× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 86bd246db431fead70b8363b42d399d62624e6162532768104c96a59c0cfa30d
File name: emotet_e2_86bd246db431fead70b8363b42d399d62624e6162532768104c96a5...
Detection ratio: 47 / 68
Analysis date: 2019-03-28 20:09:40 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190327
Ad-Aware Trojan.GenericKDZ.54849 20190328
AhnLab-V3 Trojan/Win32.Emotet.R260381 20190328
Arcabit Trojan.Generic.DD641 20190328
Avast Win32:DangerousSig [Trj] 20190328
AVG Win32:DangerousSig [Trj] 20190328
Avira (no cloud) TR/Crypt.Agent.isqtb 20190328
BitDefender Trojan.GenericKDZ.54849 20190328
ClamAV Win.Malware.Emotet-6911268-0 20190328
Comodo TrojWare.Win32.Emotet.RDF@835x12 20190328
CrowdStrike Falcon (ML) win/malicious_confidence_90% (W) 20190212
Cybereason malicious.290785 20190327
Cylance Unsafe 20190328
Cyren W32/Emotet.RQ.gen!Eldorado 20190328
DrWeb Trojan.Siggen8.20944 20190328
eGambit Unsafe.AI_Score_55% 20190328
Emsisoft Trojan.GenericKDZ.54849 (B) 20190328
Endgame malicious (high confidence) 20190322
ESET-NOD32 a variant of Win32/Kryptik.GRFS 20190328
F-Prot W32/Emotet.RQ.gen!Eldorado 20190328
F-Secure Trojan.TR/Crypt.Agent.isqtb 20190328
FireEye Generic.mg.01cea084d853b1b2 20190328
Fortinet W32/Kryptik.CBF!tr 20190328
GData Trojan.GenericKDZ.54849 20190328
Ikarus Trojan-Banker.Emotet 20190328
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 0054a7ad1 ) 20190328
K7GW Trojan ( 0054a7ad1 ) 20190328
Kaspersky Trojan-Banker.Win32.Emotet.csxn 20190328
Malwarebytes Trojan.Emotet 20190328
McAfee Emotet-FMI!01CEA084D853 20190328
McAfee-GW-Edition Emotet-FMI!01CEA084D853 20190328
Microsoft Trojan:Win32/Emotet!rfn 20190328
eScan Trojan.GenericKDZ.54849 20190328
NANO-Antivirus Trojan.Win32.Emotet.fomvmx 20190328
Palo Alto Networks (Known Signatures) generic.ml 20190328
Panda Trj/GdSda.A 20190328
Qihoo-360 Win32/Trojan.fc1 20190328
Rising Trojan.Kryptik!8.8 (CLOUD) 20190328
SentinelOne (Static ML) DFI - Malicious PE 20190317
Sophos AV Mal/Emotet-Q 20190328
Symantec Packed.Generic.459 20190328
Tencent Win32.Trojan.Falsesign.Eyo 20190328
Trapmine malicious.high.ml.score 20190325
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMA 20190328
VBA32 BScope.Malware-Cryptor.Emotet 20190328
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.csxn 20190328
AegisLab 20190328
Alibaba 20190306
Antiy-AVL 20190328
Avast-Mobile 20190328
Babable 20180918
Baidu 20190318
Bkav 20190328
CAT-QuickHeal 20190328
CMC 20190321
Jiangmin 20190328
Kingsoft 20190328
MAX 20190328
SUPERAntiSpyware 20190328
Symantec Mobile Insight 20190325
TACHYON 20190328
TheHacker 20190327
TotalDefense 20190327
Trustlook 20190328
ViRobot 20190328
Yandex 20190328
Zillya 20190328
Zoner 20190328
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
C)Advanced PDF Converter, All Rights Reserved

File version Version 5.0
Description TODO: <File description>
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 3:29 AM 4/24/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-26 23:27:18
Entry Point 0x0001DCE0
Number of sections 4
PE sections
Overlays
MD5 98d8ed9a15ad20592d57da79afed3751
File type data
Offset 235520
Size 3336
Entropy 7.34
PE imports
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
SetEvent
HeapDestroy
SetFileTime
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
EnumResourceLanguagesW
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
GetTempPathW
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
FormatMessageW
ResumeThread
GetTimeZoneInformation
LoadResource
GetStringTypeExW
FindClose
InterlockedDecrement
MoveFileW
GetFullPathNameW
WritePrivateProfileStringW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InitializeCriticalSection
GlobalFindAtomW
OutputDebugStringW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
lstrcmpiW
EnumSystemLocalesA
SetConsoleCtrlHandler
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
FatalAppExitA
SetFilePointerEx
GetPrivateProfileStringW
SetFilePointer
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
GetSystemDirectoryW
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
UnlockFile
ExitThread
SetEnvironmentVariableA
FindAtomW
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
OpenThread
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
LoadLibraryA
RtlUnwind
GlobalSize
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryW
GetFileSize
LCMapStringW
OpenProcess
GetStartupInfoW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
AddAtomW
GetProcessHeap
GetComputerNameW
WriteFile
GetFileSizeEx
WTSGetActiveConsoleSessionId
GetTimeFormatA
FindFirstFileW
IsValidLocale
DuplicateHandle
GetProcAddress
CreateEventW
CreateFileW
GetFileType
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
GlobalDeleteAtom
GetShortPathNameW
VirtualAllocEx
GetConsoleCP
LCMapStringA
GetProcessTimes
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
Process32NextW
VirtualFree
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
ProcessIdToSessionId
GetCommandLineW
HeapSize
SetStdHandle
InterlockedCompareExchange
Process32FirstW
GetCurrentThread
SuspendThread
RaiseException
GetModuleHandleA
ReadFile
GlobalFlags
DeleteAtom
CloseHandle
OpenMutexW
GetACP
GlobalLock
GetModuleHandleW
FreeResource
GetFileAttributesExW
FindResourceExW
GetLongPathNameW
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
TerminateProcess
VirtualAlloc
CompareStringA
SetFocus
GetForegroundWindow
SetMenuItemBitmaps
DrawTextW
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
GrayStringW
EndPaint
ScrollWindowEx
SetDlgItemInt
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
UnregisterClassW
GetClassInfoW
GetDlgItemTextW
SetScrollPos
CallNextHookEx
GetTopWindow
GetWindowTextW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
GetActiveWindow
GetMenuItemID
DestroyWindow
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
ShowScrollBar
CheckRadioButton
GetMessageW
ShowWindow
SetPropW
GetMenuState
PeekMessageW
EnableWindow
SetWindowPlacement
CharUpperW
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
GetDlgItemInt
GetMenuBarInfo
SetParent
RegisterClassW
ScrollWindow
GetWindowPlacement
LoadStringW
SetWindowLongW
WindowFromPoint
EnableMenuItem
TrackPopupMenuEx
GetSubMenu
GetScrollRange
GetDCEx
IsDialogMessageW
FillRect
CopyRect
GetSysColorBrush
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetMenuItemInfoW
IsChild
MapWindowPoints
RegisterWindowMessageW
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
KillTimer
MapVirtualKeyW
GetParent
LoadBitmapW
SendDlgItemMessageA
GetSystemMetrics
IsIconic
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
IntersectRect
SendDlgItemMessageW
PostMessageW
CheckDlgButton
CreatePopupMenu
CheckMenuItem
GetClassLongW
GetLastActivePopup
PtInRect
SetWindowTextW
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ClientToScreen
GetScrollInfo
TrackPopupMenu
GetMenuItemCount
IsDlgButtonChecked
GetDesktopWindow
SetWindowsHookExW
LoadCursorW
GetSystemMenu
ReuseDDElParam
DispatchMessageW
InsertMenuW
SetForegroundWindow
GetMenuStringW
DrawTextExW
EndDialog
ModifyMenuW
GetCapture
ScreenToClient
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
BeginDeferWindowPos
MessageBoxW
SendMessageW
SetMenu
MoveWindow
AppendMenuW
GetWindowDC
AdjustWindowRectEx
GetSysColor
SetDlgItemTextW
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
DestroyIcon
wsprintfW
IsWindowVisible
WinHelpW
UnpackDDElParam
SystemParametersInfoW
UnionRect
SetRect
GetKeyNameTextW
CallWindowProcW
GetClassNameW
GetClientRect
ValidateRect
IsRectEmpty
GetFocus
InsertMenuItemW
UnhookWindowsHookEx
RemovePropW
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 14
RT_DIALOG 12
RT_ICON 5
RT_BITMAP 4
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 60
CHINESE SIMPLIFIED 9
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
5.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
TODO: <File description>

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
115200

EntryPoint
0x1dce0

MIMEType
application/octet-stream

LegalCopyright
C)Advanced PDF Converter, All Rights Reserved

FileVersion
Version 5.0

TimeStamp
2019:03:27 00:27:18+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
5.0

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
TODO: <Company name>

CodeSize
119296

FileSubtype
0

ProductVersionNumber
5.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 01cea084d853b1b2a19b12b164a0cad0
SHA1 f8731852907855a57791524649109eaee892c5d3
SHA256 86bd246db431fead70b8363b42d399d62624e6162532768104c96a59c0cfa30d
ssdeep
6144:p43an6kYXD7Bu7AmMdAAicwT/t7i6jSaVRPbkZ9rVv:p4q6kY07AmefSBNLklv

authentihash 8471bb6a598b5c49f1fa9dab2a2420e907e6fb112c450ce74219506adf6a0906
imphash f8513790ee9a494c66c61bbd5a629513
File size 233.3 KB ( 238856 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-26 23:40:03 UTC ( 2 months ago )
Last submission 2019-04-15 19:51:28 UTC ( 1 month, 1 week ago )
File names w_BZH.exe
emotet_e2_86bd246db431fead70b8363b42d399d62624e6162532768104c96a59c0cfa30d_2019-03-26__233003.exe_
01cea084d853b1b2a19b12b164a0cad0.virobj
virussign.com_01cea084d853b1b2a19b12b164a0cad0.vir
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs