× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ebb6340db54a85d4494e7d2cadbdb4317950f42ddbe0f34bd1223089b37ca01d
File name: emotet_e2_ebb6340db54a85d4494e7d2cadbdb4317950f42ddbe0f34bd122308...
Detection ratio: 34 / 69
Analysis date: 2019-01-17 06:14:57 UTC ( 1 month ago ) View latest
Antivirus Result Update
Acronis suspicious 20190116
Ad-Aware Gen:Variant.Ser.Razy.1160 20190116
ALYac Gen:Variant.Ser.Razy.1160 20190116
Arcabit Trojan.Ser.Razy.D488 20190116
AVG Win32:BankerX-gen [Trj] 20190116
BitDefender Gen:Variant.Ser.Razy.1160 20190116
Bkav HW32.Packed. 20190116
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cyren W32/Trojan.GPYF-4751 20190116
Emsisoft Trojan.Emotet (A) 20190116
ESET-NOD32 a variant of Win32/Kryptik.GORG 20190116
F-Secure Gen:Variant.Ser.Razy.1160 20190116
Fortinet Malicious_Behavior.SB 20190116
GData Gen:Variant.Ser.Razy.1160 20190116
Ikarus Trojan-Banker.Emotet 20190116
Sophos ML heuristic 20181128
Kaspersky Trojan-Banker.Win32.Emotet.bzvj 20190116
Malwarebytes Trojan.Emotet 20190116
McAfee Emotet-FID!230C4176A935 20190116
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20190116
Microsoft Trojan:Win32/Emotet.M 20190116
eScan Gen:Variant.Ser.Razy.1160 20190116
Palo Alto Networks (Known Signatures) generic.ml 20190116
Panda Trj/CI.A 20190116
Qihoo-360 HEUR/QVM20.1.94F9.Malware.Gen 20190116
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/Generic-S 20190116
Symantec Trojan.Emotet 20190116
Trapmine malicious.high.ml.score 20190102
TrendMicro TrojanSpy.Win32.EMOTET.THOAAFAI 20190116
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THOAAFAI 20190116
VBA32 SScope.Malware-Cryptor.Emotet 20190116
ViRobot Trojan.Win32.Emotet.143360.C 20190116
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bzvj 20190116
AegisLab 20190116
AhnLab-V3 20190116
Alibaba 20180921
Antiy-AVL 20190116
Avast 20190116
Avast-Mobile 20190116
Avira (no cloud) 20190116
AVware 20180925
Babable 20180917
Baidu 20190116
CAT-QuickHeal 20190116
ClamAV 20190116
CMC 20190116
Comodo 20190116
Cybereason 20190109
DrWeb 20190116
eGambit 20190116
Endgame 20181108
F-Prot 20190116
Jiangmin 20190116
K7AntiVirus 20190116
K7GW 20190116
Kingsoft 20190116
MAX 20190116
NANO-Antivirus 20190116
Rising 20190117
SUPERAntiSpyware 20190116
TACHYON 20190116
Tencent 20190116
TheHacker 20190114
TotalDefense 20190116
Trustlook 20190116
Webroot 20190116
Yandex 20190116
Zillya 20190116
Zoner 20190116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2003-01-09 08:13:11
Entry Point 0x000024E0
Number of sections 7
PE sections
PE imports
IsValidAcl
SetUserFileEncryptionKey
OpenThread
GetSystemDefaultLangID
EnumSystemLocalesA
Heap32ListFirst
GetFileTime
GetConsoleCP
GetCommandLineW
GetNumberOfConsoleInputEvents
CloseHandle
GetMailslotInfo
PathGetCharTypeA
UpdateLayeredWindowIndirect
SetClassWord
GetRegisteredRawInputDevices
ShowOwnedPopups
GetCapture
GetKeyboardLayout
CreateCaret
GetCursor
GetMessagePos
RegisterClipboardFormatW
SCardGetStatusChangeW
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
TURKISH DEFAULT 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
102400

LinkerVersion
4.0

ImageVersion
5.0

FileVersionNumber
10.0.4.33

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

InitializedDataSize
4096

EntryPoint
0x24e0

MIMEType
application/octet-stream

TimeStamp
2003:01:09 00:13:11-08:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
6.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
12288

FileSubtype
0

ProductVersionNumber
10.0.4.33

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 230c4176a9358ff2713bad86c2997b63
SHA1 93c3bf1648978bcb9b760adf680b058caa69e721
SHA256 ebb6340db54a85d4494e7d2cadbdb4317950f42ddbe0f34bd1223089b37ca01d
ssdeep
3072:BM0YwR5unRFd2mjs+QndRT6X321PYM2uY+9CXBDJ6G9Q:Bvmd2CQnq321wM2uFCBb

authentihash 106126c52d49070be7737edcef08b019ab15ffd5c0749160ee55d5aca139105c
imphash 017cb28049cd1a7927b9ea704820f3e1
File size 140.0 KB ( 143360 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-16 07:59:05 UTC ( 1 month ago )
Last submission 2019-01-17 06:14:57 UTC ( 1 month ago )
File names emotet_e2_ebb6340db54a85d4494e7d2cadbdb4317950f42ddbe0f34bd1223089b37ca01d_2019-01-16__080002.exe_
zbetcheckin_tracker_230c4176a9358ff2713bad86c2997b63
g1K_s3Zn3J_S8Po72.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!