× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 70fd7eb41a4c8299db3d589e9ae3e3f13b0beb9d0a3aa7d4a256ef6020bb1640
File name: emotet_e2_70fd7eb41a4c8299db3d589e9ae3e3f13b0beb9d0a3aa7d4a256ef6...
Detection ratio: 22 / 70
Analysis date: 2019-02-14 07:38:36 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190213
AhnLab-V3 Trojan/Win32.Fuerboos.R255335 20190214
Avast Win32:BankerX-gen [Trj] 20190214
AVG Win32:BankerX-gen [Trj] 20190214
Bkav HW32.Packed. 20190213
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cylance Unsafe 20190214
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GPRR 20190214
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190214
McAfee Emotet-FLY!B869FE07B8A8 20190214
McAfee-GW-Edition BehavesLike.Win32.Fujacks.cc 20190214
Microsoft Trojan:Win32/Emotet.AC!bit 20190214
Palo Alto Networks (Known Signatures) generic.ml 20190214
Qihoo-360 HEUR/QVM20.1.36B3.Malware.Gen 20190214
Rising Trojan.Kryptik!8.8/N3#91% (RDM+:cmRtazr2C5v1+BKXaO4yEu56zs6G) 20190214
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ML.Attribute.HighConfidence 20190214
Trapmine malicious.moderate.ml.score 20190123
Webroot W32.Trojan.Emotet 20190214
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190214
Ad-Aware 20190214
AegisLab 20190214
Alibaba 20180921
ALYac 20190214
Antiy-AVL 20190214
Arcabit 20190213
Avast-Mobile 20190213
Avira (no cloud) 20190214
Babable 20180918
Baidu 20190202
BitDefender 20190214
CAT-QuickHeal 20190213
ClamAV 20190213
CMC 20190213
Comodo 20190214
Cybereason 20190109
Cyren 20190214
DrWeb 20190214
eGambit 20190214
Emsisoft 20190214
F-Prot 20190214
F-Secure 20190214
Fortinet 20190214
GData 20190214
Ikarus 20190213
Jiangmin 20190214
K7AntiVirus 20190214
K7GW 20190214
Kingsoft 20190214
Malwarebytes 20190214
MAX 20190214
eScan 20190214
NANO-Antivirus 20190213
Panda 20190213
Sophos AV 20190214
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190207
TACHYON 20190214
Tencent 20190214
TheHacker 20190212
TotalDefense 20190214
TrendMicro 20190214
TrendMicro-HouseCall 20190214
Trustlook 20190214
VBA32 20190213
ViRobot 20190214
Yandex 20190213
Zillya 20190213
Zoner 20190214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) Microsoft Corporation. 1981-2000

Product Microsoft Message Queue
Original name MQDSCLI.DLL
File version 5.01.1108
Description Windows NT MQ Client Directory Service
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-13 20:26:08
Entry Point 0x00002BD0
Number of sections 5
PE sections
PE imports
SetSecurityDescriptorDacl
SetServiceBits
QueryServiceObjectSecurity
IsTokenRestricted
CloseEventLog
CreateEnhMetaFileW
EnumFontsW
GetTextCharacterExtra
RemoveFontMemResourceEx
GetThreadPriorityBoost
SwitchToThread
LockFileEx
GetTimeZoneInformation
AllocateUserPhysicalPages
GetVersion
GetLargePageMinimum
FindFirstFileExA
GetCommandLineW
MulDiv
GetTempFileNameA
GetProcessVersion
CopyFileExW
GetCurrentThreadId
CloseHandle
VarCyFromR4
VARIANT_UserMarshal
SystemTimeToVariantTime
RpcBindingFromStringBindingW
CM_Get_Device_IDW
IsCharSpaceA
PathCombineA
SHRegGetValueW
AcquireCredentialsHandleA
RemoveClipboardFormatListener
GetInputState
GetCapture
GetRawInputDeviceList
GetGuiResources
VkKeyScanW
MessageBeep
SCardSetCardTypeProviderNameA
PdhBindInputDataSourceW
IsAsyncMoniker
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
TSWANA DEFAULT 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
1995:11:13 21:26:08+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
20480

LinkerVersion
5.0

ImageFileCharacteristics
Executable, 32-bit

FileTypeExtension
exe

InitializedDataSize
0

SubsystemVersion
6.1

EntryPoint
0x2bd0

OSVersion
6.0

ImageVersion
6.0

UninitializedDataSize
106496

File identification
MD5 b869fe07b8a8a6759a67571fab5575da
SHA1 950ff16f2cd511e2b734cc2fd8cf2d06bb2debbd
SHA256 70fd7eb41a4c8299db3d589e9ae3e3f13b0beb9d0a3aa7d4a256ef6020bb1640
ssdeep
3072:X4EPM1n+GSt54/BnQYzu5oo6RNn/2s1c+CFNoKfrvff:Xa3Sb4dlzu5oJRUsm+ciKfrvf

authentihash 302d6b92acd59b58ff6dfea18659cad7d0dfc558a59b3e8b267585081bd64d39
imphash d04dc42030b6c54c96ea9fffd0ff7c89
File size 136.0 KB ( 139264 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-14 03:06:11 UTC ( 1 month, 1 week ago )
Last submission 2019-02-15 10:13:12 UTC ( 1 month, 1 week ago )
File names iJoj0mTwy5HjAaE_Qn.exe
qDU7WR4P4qdU.exe
881.exe
pwq1CSWXPhLn_c.exe
70fd7eb41a4c8299db3d589e9ae3e3f13b0beb9d0a3aa7d4a256ef6020bb1640.exe
559.exe
581.exe
403.exe
B837dR.exe
MQDSCLI.DLL
AsEbrIL_O.exe
7WBY3.exe
emotet_e2_70fd7eb41a4c8299db3d589e9ae3e3f13b0beb9d0a3aa7d4a256ef6020bb1640_2019-02-14__031002.exe_
DwlJY2cG5284EUwq.exe
NbempPJrQNWtiV.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!