× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: eb45ef79e4e9d8b7e1af4ecd7a3afdb3a336c67cab2b5e4e4f44abb64d582680
File name: c0a32693c257b0bed41d20055348ebb8.virus
Detection ratio: 37 / 68
Analysis date: 2018-06-12 04:23:28 UTC ( 8 months, 1 week ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.336199 20180612
AhnLab-V3 Trojan/Win32.Agent.R229209 20180611
ALYac Gen:Variant.Razy.336199 20180612
Antiy-AVL Trojan/Win32.Agent 20180612
Arcabit Trojan.Razy.D52147 20180612
Avast Win32:GenX 20180612
AVG Win32:GenX 20180612
AVware Trojan.Win32.Generic!BT 20180612
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180611
BitDefender Gen:Variant.Razy.336199 20180612
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180530
Cylance Unsafe 20180612
Cyren W32/Trojan.LZFL-5259 20180612
Emsisoft Gen:Variant.Razy.336199 (B) 20180612
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/Kryptik.GHCZ 20180612
F-Secure Gen:Variant.Razy.336199 20180612
Fortinet W32/GenKryptik.AZUE!tr 20180612
GData Win32.Trojan-Spy.Emotet.QV 20180612
Ikarus Win32.Outbreak 20180611
Sophos ML heuristic 20180601
Kaspersky HEUR:Trojan.Win32.Generic 20180612
Malwarebytes Spyware.PasswordStealer 20180612
MAX malware (ai score=87) 20180612
McAfee Emotet-FDM!C0A32693C257 20180612
McAfee-GW-Edition BehavesLike.Win32.ExploitDcomRpc.dh 20180612
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180612
eScan Gen:Variant.Razy.336199 20180612
NANO-Antivirus Trojan.Win32.Emotet.fdgcfp 20180612
Panda Trj/GdSda.A 20180611
Qihoo-360 HEUR/QVM20.1.C9A3.Malware.Gen 20180612
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/EncPk-ANR 20180612
Symantec ML.Attribute.HighConfidence 20180611
TrendMicro TROJ_GEN.R020C0PEV18 20180612
TrendMicro-HouseCall TSPY_EMOTET.SMZD34 20180612
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180612
AegisLab 20180612
Alibaba 20180611
Avast-Mobile 20180611
Avira (no cloud) 20180612
Babable 20180406
Bkav 20180611
CAT-QuickHeal 20180611
ClamAV 20180611
CMC 20180611
Comodo 20180612
Cybereason 20180225
DrWeb 20180612
eGambit 20180612
F-Prot 20180612
Jiangmin 20180612
K7AntiVirus 20180611
K7GW 20180612
Kingsoft 20180612
Palo Alto Networks (Known Signatures) 20180612
Rising 20180612
SUPERAntiSpyware 20180612
Symantec Mobile Insight 20180605
TACHYON 20180612
Tencent 20180612
TheHacker 20180608
TotalDefense 20180611
Trustlook 20180612
VBA32 20180611
VIPRE 20180612
ViRobot 20180612
Webroot 20180612
Yandex 20180609
Zillya 20180611
Zoner 20180612
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2028-12-25 04:27:37
Entry Point 0x00001FE2
Number of sections 5
PE sections
PE imports
GetUserNameA
ImpersonateSelf
BackupEventLogA
CryptDuplicateHash
ImageList_SetIconSize
CertAddSerializedElementToStore
CertGetCertificateChain
CryptMsgOpenToEncode
CertOpenSystemStoreA
GetStretchBltMode
AnimatePalette
ExtCreatePen
CreateWaitableTimerW
GetCurrentProcess
ConnectNamedPipe
WritePrivateProfileStringA
WaitForDebugEvent
GetNumberFormatA
DeactivateActCtx
CreateNamedPipeW
SetDynamicTimeZoneInformation
ClearCommBreak
LocalHandle
GetFileType
GetComputerNameExW
GetGeoInfoW
FindFirstVolumeW
LZSeek
MprAdminMIBEntryGet
VarUI4FromUI8
glTexCoord2f
SetActivePwrScheme
RasDialA
I_RpcServerRegisterForwardFunction
NdrConformantArrayMarshall
RpcRaiseException
RpcAsyncCancelCall
I_RpcNsBindingSetEntryNameW
SetupLogErrorA
SetupDiCreateDeviceInterfaceW
SetupDiGetDeviceInstanceIdW
SetupDiSetSelectedDriverA
HashData
StrCpyNW
SHSetValueW
SHCopyKeyW
BlockInput
GetKBCodePage
GetWindowTextW
LoadCursorW
SetCaretBlinkTime
GetAncestor
SetScrollInfo
GetUrlCacheEntryInfoA
InternetSetOptionW
InternetSetStatusCallbackA
waveOutSetVolume
waveOutGetErrorTextW
waveOutGetVolume
midiInStart
AddJobW
GetPrinterDataExW
XcvDataW
WintrustRemoveActionID
gethostbyaddr
SCardForgetCardTypeW
SCardDisconnect
InstallColorProfileW
toupper
STGMEDIUM_UserMarshal
OleConvertOLESTREAMToIStorage
CoUnmarshalInterface
CreateILockBytesOnHGlobal
PdhGetDataSourceTimeRangeH
IsValidURL
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
JAPANESE DEFAULT 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
192512

ImageVersion
0.0

FileVersionNumber
1.0.124.0

LanguageCode
Japanese

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
12.164

FileTypeExtension
exe

MIMEType
application/octet-stream

TimeStamp
2028:12:25 05:27:37+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
25 4 3

CodeSize
0

FileSubtype
0

ProductVersionNumber
24.0.55.0

EntryPoint
0x1fe2

ObjectFileType
Dynamic link library

File identification
MD5 c0a32693c257b0bed41d20055348ebb8
SHA1 636f1a4c1f8bcaa481348ae47d57cfb771fe434f
SHA256 eb45ef79e4e9d8b7e1af4ecd7a3afdb3a336c67cab2b5e4e4f44abb64d582680
ssdeep
1536:JO4W9SFFrI29LEl3NdVrstfCTwg56NEN41y2faE8GK/Q:8+FCl3nV4tgwTYuT8GK/Q

authentihash 3ba994f7903710e5c9017d1513c3c65f0cb7e035fa47463fd8160ee058aac5c6
imphash a038930420e4f004fa4cee6acf94c71c
File size 208.0 KB ( 212992 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Win32 Executable (generic) (35.7%)
Win16/32 Executable Delphi generic (16.4%)
OS/2 Executable (generic) (16.0%)
Generic Win/DOS Executable (15.8%)
DOS Executable Generic (15.8%)
Tags
peexe

VirusTotal metadata
First submission 2018-06-12 04:23:28 UTC ( 8 months, 1 week ago )
Last submission 2018-06-12 04:23:28 UTC ( 8 months, 1 week ago )
File names c0a32693c257b0bed41d20055348ebb8.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!