Emotet.arz 20190214
BitDefender Trojan.GenericKD.31687956 20190214
Bkav HW32.Packed. 20190214
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cylance Unsafe 20190214
Cyren W32/Emotet.OK.gen!Eldorado 20190214
DrWeb Trojan.EmotetENT.384 20190214
Emsisoft Trojan.Emotet (A) 20190214
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CZDH 20190214
F-Prot W32/Emotet.OK.gen!Eldorado 20190214
Fortinet W32/GenKryptik.CZDH!tr 20190214
GData Trojan.GenericKD.31687956 20190214
Ikarus Trojan-Banker.Emotet 20190214
K7AntiVirus Trojan ( 0054789c1 ) 20190214
K7GW Trojan ( 0054789c1 ) 20190214
Kaspersky Trojan-Banker.Win32.Emotet.cfma 20190214
Malwarebytes Trojan.Emotet 20190214
MAX malware (ai score=86) 20190214
McAfee Emotet-FLY!DDE4DBA17488 20190214
McAfee-GW-Edition BehavesLike.Win32.Emotet.dh 20190214
Microsoft Trojan:Win32/Emotet.ED 20190214
eScan Trojan.GenericKD.31687956 20190214
Palo Alto Networks (Known Signatures) generic.ml 20190214
Panda Trj/GdSda.A 20190214
Qihoo-360 Win32/Trojan.62f 20190214
Rising Trojan.Emotet!8.B95 (TFE:3:6BRKV79s8mK) 20190214
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Emotet-Q 20190214
Symantec Trojan.Emotet 20190214
Tencent Win32.Trojan-banker.Emotet.Wwoa 20190214
Trapmine malicious.high.ml.score 20190123
TrendMicro TROJ_GEN.R057C0OBD19 20190214
TrendMicro-HouseCall TROJ_GEN.R057C0OBD19 20190214
VBA32 BScope.Trojan.Emotet 20190214
Webroot W32.Trojan.Emotet 20190214
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cfma 20190214
AegisLab 20190214
Alibaba 20180921
Antiy-AVL 20190214
Avast-Mobile 20190214
Babable 20180918
Baidu 20190202
CAT-QuickHeal 20190214
ClamAV 20190214
CMC 20190214
Comodo 20190214
Cybereason 20190109
eGambit 20190214
F-Secure 20190214
Sophos ML 20181128
Jiangmin 20190214
Kingsoft 20190214
NANO-Antivirus 20190214
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190207
TACHYON 20190214
TheHacker 20190212
TotalDefense 20190214
Trustlook 20190214
ViRobot 20190214
Yandex 20190213
Zillya 20190213
Zoner 20190214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright© Microsoft Corporation 1998-1999. All rights reserved.

Product Microsoft Office 2000
Original name MSOWCI.DLL
Internal name Microsoft Office Web Components
File version 9.0.0.2710
Description Microsoft Office 2000 Web Components
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-12 05:21:42
Entry Point 0x00002390
Number of sections 5
PE sections
PE imports
IsTokenRestricted
GetClipBox
HeapCompact
GetLargePageMinimum
GetCurrentProcessId
GetTimeZoneInformation
ZombifyActCtx
WaitForSingleObject
GetCommandLineW
UnregisterApplicationRestart
TlsGetValue
CloseHandle
UnlockFileEx
GetVersion
GetSystemPowerStatus
Thread32First
ExtractIconA
DrawTextA
GetTopWindow
EnableScrollBar
GetFocus
SetMenuContextHelpId
GetKeyboardType
GetFileVersionInfoSizeA
GetColorDirectoryW
Number of PE resources by type
RT_STRING 60
RT_MENU 11
RT_DIALOG 9
GIF 3
RT_BITMAP 3
RT_VERSION 1
Number of PE resources by language
ENGLISH US 87
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
6.1

MachineType
Intel 386 or later, and compatibles

TimeStamp
2019:02:12 06:21:42+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
15.0

FileTypeExtension
exe

InitializedDataSize
0

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0x2390

OSVersion
6.0

ImageVersion
6.0

UninitializedDataSize
102400

File identification
MD5 dde4dba174883973b534b2b5b9835885
SHA1 a807ec5f865574eeec2126533aa46a7dc7577576
SHA256 6504992aaa318be60ce362b05ec7938a020936f850edf9ea6b1b06cce7ea1a23
ssdeep
3072:nvghUPOWPqwynRmG2mXSBvqcyDmXHRblid5ndywQDrF952Oop+/zEmwS:vPqwyR52yCvuQkNdg7Pj

authentihash 9f6e37e486918045205133ffc3ed06a0e2e3972f9cef3d5d3508ee508c8b158d
imphash 9acfa4bdcfb58f40b7bd3074b50960e2
File size 212.0 KB ( 217088 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-12 05:29:28 UTC ( 2 months, 1 week ago )
Last submission 2019-02-12 15:30:44 UTC ( 2 months, 1 week ago )
File names Microsoft Office Web Components
MSOWCI.DLL
emotet_e1_6504992aaa318be60ce362b05ec7938a020936f850edf9ea6b1b06cce7ea1a23_2019-02-12__053002.exe_
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!