× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 69f4a3fce910bb93cdbbf653e296cca18b3e6a26bb00f1d346c3d6a61b51be4c
File name: 69f4a3fce910bb93cdbbf653e296cca18b3e6a26bb00f1d346c3d6a61b51be4c
Detection ratio: 34 / 71
Analysis date: 2018-12-16 08:43:31 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis malware 20180726
Avast Win32:MalwareX-gen [Trj] 20181216
AVG Win32:MalwareX-gen [Trj] 20181216
Avira (no cloud) TR/AD.Emotet.gshwy 20181216
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.a0d4ff 20180225
Cylance Unsafe 20181216
eGambit Unsafe.AI_Score_99% 20181216
Emsisoft Gen:Variant.Razy.437371 (B) 20181216
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNVA 20181216
Fortinet W32/Kryptik.GNVA!tr 20181216
GData Win32.Trojan-Spy.Emotet.UO 20181216
Ikarus Trojan.Emotet 20181216
Sophos ML heuristic 20181128
K7AntiVirus Spyware ( 005068aa1 ) 20181215
K7GW Spyware ( 005068aa1 ) 20181215
Kaspersky Trojan-Banker.Win32.Emotet.bvfl 20181216
Malwarebytes Trojan.Emotet 20181216
McAfee RDN/Generic.hra 20181216
McAfee-GW-Edition BehavesLike.Win32.Generic.cc 20181215
Microsoft Trojan:Win32/Emotet.AC!bit 20181215
Palo Alto Networks (Known Signatures) generic.ml 20181216
Rising Trojan.Fuerboos!8.EFC8 (TFE:dGZlOgJHFPKNzEd+lQ) 20181216
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANX 20181216
Symantec Trojan.Emotet 20181215
Trapmine malicious.high.ml.score 20181205
TrendMicro TROJ_GEN.USLE18 20181216
TrendMicro-HouseCall TROJ_GEN.USLE18 20181216
VBA32 BScope.Trojan.Refinka 20181214
ViRobot Trojan.Win32.Z.Fuerboos.155648.B 20181215
Webroot W32.Trojan.Emotet 20181216
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bvfl 20181216
Ad-Aware 20181216
AegisLab 20181214
AhnLab-V3 20181216
Alibaba 20180921
ALYac 20181216
Antiy-AVL 20181216
Arcabit 20181216
Avast-Mobile 20181215
AVware 20180925
Babable 20180918
Baidu 20181207
BitDefender 20181216
Bkav 20181214
CAT-QuickHeal 20181215
ClamAV 20181216
CMC 20181216
Comodo 20181216
Cyren 20181216
DrWeb 20181216
F-Prot 20181216
F-Secure 20181216
Jiangmin 20181216
Kingsoft 20181216
MAX 20181216
eScan 20181216
NANO-Antivirus 20181216
Panda 20181215
Qihoo-360 20181216
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181215
TACHYON 20181214
Tencent 20181216
TheHacker 20181213
Trustlook 20181216
VIPRE 20181216
Yandex 20181214
Zillya 20181215
Zoner 20181216
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-14 23:52:57
Entry Point 0x00006830
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
GetWindowsAccountDomainSid
EnumServicesStatusW
SetSecurityAccessMask
EqualPrefixSid
GetOpenFileNameA
GetFileTitleW
GetBrushOrgEx
GetTextCharsetInfo
GetColorAdjustment
GdiSetBatchLimit
ExcludeClipRect
GetTextExtentPointA
GetRgnBox
GetTextColor
GetSystemPaletteUse
GetCharWidthA
GetCharWidth32A
LineDDA
GetTextExtentPointW
GetNamedPipeClientProcessId
DefineDosDeviceW
GetShortPathNameW
GetOverlappedResult
GetEnvironmentStringsW
GetThreadLocale
VirtualProtect
lstrcmpiW
LoadLibraryA
GetPriorityClass
GetEnvironmentStrings
GetLocaleInfoA
GetCompressedFileSizeW
GetVolumeInformationW
EnumTimeFormatsA
FindVolumeMountPointClose
GetConsoleScreenBufferInfo
DeleteTimerQueue
GetTempFileNameW
EnumResourceTypesA
FlushProcessWriteBuffers
GlobalAddAtomA
lstrcpyA
IsProcessorFeaturePresent
lstrcpynA
lstrcmpW
GetModuleHandleW
FreeResource
GlobalMemoryStatus
GetLongPathNameW
LoadResource
GetTempPathW
VirtualQueryEx
FormatMessageA
GetCurrentThreadId
FindResourceA
FindFirstVolumeW
ExtractAssociatedIconA
ExtractIconW
ExtractAssociatedIconW
GetUserNameExW
GetComputerObjectNameW
GetPriorityClipboardFormat
GetWindowTextLengthA
GetOpenClipboardWindow
LoadAcceleratorsW
GetMenu
GetWindowRgn
GetMenuItemCount
DrawIcon
LockWorkStation
GetDlgItemTextA
GetKeyboardLayoutNameW
EnumWindowStationsA
GetDlgItem
DefMDIChildProcW
GetClipboardOwner
GetWindowLongW
IsWindow
GetCaretPos
GetThreadDesktop
GetMenuItemID
GetKeyNameTextW
GetPrinterDataExW
Ord(29)
strspn
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:15 00:52:57+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
40960

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x6830

InitializedDataSize
114688

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
1

File identification
MD5 b4d7c5e5a05714226fa5b6ab203e0c61
SHA1 d528336a0d4ffe1c14551b7dd2dc179b2c2814a3
SHA256 69f4a3fce910bb93cdbbf653e296cca18b3e6a26bb00f1d346c3d6a61b51be4c
ssdeep
3072:CGwSHM345KxEzsyPxB3jZJG4UDd5iW1SsB/6a/Jgg:CnM86KxEx/CDd5xSu6a/Jgg

authentihash 8e1b1811ecf84a9b4f104f791f8ddef4d81ea76488f34530cf6b22b524ae0973
imphash 57df7d162523ec18673acc396c907fbb
File size 152.0 KB ( 155648 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-14 16:04:58 UTC ( 2 months, 1 week ago )
Last submission 2019-01-22 04:27:47 UTC ( 4 weeks ago )
File names 36.exe
6h61WpcxYv.exe
385.exe.10.dr
9xbPN5Ai6.exe
147.exe
b4d7c5e5a05714226fa5b6ab203e0c61
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!