× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 763361d0e4b42d891480c08b3500c05dca42255b9756793e34c5cf7f83fe0fce
File name: emotet_e2_763361d0e4b42d891480c08b3500c05dca42255b9756793e34c5cf7...
Detection ratio: 47 / 71
Analysis date: 2019-02-12 11:24:38 UTC ( 3 months, 1 week ago )
Antivirus Result Update
Acronis suspicious 20190208
Ad-Aware Gen:Variant.Razy.460980 20190212
AhnLab-V3 Malware/Gen.Generic.C3001840 20190212
ALYac Gen:Variant.Razy.460980 20190212
Arcabit Trojan.Razy.D708B4 20190211
Avast Win32:MalwareX-gen [Trj] 20190212
AVG Win32:MalwareX-gen [Trj] 20190212
BitDefender Gen:Variant.Razy.460980 20190212
CAT-QuickHeal Trojan.Emotet 20190212
Comodo Malware@#qnpni5fqtylb 20190212
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.410b52 20190109
Cylance Unsafe 20190212
Cyren W32/Trojan.SGGO-7788 20190212
DrWeb Trojan.EmotetENT.380 20190212
Emsisoft Trojan.Emotet (A) 20190212
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Injector.DZBB 20190212
F-Prot W32/Emotet.OE.gen!Eldorado 20190212
Fortinet W32/Emotet.DZBB!tr 20190212
GData Gen:Variant.Razy.460980 20190212
Ikarus Trojan-Banker.Emotet 20190212
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005473a41 ) 20190212
K7GW Trojan ( 005473a41 ) 20190212
Kaspersky Trojan-Banker.Win32.Emotet.cejt 20190212
Malwarebytes Trojan.Emotet 20190212
MAX malware (ai score=100) 20190212
McAfee Emotet-FLY!CF40CE7EEB1E 20190212
McAfee-GW-Edition BehavesLike.Win32.Upatre.ch 20190212
Microsoft Trojan:Win32/Emotet.AC!bit 20190212
eScan Gen:Variant.Razy.460980 20190212
NANO-Antivirus Trojan.Win32.EmotetENT.fmtzlb 20190212
Palo Alto Networks (Known Signatures) generic.ml 20190212
Panda Trj/Genetic.gen 20190211
Qihoo-360 Win32/Trojan.d09 20190212
Rising Trojan.Kryptik!8.8 (CLOUD) 20190212
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Emotet-Q 20190212
Symantec Trojan.Emotet 20190212
Tencent Win32.Trojan-banker.Emotet.Taom 20190212
Trapmine malicious.moderate.ml.score 20190123
TrendMicro TROJ_GEN.R011C0DB819 20190212
TrendMicro-HouseCall TROJ_GEN.R011C0DB819 20190212
VBA32 TScope.Malware-Cryptor.SB 20190212
Webroot W32.Trojan.Emotet 20190212
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cejt 20190212
AegisLab 20190212
Alibaba 20180921
Antiy-AVL 20190212
Avast-Mobile 20190212
Avira (no cloud) 20190212
Babable 20180918
Baidu 20190202
Bkav 20190201
ClamAV 20190212
CMC 20190212
eGambit 20190212
F-Secure 20190212
Jiangmin 20190212
Kingsoft 20190212
SUPERAntiSpyware 20190206
Symantec Mobile Insight 20190207
TACHYON 20190212
TheHacker 20190203
TotalDefense 20190212
Trustlook 20190212
VIPRE 20190211
ViRobot 20190212
Yandex 20190212
Zillya 20190211
Zoner 20190212
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserv

Product Microsoft® Windows® Operating S
Internal name kbdgeoqw (3
File version 6.1.7600.16385 (win7_rtm.090713-
Description Georgian (QWERTY) Keyboa
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-07 17:22:01
Entry Point 0x00002231
Number of sections 5
PE sections
PE imports
EnumServicesStatusA
IsTokenRestricted
HeapCompact
SetCurrentConsoleFontEx
GetFileType
GetCPInfo
GetProcessShutdownParameters
UnhandledExceptionFilter
WaitForSingleObject
GetCommandLineW
SetConsoleScreenBufferInfoEx
IsDebuggerPresent
MultiByteToWideChar
CloseHandle
GetCurrentThreadId
GetCommConfig
GetThreadLocale
IsPwrHibernateAllowed
GetClipboardViewer
GetForegroundWindow
GetMenuInfo
GetTabbedTextExtentA
VkKeyScanA
IsZoomed
GetMenuState
GetShellWindow
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
102400

LinkerVersion
13.0

ImageVersion
6.0

FileSubtype
2

FileVersionNumber
5.1.2600.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Georgian (QWERTY) Keyboa

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x2231

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserv

FileVersion
6.1.7600.16385 (win7_rtm.090713-

TimeStamp
2019:02:07 18:22:01+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
kbdgeoqw (3

ProductVersion
6.1.7600.

SubsystemVersion
6.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
12288

ProductName
Microsoft Windows Operating S

ProductVersionNumber
5.1.2600.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Execution parents
File identification
MD5 cf40ce7eeb1ebcf6d854049324ee810d
SHA1 b787270410b52eeb190ba78fddd07117fbe80a1c
SHA256 763361d0e4b42d891480c08b3500c05dca42255b9756793e34c5cf7f83fe0fce
ssdeep
3072:YnHMUTqRAYInPowIo2wuC9+Qecrn3LrCr5RmaeBZ:ksNRAYUo1on7YCLrCr5R

authentihash 2ef763cba85983108da428f1d8642a879a9506f0fc037938f7d486136d8a934b
imphash e3406f5cc60e6f47c1732385fbfa3d4f
File size 160.0 KB ( 163840 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-07 09:25:49 UTC ( 3 months, 1 week ago )
Last submission 2019-02-07 15:40:41 UTC ( 3 months, 1 week ago )
File names fLtV4MYB11zhqlbTf.exe
kbdgeoqw (3
emotet_e2_763361d0e4b42d891480c08b3500c05dca42255b9756793e34c5cf7f83fe0fce_2019-02-07__093002.exe_
601.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!