× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a757c5cff5c8bb455cec1687cc56071834ef5fc7b40e368c644f255317ce790b
File name: a757c5cff5c8bb455cec1687cc56071834ef5fc7b40e368c644f255317ce790b
Detection ratio: 53 / 70
Analysis date: 2018-12-27 10:02:19 UTC ( 1 month, 3 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181227
Ad-Aware Trojan.GenericKD.40390078 20181227
AegisLab Trojan.Win32.Emotet.7!c 20181227
AhnLab-V3 Trojan/Win32.Emotet.R233699 20181226
ALYac Trojan.Agent.Emotet 20181227
Antiy-AVL Trojan[Banker]/Win32.Emotet 20181227
Arcabit Trojan.Generic.D2684DBE 20181227
Avast Win32:BankerX-gen [Trj] 20181227
AVG Win32:BankerX-gen [Trj] 20181227
Avira (no cloud) HEUR/AGEN.1031851 20181226
BitDefender Trojan.GenericKD.40390078 20181227
CAT-QuickHeal Trojan.Emotet.X4 20181226
Comodo Malware@#2h99ke7avck9v 20181227
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.3295b2 20180225
Cylance Unsafe 20181227
Cyren W32/Emotet.FC.gen!Eldorado 20181227
DrWeb Trojan.EmotetENT.265 20181227
Emsisoft Trojan.GenericKD.40390078 (B) 20181227
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CTWN 20181227
F-Prot W32/Emotet.FC.gen!Eldorado 20181227
F-Secure Trojan.GenericKD.40390078 20181227
Fortinet W32/Kryptik.GJSS!tr 20181227
GData Trojan.GenericKD.40390078 20181227
Ikarus Trojan-Banker.Emotet 20181227
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.cft 20181226
K7AntiVirus Trojan ( 0053b6a31 ) 20181226
K7GW Trojan ( 0053b6a31 ) 20181226
Kaspersky HEUR:Trojan.Win32.Generic 20181227
McAfee Generic.dxj 20181227
McAfee-GW-Edition BehavesLike.Win32.IRCBot.ch 20181227
Microsoft Trojan:Win32/Emotet.AC!bit 20181227
eScan Trojan.GenericKD.40390078 20181227
NANO-Antivirus Trojan.Win32.Emotet.fifozn 20181227
Palo Alto Networks (Known Signatures) generic.ml 20181227
Panda Trj/GdSda.A 20181226
Qihoo-360 HEUR/QVM20.1.1DE1.Malware.Gen 20181227
Rising Trojan.Kryptik!8.8 (CLOUD) 20181227
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/EncPk-ANY 20181227
SUPERAntiSpyware Trojan.Agent/Gen-Kryptik 20181226
Symantec Trojan.Gen.2 20181226
TACHYON Trojan/W32.Agent.159744.BYR 20181227
Trapmine malicious.high.ml.score 20181205
TrendMicro TROJ_GEN.F0C2C00HC18 20181227
TrendMicro-HouseCall TSPY_HPEMOTET.SMAL8 20181227
VBA32 BScope.Trojan.Refinka 20181226
VIPRE Trojan.Win32.Generic!BT 20181226
Webroot W32.Trojan.Emotet 20181227
Yandex Trojan.Agent!IBW0svUcTqc 20181226
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181227
Alibaba 20180921
Avast-Mobile 20181227
Babable 20180918
Baidu 20181207
Bkav 20181224
ClamAV 20181227
CMC 20181226
eGambit 20181227
Kingsoft 20181227
MAX 20181227
Symantec Mobile Insight 20181225
Tencent 20181227
TheHacker 20181225
TotalDefense 20181227
Trustlook 20181227
ViRobot 20181227
Zillya 20181227
Zoner 20181227
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-11 23:17:29
Entry Point 0x000018A6
Number of sections 6
PE sections
PE imports
BackupEventLogW
AllocateLocallyUniqueId
CM_Get_Sibling_Ex
GetDeviceCaps
GetCurrentObject
GetWinMetaFileBits
SetViewportOrgEx
SetBkColor
GetObjectType
GetSystemTime
GetExitCodeThread
GetNumberOfConsoleInputEvents
IsProcessorFeaturePresent
GetCommandLineA
SetThreadIdealProcessor
SleepEx
MprConfigTransportGetInfo
acmFormatChooseW
ShellAboutW
Ord(29)
UrlCreateFromPathW
BringWindowToTop
GetWindowInfo
CallWindowProcA
CallMsgFilterA
GetAsyncKeyState
WSASetLastError
OleDestroyMenuDescriptor
Number of PE resources by type
RT_BITMAP 13
RT_STRING 13
Number of PE resources by language
NEUTRAL 19
CHINESE TRADITIONAL 6
ITALIAN 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:08:11 16:17:29-07:00

FileType
Win32 EXE

PEType
PE32

CodeSize
12288

LinkerVersion
15.0

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0x18a6

InitializedDataSize
147456

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 90d385795229c4dfe8f0d060776cec5f
SHA1 b23bdcf3295b24a14f3db7e7dea519138c9b58b8
SHA256 a757c5cff5c8bb455cec1687cc56071834ef5fc7b40e368c644f255317ce790b
ssdeep
1536:c47wgAjTsW0wqBDK7RkwffePMKCbNHGjqyjc0UZLQvEuExiAEvBdoJ8i/42:c47gEBDIRkwffLbU+yjcN5xiIJ742

authentihash 5fe7fff2539f5cf4b607c971ffd9cfa95bd62b470b74f4b09b168144f6134565
imphash ffc0434b1e4bd01db091b1d0b0daa346
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-11 16:21:02 UTC ( 6 months, 2 weeks ago )
Last submission 2018-08-12 13:48:28 UTC ( 6 months, 2 weeks ago )
File names 34529992.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs