× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a4bd520ed987c71b599ec8a96be249baa068dcf942dc8f92543fb36b1cebf9fb
File name: emotet_e1_a4bd520ed987c71b599ec8a96be249baa068dcf942dc8f92543fb36...
Detection ratio: 48 / 67
Analysis date: 2019-02-27 01:54:33 UTC ( 1 month, 3 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190222
Ad-Aware Trojan.GenericKD.31720669 20190226
AhnLab-V3 Trojan/Win32.Emotet.R256550 20190226
ALYac Trojan.Agent.Emotet 20190226
Antiy-AVL Trojan[Banker]/Win32.Emotet 20190226
Arcabit Trojan.Generic.D1E404DD 20190226
Avast Win32:BankerX-gen [Trj] 20190226
AVG Win32:BankerX-gen [Trj] 20190226
Avira (no cloud) TR/AD.Emotet.fdxmd 20190226
BitDefender Trojan.GenericKD.31720669 20190226
ClamAV Win.Trojan.Emotet-6867665-0 20190226
Comodo Malware@#37wuozzf086a1 20190226
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cybereason malicious.d0719e 20190109
Cylance Unsafe 20190227
DrWeb Trojan.DownLoader27.34221 20190226
eGambit Unsafe.AI_Score_95% 20190227
Emsisoft Trojan.GenericKD.31720669 (B) 20190226
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.GQCA 20190226
F-Secure Trojan.TR/AD.Emotet.fdxmd 20190226
Fortinet W32/Kryptik.GQCA!tr 20190226
GData Trojan.GenericKD.31720669 20190226
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 0054876d1 ) 20190226
K7GW Trojan ( 0054876d1 ) 20190226
Kaspersky Trojan-Banker.Win32.Emotet.cias 20190226
Malwarebytes Trojan.Emotet 20190226
MAX malware (ai score=80) 20190227
McAfee Emotet-FLR!CC1A7CED0719 20190226
McAfee-GW-Edition BehavesLike.Win32.Ransomware.dc 20190226
Microsoft Trojan:Win32/Emotet.AC!bit 20190226
eScan Trojan.GenericKD.31720669 20190226
Palo Alto Networks (Known Signatures) generic.ml 20190227
Panda Trj/GdSda.A 20190226
Qihoo-360 Win32/Trojan.87c 20190227
Rising Trojan.Azden!8.F0E3 (CLOUD) 20190226
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Emotet-Q 20190226
Symantec Packed.Generic.517 20190226
Tencent Win32.Trojan-banker.Emotet.Syhu 20190227
Trapmine malicious.high.ml.score 20190123
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THBBFAI 20190226
VBA32 BScope.Trojan.Refinka 20190226
VIPRE Trojan.Win32.Generic!BT 20190226
Webroot W32.Trojan.Emotet 20190227
Yandex Trojan.PWS.Emotet! 20190226
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cias 20190226
AegisLab 20190226
Alibaba 20180921
Avast-Mobile 20190226
Babable 20180917
Baidu 20190214
CAT-QuickHeal 20190225
CMC 20190226
Cyren 20190226
Jiangmin 20190226
Kingsoft 20190227
NANO-Antivirus 20190226
SUPERAntiSpyware 20190220
Symantec Mobile Insight 20190220
TACHYON 20190226
TheHacker 20190224
TotalDefense 20190226
TrendMicro 20190226
Trustlook 20190227
ViRobot 20190226
Zillya 20190226
Zoner 20190226
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 1997, 1998

Product PocketMirror
Original name VDMDBG
Internal name VDMDBG
File version 6.1.
Description ABMIRROR DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-24 12:00:15
Entry Point 0x00001000
Number of sections 4
PE sections
PE imports
IsValidAcl
ImpersonateSelf
GetSecurityDescriptorLength
LookupAccountNameW
CertFindCertificateInStore
RestoreDC
GetMapMode
GetWorldTransform
EndDoc
GetStretchBltMode
GetBkColor
DeleteMetaFile
GetLastError
IsProcessorFeaturePresent
ApplicationRecoveryInProgress
GetOverlappedResult
GetPrivateProfileIntA
GetDriveTypeA
VirtualProtect
GetModuleFileNameA
LocalAlloc
GetConsoleCursorInfo
lstrcmpiA
GetModuleHandleA
FindNextFileW
FreeConsole
GetThreadTimes
IsValidLocale
FindFirstFileExW
GetModuleHandleW
GetBinaryTypeA
GetOEMCP
FindResourceW
GetConsoleWindow
VirtualQueryEx
GetFileAttributesExA
SleepEx
VarTokenizeFormatString
GetRecordInfoFromGuids
GetUserNameExA
GetSysColor
LoadCursorA
GetMessageExtraInfo
EnumWindows
FindWindowW
DdeKeepStringHandle
GetClassWord
IsWindowUnicode
UnpackDDElParam
GetMenuCheckMarkDimensions
InsertMenuW
LogicalToPhysicalPoint
GetWindowTextA
ModifyMenuA
LockSetForegroundWindow
GetLastInputInfo
DeleteMenu
InternetInitializeAutoProxyDll
FindNextUrlCacheEntryExA
GetPrinterDriverW
toupper
GetRunningObjectTable
OleCreateStaticFromData
CreateGenericComposite
Number of PE resources by type
RT_STRING 14
RT_DIALOG 7
RT_VERSION 1
Number of PE resources by language
ENGLISH US 22
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.1.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
ABMIRROR DLL

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
184320

EntryPoint
0x1000

OriginalFileName
VDMDBG

MIMEType
application/octet-stream

LegalCopyright
Copyright 1997, 1998

FileVersion
6.1.

TimeStamp
2019:02:24 13:00:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
VDMDBG

ProductVersion
6.1.

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Chapura, Inc.

CodeSize
28672

ProductName
PocketMirror

ProductVersionNumber
2.0.1.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 cc1a7ced0719e71bb147da593460f026
SHA1 df0d47745f2bf8991d4bc2425d5dfee6ec3aace5
SHA256 a4bd520ed987c71b599ec8a96be249baa068dcf942dc8f92543fb36b1cebf9fb
ssdeep
6144:9eNxtVG4gD0/8kTJ4jxZFn+g4T8ezSbjp:9iPl0kTJ4FZ50z

authentihash b5ec729c91ab889789f34c68f31538015c3442faf02b8a43cc96e970fd78355a
imphash a6149f60c950b026d1076945f828d952
File size 204.0 KB ( 208896 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-24 12:04:14 UTC ( 1 month, 3 weeks ago )
Last submission 2019-02-26 03:34:50 UTC ( 1 month, 3 weeks ago )
File names 4wYYeXah1.exe
VDMDBG
emotet_e1_a4bd520ed987c71b599ec8a96be249baa068dcf942dc8f92543fb36b1cebf9fb_2019-02-24__120503.exe_
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!