× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 721f2453791d6ae97dcda8bb30486f292222673d17e640087660911395644815
File name: codexgigas_e21228d10481814b19fda6be3ddc6a1d45e6a2f2
Detection ratio: 51 / 68
Analysis date: 2018-09-10 03:51:38 UTC ( 5 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.386877 20180910
AhnLab-V3 Trojan/Win32.Emotet.R236180 20180909
ALYac Gen:Variant.Razy.386877 20180910
Antiy-AVL Trojan[Banker]/Win32.Emotet 20180906
Arcabit Trojan.Razy.D5E73D 20180910
Avast Win32:Trojan-gen 20180910
AVG Win32:Trojan-gen 20180910
AVware Trojan.Win32.Generic!BT 20180910
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180906
BitDefender Gen:Variant.Razy.386877 20180910
ClamAV Win.Packed.Fuerboos-6672067-0 20180910
Comodo UnclassifiedMalware 20180910
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.104818 20180225
Cylance Unsafe 20180910
Cyren W32/Emotet.FY.gen!Eldorado 20180910
Emsisoft Gen:Variant.Razy.386877 (B) 20180910
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GKLM 20180909
F-Prot W32/Emotet.FY.gen!Eldorado 20180910
F-Secure Gen:Variant.Razy.386877 20180910
Fortinet W32/Kryptik.GKLI!tr 20180910
GData Win32.Trojan-Spy.Emotet.TB 20180910
Ikarus Trojan-Banker.Emotet 20180909
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 0053bbfb1 ) 20180910
K7GW Trojan ( 0053bbfb1 ) 20180909
Kaspersky Trojan-Banker.Win32.Emotet.bcia 20180910
Malwarebytes Trojan.Emotet 20180910
MAX malware (ai score=99) 20180910
McAfee RDN/Generic.grp 20180910
McAfee-GW-Edition BehavesLike.Win32.VTFlooder.ch 20180910
Microsoft Trojan:Win32/Emotet.AC!bit 20180910
eScan Gen:Variant.Razy.386877 20180910
NANO-Antivirus Trojan.Win32.Kryptik.fhijpa 20180909
Palo Alto Networks (Known Signatures) generic.ml 20180910
Panda Trj/GdSda.A 20180909
Qihoo-360 HEUR/QVM20.1.A4E5.Malware.Gen 20180910
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20180910
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Mal/EncPk-ANY 20180910
Symantec Trojan.Gen.2 20180909
Tencent Win32.Trojan-banker.Emotet.Gbq 20180910
TrendMicro TROJ_GEN.R03FC0DI518 20180910
TrendMicro-HouseCall TROJ_GEN.R03FC0DI518 20180910
VBA32 BScope.Trojan.Emotet 20180907
VIPRE Trojan.Win32.Generic!BT 20180910
ViRobot Trojan.Win32.Z.Emotet.161792.H 20180909
Webroot W32.Trojan.Gen 20180910
Yandex Trojan.PWS.Emotet! 20180908
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bcia 20180910
AegisLab 20180910
Alibaba 20180713
Avast-Mobile 20180910
Avira (no cloud) 20180909
Babable 20180907
Bkav 20180906
CAT-QuickHeal 20180909
CMC 20180910
DrWeb 20180910
eGambit 20180910
Jiangmin 20180910
Kingsoft 20180910
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180905
TACHYON 20180910
TheHacker 20180907
TotalDefense 20180909
Trustlook 20180910
Zillya 20180908
Zoner 20180909
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-03 22:30:19
Entry Point 0x00004521
Number of sections 4
PE sections
PE imports
SetServiceBits
RegDisablePredefinedCache
GetTextCharsetInfo
ScaleViewportExtEx
GetRasterizerCaps
GetDCPenColor
GetLogicalProcessorInformation
SetUserGeoID
GetBinaryTypeW
FindFirstChangeNotificationA
GetModuleHandleA
PostQueuedCompletionStatus
SetSystemFileCacheSize
GetTickCount
SetFileBandwidthReservation
GetBinaryTypeA
MprConfigInterfaceTransportRemove
NetGroupDel
DsReplicaGetInfo2W
RpcServerUseProtseqW
RpcServerUseProtseqExW
SHAppBarMessage
ChrCmpIA
UnionRect
DdeConnect
EndDialog
InternetSetOptionW
InternetGetCookieW
StartDocPrinterW
AddFormW
OpenPrinterW
CryptCATAdminAcquireContext
g_rgSCardT1Pci
fgets
isprint
vfprintf
CreateAsyncBindCtxEx
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:09:03 23:30:19+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
0

LinkerVersion
12.1

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x4521

InitializedDataSize
0

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 01f2e86e4eee144f14ad6b29af0722a6
SHA1 e21228d10481814b19fda6be3ddc6a1d45e6a2f2
SHA256 721f2453791d6ae97dcda8bb30486f292222673d17e640087660911395644815
ssdeep
3072:SP9HaaaaaaaaaaaaaaaKaaPAbwPvNIS6bWh7dZVKEumYXa2fYmjbKq:+8oZWmVKgYY

authentihash 2aa177983907aaf5a494e17223a1946fb2d92cfdd42450f16f0e9c0811185cbd
imphash 5fb7565e322cf1a712e78b249efd9b47
File size 158.0 KB ( 161792 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-04 02:26:20 UTC ( 5 months, 3 weeks ago )
Last submission 2018-11-05 20:18:34 UTC ( 3 months, 2 weeks ago )
File names codexgigas_e21228d10481814b19fda6be3ddc6a1d45e6a2f2
01f2e86e4eee144f14ad6b29af0722a6
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!