× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b983b666cf8687ad24e5c792f882a6c023b23c0858fb900c110793a6703dc3e6
File name: emotet_e2_b983b666cf8687ad24e5c792f882a6c023b23c0858fb900c110793a...
Detection ratio: 20 / 70
Analysis date: 2019-01-19 06:16:37 UTC ( 1 month ago ) View latest
Antivirus Result Update
Acronis suspicious 20190118
CAT-QuickHeal Trojan.Emotet.X4 20190118
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.157233 20190109
Cylance Unsafe 20190119
eGambit Unsafe.AI_Score_99% 20190119
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190119
McAfee Artemis!0C12B6E792D5 20190119
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dh 20190119
Microsoft Trojan:Win32/Emotet.AC!bit 20190119
Palo Alto Networks (Known Signatures) generic.ml 20190119
Qihoo-360 HEUR/QVM19.1.A413.Malware.Gen 20190119
Rising Trojan.Emotet!8.B95/N3#91% (RDM+:cmRtazojDUW5r2elLUbm8/dxB6MQ) 20190119
SentinelOne (Static ML) static engine - malicious 20190118
Symantec ML.Attribute.HighConfidence 20190118
Trapmine malicious.high.ml.score 20190103
Webroot W32.Trojan.Emotet 20190119
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190119
Ad-Aware 20190119
AegisLab 20190119
AhnLab-V3 20190118
Alibaba 20180921
ALYac 20190119
Antiy-AVL 20190119
Arcabit 20190119
Avast 20190119
Avast-Mobile 20190118
AVG 20190119
Avira (no cloud) 20190119
Babable 20180918
Baidu 20190118
BitDefender 20190119
Bkav 20190119
ClamAV 20190119
CMC 20190118
Comodo 20190119
Cyren 20190119
DrWeb 20190119
Emsisoft 20190119
ESET-NOD32 20190119
F-Prot 20190119
F-Secure 20190119
Fortinet 20190119
GData 20190119
Ikarus 20190118
Jiangmin 20190119
K7AntiVirus 20190119
K7GW 20190119
Kingsoft 20190119
MAX 20190119
eScan 20190119
NANO-Antivirus 20190119
Panda 20190118
Sophos AV 20190119
SUPERAntiSpyware 20190116
TACHYON 20190119
Tencent 20190119
TheHacker 20190118
TotalDefense 20190119
TrendMicro 20190119
TrendMicro-HouseCall 20190119
Trustlook 20190119
VBA32 20190118
VIPRE 20190118
ViRobot 20190118
Yandex 20190118
Zillya 20190118
Zoner 20190119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) America Online, Inc. 1999 - 2004

Product America Online
Internal name MISCUTIL
File version 9.00.001
Description Utilities
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-19 01:41:54
Entry Point 0x0001C13B
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
InitiateSystemShutdownA
GetServiceDisplayNameW
CryptHashSessionKey
GetSidIdentifierAuthority
TreeResetNamedSecurityInfoW
LogonUserA
QueryUsersOnEncryptedFile
EqualPrefixSid
GetClusterFromResource
JetTerm2
GetLogColorSpaceA
GetCurrentPositionEx
GetPolyFillMode
GetObjectW
GetFontLanguageInfo
GetObjectType
GetSystemTime
GetSystemWindowsDirectoryA
GetOverlappedResult
DeactivateActCtx
GetTapeStatus
FlsGetValue
IsValidLocale
FlushFileBuffers
GetLocalTime
GetVolumePathNamesForVolumeNameW
IsWow64Process
GetAtomNameA
GetVolumeInformationA
GetWindowsDirectoryA
GetPrivateProfileStringA
WriteProfileStringA
GetConsoleCursorInfo
GetCurrentDirectoryA
GetShortPathNameA
GetLogicalDrives
MapViewOfFile
GetTapePosition
GetProfileSectionA
GetSystemPowerStatus
GetCurrentThread
EnumResourceTypesA
EnumResourceNamesW
GetTimeFormatW
GetModuleFileNameW
GetModuleHandleA
GetExitCodeThread
GlobalAddAtomA
FindResourceExW
GetCurrentProcess
ReadFile
GetComputerNameExW
QueryIdleProcessorCycleTime
GetSystemDirectoryA
GetPrivateProfileIntW
GetPrivateProfileSectionW
LocalFree
GetThreadSelectorEntry
FindAtomW
GetTimeZoneInformation
DebugActiveProcess
GetConsoleMode
GetFileType
LocalUnlock
GetThreadLocale
LoadTypeLib
VariantTimeToSystemTime
GetRecordInfoFromGuids
SystemTimeToVariantTime
RasGetEapUserIdentityA
RpcRaiseException
RpcServerListen
SetupDiGetClassDescriptionExW
ExtractIconA
HashData
GetMenuPosFromID
SHDeleteValueA
DecryptMessage
ReleaseCapture
ExcludeUpdateRgn
GetComboBoxInfo
PostQuitMessage
FlashWindowEx
DeferWindowPos
GetDialogBaseUnits
LookupIconIdFromDirectoryEx
DestroyCaret
GetTabbedTextExtentW
GetWindowRgn
LockWorkStation
GetMenuItemRect
GetLastActivePopup
IsWindowVisible
GetWindowPlacement
DrawMenuBar
DrawTextW
FindWindowW
GetThreadDesktop
LoadAcceleratorsA
GetPriorityClipboardFormat
DdeClientTransaction
ChangeMenuA
GetKeyboardLayout
GetMenuItemCount
GetMenuState
CreateIconFromResource
LoadCursorW
GetWindowLongW
GetWindowTextA
CharNextW
GetMenuContextHelpId
GetFileVersionInfoSizeW
FindNextUrlCacheEntryW
InternetGoOnline
DeleteUrlCacheEntryW
mmioSendMessage
DeletePortW
shutdown
getservbyname
realloc
fputws
fgetws
strcmp
CoUninitialize
MkParseDisplayName
CoTaskMemFree
CoGetClassObjectFromURL
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:01:19 02:41:54+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
130048

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

EntryPoint
0x1c13b

InitializedDataSize
117760

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

Execution parents
File identification
MD5 0c12b6e792d5e395f1d0e8e00f2a906b
SHA1 09e29451572335da9f617ce86015076058d6630d
SHA256 b983b666cf8687ad24e5c792f882a6c023b23c0858fb900c110793a6703dc3e6
ssdeep
3072:YzkTu/sgZpsORZ83sBZEADLaO7MKlwFUAYxvAyk77Cax/LdRUOsc0gf03qvULqsS:YzkTapNLJhjzXR

authentihash 6b4cc949ffe2215d1a732da78910048544d6aa3f1d35641efc59ecada7b98a0b
imphash d4face6a555d8381f4945cb595b3ac6d
File size 234.0 KB ( 239616 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Microsoft Visual C++ compiled executable (generic) (46.2%)
Win32 Dynamic Link Library (generic) (18.4%)
Win32 Executable (generic) (12.6%)
Win16/32 Executable Delphi generic (5.8%)
OS/2 Executable (generic) (5.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-19 01:48:14 UTC ( 1 month ago )
Last submission 2019-01-20 01:09:30 UTC ( 1 month ago )
File names chCA7_CFF_F.exe
a76hGxX1mEDtDWQfl.exe
MISCUTIL
emotet_e2_b983b666cf8687ad24e5c792f882a6c023b23c0858fb900c110793a6703dc3e6_2019-01-19__015002.exe_
157.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!