× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6cdfe05c8c1d55be1d935fa4a202aa0d1117e6081a6c2f74ac78d323b96216d7
File name: emotet_e1_6cdfe05c8c1d55be1d935fa4a202aa0d1117e6081a6c2f74ac78d32...
Detection ratio: 48 / 71
Analysis date: 2019-01-18 02:40:43 UTC ( 1 month ago ) View latest
Antivirus Result Update
Acronis suspicious 20190117
Ad-Aware Trojan.Autoruns.GenericKDS.31531171 20190118
AhnLab-V3 Trojan/Win32.Emotet.R251788 20190118
ALYac Trojan.Agent.Emotet 20190118
Antiy-AVL Trojan[Banker]/Win32.Emotet 20190118
Arcabit Trojan.Autoruns.GenericS.D1E120A3 20190118
Avast Win32:BankerX-gen [Trj] 20190118
AVG Win32:BankerX-gen [Trj] 20190118
Avira (no cloud) TR/AD.Emotet.bmjnj 20190117
BitDefender Trojan.Autoruns.GenericKDS.31531171 20190118
Comodo Malware@#17hwy2qfover2 20190118
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.c3884f 20190109
Cylance Unsafe 20190118
Cyren W32/Trojan.GBTC-7517 20190118
DrWeb Trojan.Siggen8.1091 20190118
eGambit Unsafe.AI_Score_99% 20190118
Emsisoft Trojan.Autoruns.GenericKDS.31531171 (B) 20190117
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOPT 20190117
F-Secure Trojan.Autoruns.GenericKDS.31531171 20190117
Fortinet W32/GenKryptik.CWMY!tr 20190117
GData Trojan.Autoruns.GenericKDS.31531171 20190117
Ikarus Trojan-Banker.Emotet 20190117
Sophos ML heuristic 20181128
K7GW Trojan ( 00545a141 ) 20190117
Kaspersky Trojan-Banker.Win32.Emotet.bzna 20190117
Malwarebytes Trojan.Emotet 20190117
McAfee RDN/Generic.dx 20190117
McAfee-GW-Edition BehavesLike.Win32.Generic.dh 20190117
Microsoft Trojan:Win32/Emotet.DE 20190117
eScan Trojan.Autoruns.GenericKDS.31531171 20190117
NANO-Antivirus Virus.Win32.Gen.ccmw 20190117
Palo Alto Networks (Known Signatures) generic.ml 20190118
Panda Trj/RnkBend.A 20190117
Qihoo-360 HEUR/QVM19.1.8D69.Malware.Gen 20190118
Rising Trojan.Emotet!8.B95 (CLOUD) 20190117
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/EncPk-AOI 20190117
Symantec Trojan.Gen.2 20190117
Tencent Win32.Trojan-banker.Emotet.Dzka 20190118
Trapmine malicious.moderate.ml.score 20190103
TrendMicro TrojanSpy.Win32.EMOTET.THOAAEAI 20190117
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THOAAEAI 20190118
VBA32 BScope.Trojan.Refinka 20190117
ViRobot Trojan.Win32.Z.Agent.211968.HS 20190117
Webroot W32.Trojan.Emotet 20190118
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bzna 20190118
AegisLab 20190118
Alibaba 20180921
Avast-Mobile 20190117
Babable 20180918
Baidu 20190117
Bkav 20190117
CAT-QuickHeal 20190117
ClamAV 20190117
CMC 20190117
F-Prot 20190117
Jiangmin 20190117
K7AntiVirus 20190117
Kingsoft 20190118
MAX 20190118
SUPERAntiSpyware 20190116
TACHYON 20190118
TheHacker 20190115
TotalDefense 20190117
Trustlook 20190118
VIPRE 20190118
Yandex 20190117
Zillya 20190117
Zoner 20190118
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-15 01:01:26
Entry Point 0x00002BC6
Number of sections 4
PE sections
PE imports
DeleteService
FindTextW
LineTo
GetWindowExtEx
GetOutlineTextMetricsA
GetPolyFillMode
GetRegionData
GetClipBox
ExtSelectClipRgn
GdiSetBatchLimit
GetObjectType
GlobalFindAtomW
lstrlenA
lstrcmpiA
FindNextFileA
DefineDosDeviceA
GetConsoleDisplayMode
GetCommMask
lstrlenW
GetPrivateProfileStructW
GetStartupInfoA
GetPriorityClass
GetConsoleMode
VirtualFreeEx
GetCurrentProcessId
GetConsoleCursorInfo
GetCompressedFileSizeW
GetLogicalDrives
FindActCtxSectionGuid
GetProcAddress
QueryIdleProcessorCycleTime
IsValidLanguageGroup
GetFileSizeEx
GetCommTimeouts
FindFirstFileA
FindFirstFileExA
FindNextVolumeMountPointW
GetSystemTimeAsFileTime
FindFirstFileW
GetDateFormatA
GetSystemDirectoryA
GetStringTypeW
GetModuleHandleW
EscapeCommFunction
GetMailslotInfo
GetDiskFreeSpaceExA
GlobalHandle
EnumSystemGeoID
GetSystemWindowsDirectoryW
GetCurrencyFormatW
FindExecutableW
InsertMenuA
GetCursor
GetClipboardViewer
MessageBoxW
GetRawInputDeviceInfoW
LoadIconA
GetMenuStringA
DrawIconEx
ExcludeUpdateRgn
CreateIconFromResource
LoadImageA
GetClassNameA
DestroyMenu
LookupIconIdFromDirectoryEx
DialogBoxParamA
LoadKeyboardLayoutA
GetSysColor
GetMenuBarInfo
InsertMenuItemA
GetFileVersionInfoA
FindNextPrinterChangeNotification
DeletePrinterDriverExW
shutdown
strncmp
localeconv
fseek
system
vfwprintf
fputwc
toupper
towupper
strcmp
GetRunningObjectTable
GetConvertStg
FaultInIEFeature
Number of PE resources by type
RT_STRING 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:01:14 17:01:26-08:00

FileType
Win32 EXE

PEType
PE32

CodeSize
20992

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x2bc6

InitializedDataSize
189952

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 17a01cdc3884fa637f0e79e07fbf3bfd
SHA1 48a38aa7b874c87a1d2ea98fee13021931a9043d
SHA256 6cdfe05c8c1d55be1d935fa4a202aa0d1117e6081a6c2f74ac78d323b96216d7
ssdeep
3072:sQEoIE6QPNeBIpikVNXTILJWHTzriulrpqzImfQmruYCZ:s0NIIE8jIoX+Crp/mf5W

authentihash b0f2c5d119966882b5036a4c28e9f53f7ec1869faa0b8fd7d705f5a5db50fe55
imphash df5b22f48d3ae72d13a2d95471d0915c
File size 207.0 KB ( 211968 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-15 01:07:32 UTC ( 1 month ago )
Last submission 2019-01-16 04:11:58 UTC ( 1 month ago )
File names VhfnSa1n1.exe
OT6hKKO0T.exe
MMaAWTNea.exe
92sebJFn.exe
Rc9zkj5k2.exe
emotet_e1_6cdfe05c8c1d55be1d935fa4a202aa0d1117e6081a6c2f74ac78d323b96216d7_2019-01-15__012613.exe_
AumtOIdV6k.exe
O4NDppxNxuw4.exe
3E8Yju10.exe
9zxoHKbXgyhX.exe
MOFqOh3P.exe
6amrEyy9O.exe
dz4mlYgF.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!