× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 86d9d667ba5d0880ada452dbac0b6dec35c30248398d14f984143ce7738e61fa
File name: L85mrPDxyUUNVe6gg.exe
Detection ratio: 43 / 68
Analysis date: 2018-06-22 15:22:34 UTC ( 7 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30999608 20180622
AegisLab Ml.Attribute.Gen!c 20180622
AhnLab-V3 Trojan/Win32.Emotet.R230293 20180622
ALYac Trojan.Agent.Emotet 20180622
Antiy-AVL Trojan/Win32.Dovs 20180622
Arcabit Trojan.Generic.D1D90438 20180622
Avast FileRepMalware 20180622
AVG FileRepMalware 20180622
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20180622
BitDefender Trojan.GenericKD.30999608 20180622
ClamAV Win.Trojan.Generic-6584512-1 20180622
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cylance Unsafe 20180622
Cyren W32/Emotet.CJ.gen!Eldorado 20180622
Emsisoft Trojan.Emotet (A) 20180622
Endgame malicious (high confidence) 20180612
ESET-NOD32 a variant of Win32/Kryptik.GHYU 20180622
F-Prot W32/Emotet.CJ.gen!Eldorado 20180622
F-Secure Trojan.GenericKD.30999608 20180622
Fortinet W32/Kryptik.FVEZ!tr 20180622
GData Win32.Trojan-Spy.Emotet.RP 20180622
Sophos ML heuristic 20180601
K7AntiVirus Riskware ( 0040eff71 ) 20180622
K7GW Riskware ( 0040eff71 ) 20180622
Kaspersky Trojan.Win32.Dovs.owj 20180622
Malwarebytes Trojan.Emotet 20180622
MAX malware (ai score=97) 20180622
McAfee Emotet-FGR!5E46D148EC68 20180622
McAfee-GW-Edition Emotet-FGR!5E46D148EC68 20180622
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180622
eScan Trojan.GenericKD.30999608 20180622
Palo Alto Networks (Known Signatures) generic.ml 20180622
Panda Trj/GdSda.A 20180622
Qihoo-360 HEUR/QVM20.1.F877.Malware.Gen 20180622
Sophos AV Mal/EncPk-ANR 20180622
Symantec Trojan.Emotet 20180622
TACHYON Trojan/W32.Agent.340992.HA 20180622
TrendMicro TROJ_GEN.R057C0CFM18 20180622
TrendMicro-HouseCall TROJ_GEN.R057C0CFM18 20180622
VBA32 BScope.Malware-Cryptor.Win32.Cb 20180622
ViRobot Trojan.Win32.Z.Kryptik.340992.AD 20180622
Webroot W32.Trojan.Emotet 20180622
ZoneAlarm by Check Point Trojan.Win32.Dovs.owj 20180622
Alibaba 20180622
Avast-Mobile 20180622
Avira (no cloud) 20180622
AVware 20180621
Babable 20180406
Bkav 20180622
CAT-QuickHeal 20180622
CMC 20180622
Comodo 20180622
Cybereason 20180225
DrWeb 20180622
eGambit 20180622
Jiangmin 20180622
Kingsoft 20180622
NANO-Antivirus 20180622
Rising 20180622
SentinelOne (Static ML) 20180618
SUPERAntiSpyware 20180622
Symantec Mobile Insight 20180619
Tencent 20180622
TheHacker 20180621
TotalDefense 20180622
Trustlook 20180622
VIPRE 20180622
Yandex 20180622
Zillya 20180622
Zoner 20180621
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Uniscri
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-20 19:02:15
Entry Point 0x0000100F
Number of sections 6
PE sections
PE imports
NotifyBootConfigStatus
CryptReleaseContext
OpenSCManagerW
RegEnumKeyW
LookupPrivilegeDisplayNameA
QueryServiceConfigW
ClusterRegSetValue
ClusterRegCreateKey
ImageList_Create
CertFindSubjectInSortedCTL
CertGetEnhancedKeyUsage
CertCreateCertificateChainEngine
CertSaveStore
JetCommitTransaction
GetKerningPairsW
LineTo
SetLayout
DeleteDC
SetAbortProc
CopyEnhMetaFileW
SetColorAdjustment
CreateFontIndirectA
CreateRectRgnIndirect
CreateEnhMetaFileA
CreateDIBSection
GetTextFaceA
EnumFontFamiliesW
GetLayout
ImmConfigureIMEW
GetSystemDefaultLangID
GetBinaryTypeA
SetVolumeLabelA
WaitForDebugEvent
SetTimeZoneInformation
Process32First
SetCalendarInfoW
GetStartupInfoW
SetEndOfFile
FlushFileBuffers
GetModuleFileNameA
FlsFree
WinExec
FindActCtxSectionStringW
LZOpenFileW
LZSeek
MprAdminInterfaceDisconnect
MprAdminInterfaceSetInfo
NetServerGetInfo
NetShareEnumSticky
BSTR_UserSize
LHashValOfNameSys
VariantTimeToSystemTime
VariantCopyInd
glTexCoord2f
UuidToStringA
NdrClientInitializeNew
RpcMgmtWaitServerListen
NdrOleAllocate
SetupGetTargetPathW
SetupDiSetDeviceRegistryPropertyA
SetupDiGetINFClassW
SetupOpenMasterInf
SetupDiInstallClassW
SetupDiBuildDriverInfoList
CM_Get_Resource_Conflict_DetailsW
SetupDiGetClassInstallParamsA
SHSetLocalizedName
PathAddBackslashA
SHGetInverseCMAP
PathIsRelativeA
UrlIsW
PathRemoveArgsW
PathRenameExtensionA
PathCanonicalizeW
AcquireCredentialsHandleW
wsprintfA
EnumPropsA
CreateMenu
GetMessagePos
PeekMessageW
GetScrollRange
GetInputState
GetDialogBaseUnits
AnyPopup
MoveWindow
BroadcastSystemMessageA
GetMessageExtraInfo
GetMonitorInfoA
EnumWindowStationsA
GetWindowContextHelpId
CloseWindowStation
GetClipCursor
FtpOpenFileA
waveOutGetID
mmioAscend
SendDriverMessage
timeBeginPeriod
GetPrinterDriverW
WTHelperProvDataFromStateData
wcstod
iswpunct
fgetws
fputws
CoUnmarshalInterface
WriteClassStm
CoMarshalHresult
StringFromCLSID
CoDisconnectObject
HBITMAP_UserUnmarshal
PdhEnumObjectItemsHW
IsAsyncMoniker
CoInternetIsFeatureEnabled
Number of PE resources by type
RT_DIALOG 21
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
HEBREW DEFAULT 1
HUNGARIAN DEFAULT 1
VIETNAMESE DEFAULT 1
CHINESE SIMPLIFIED 1
SLOVENIAN DEFAULT 1
CZECH DEFAULT 1
FINNISH DEFAULT 1
KOREAN 1
NEUTRAL DEFAULT 1
PORTUGUESE 1
POLISH DEFAULT 1
JAPANESE DEFAULT 1
DANISH DEFAULT 1
SLOVAK DEFAULT 1
GREEK DEFAULT 1
TURKISH DEFAULT 1
ROMANIAN 1
THAI DEFAULT 1
SERBIAN DEFAULT 1
NEUTRAL 1
RUSSIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
1.2.0.6

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Uniscri

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
235520

EntryPoint
0x100f

MIMEType
application/octet-stream

TimeStamp
2018:06:20 21:02:15+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0626.

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Realtek Semiconductor Corporation

CodeSize
109056

FileSubtype
0

ProductVersionNumber
1.2.0.6

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 5e46d148ec68be21c05d9faa95bd0be5
SHA1 c83432d3dff6c54a9fa94efc6dfd8c0892423a0f
SHA256 86d9d667ba5d0880ada452dbac0b6dec35c30248398d14f984143ce7738e61fa
ssdeep
1536:LiYvxMwlR5EVrCEW5EyZ/e/vxSppg3gh/Jh55XDhCWNUCa4o0:LiFrCPuyEApJz4WiCLo

authentihash b2b6c9d2987a59647eb5a2998e8b7e1e97c5d450f1320e018a0cda3576267044
imphash 56f5a7fb83ef31dc86b2dd946089a647
File size 333.0 KB ( 340992 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-06-20 12:04:29 UTC ( 8 months ago )
Last submission 2018-07-17 05:09:43 UTC ( 7 months ago )
File names L85mrPDxyUUNVe6gg.exe
2018-06-20-emotet-malware-binary-1-of-2.bin
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!