× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ef84a1af2f584a78127f07531d3a69897c581b39c6378cde34d260039d54d0b4
File name: E0tMw40mFigPRrj.exe
Detection ratio: 44 / 69
Analysis date: 2018-12-16 01:17:20 UTC ( 2 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKD.40834831 20181215
AhnLab-V3 Malware/Win32.Trojanspy.C2895048 20181215
ALYac Trojan.Agent.Emotet 20181215
Arcabit Trojan.Autoruns.Generic.D26F170F 20181215
Avast Win32:BankerX-gen [Trj] 20181215
AVG Win32:BankerX-gen [Trj] 20181215
BitDefender Trojan.Autoruns.GenericKD.40834831 20181216
Comodo Malware@#262v6isp7xqe5 20181216
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.2f4538 20180225
Cylance Unsafe 20181216
Cyren W32/Emotet.KT.gen!Eldorado 20181216
eGambit Unsafe.AI_Score_98% 20181216
Emsisoft Trojan.Autoruns.GenericKD.40834831 (B) 20181216
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CTWN 20181215
F-Prot W32/Emotet.KT.gen!Eldorado 20181216
F-Secure Trojan.Autoruns.GenericKD.40834831 20181216
Fortinet W32/GenKryptik.CTTA!tr 20181216
GData Win32.Trojan-Spy.Emotet.UH 20181216
Ikarus Trojan-Banker.Emotet 20181216
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005437091 ) 20181215
K7GW Trojan ( 005437091 ) 20181215
Kaspersky Trojan-Banker.Win32.Emotet.burc 20181215
Malwarebytes Trojan.Emotet 20181215
McAfee Emotet-FIB!4C1DB8E2F453 20181215
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20181215
Microsoft Trojan:Win32/Emotet.CD 20181215
eScan Trojan.Autoruns.GenericKD.40834831 20181215
NANO-Antivirus Trojan.Win32.Emotet.flcfht 20181215
Palo Alto Networks (Known Signatures) generic.ml 20181216
Panda Trj/Genetic.gen 20181215
Qihoo-360 HEUR/QVM20.1.CB13.Malware.Gen 20181216
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20181215
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/Generic-S 20181215
Symantec Trojan.Gen.2 20181215
Trapmine malicious.high.ml.score 20181205
TrendMicro TrojanSpy.Win32.EMOTET.THABABAH 20181215
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THABABAH 20181215
VBA32 BScope.Trojan.Emotet 20181214
Webroot W32.Trojan.Emotet 20181216
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.burc 20181215
AegisLab 20181214
Alibaba 20180921
Antiy-AVL 20181215
Avast-Mobile 20181215
Avira (no cloud) 20181216
Babable 20180918
Baidu 20181207
Bkav 20181214
CAT-QuickHeal 20181215
ClamAV 20181216
CMC 20181216
DrWeb 20181216
Jiangmin 20181215
Kingsoft 20181216
MAX 20181216
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181215
TACHYON 20181214
Tencent 20181216
TheHacker 20181213
TotalDefense 20181215
Trustlook 20181216
ViRobot 20181215
Yandex 20181214
Zillya 20181215
Zoner 20181215
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Ea
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-19 14:53:40
Entry Point 0x000030B0
Number of sections 9
PE sections
PE imports
GetSecurityDescriptorGroup
SetBitmapDimensionEx
GetLayout
SetConsoleCP
WriteTapemark
GetLogicalProcessorInformation
TlsGetValue
FlsGetValue
GetHandleInformation
VerifyVersionInfoW
PulseEvent
RpcErrorAddRecord
PathIsSystemFolderW
OpenIcon
SetClassLongW
IsCharUpperW
GetCursor
GetDlgItem
GetMessageW
LoadKeyboardLayoutA
SwapMouseButton
SCardGetStatusChangeA
OleLockRunning
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ARABIC EGYPT 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
16.0

ImageVersion
0.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Ea

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x30b0

MIMEType
application/octet-stream

TimeStamp
1995:11:19 06:53:40-08:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TVersion
0.9

CodeSize
12288

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 4c1db8e2f4538daf96d6b252484afbf4
SHA1 0f283233f8b4e3d58a6b06d6705d8888698e3bfe
SHA256 ef84a1af2f584a78127f07531d3a69897c581b39c6378cde34d260039d54d0b4
ssdeep
3072:loHL75rpM893HKxjp+qz7668aYi3SL3mi:le9f9QN+qzPnW

authentihash 97ae37b2a1953b45e100d3418ce59ea6244f7233d0e9d08ac57b0bc289a67a7c
imphash 39c02ca90ff300ba3ebf2383b57b656b
File size 136.0 KB ( 139264 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-11 11:49:50 UTC ( 2 months, 1 week ago )
Last submission 2018-12-11 11:58:28 UTC ( 2 months, 1 week ago )
File names 3.exe
6.exe
234.exe
414.exe
E0tMw40mFigPRrj.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!