× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f0aa38900f76f8e7470ab4f7b0b1c72bf1404e7a727b31522e1a9c1cef249644
File name: emotet_e1_f0aa38900f76f8e7470ab4f7b0b1c72bf1404e7a727b31522e1a9c1...
Detection ratio: 21 / 70
Analysis date: 2019-01-19 06:54:02 UTC ( 4 months ago ) View latest
Antivirus Result Update
Acronis suspicious 20190119
CAT-QuickHeal Trojan.Emotet.X4 20190118
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.70cfe2 20190109
Cylance Unsafe 20190119
eGambit Unsafe.AI_Score_99% 20190119
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190119
Malwarebytes Trojan.Emotet 20190119
McAfee Artemis!8AF726850D90 20190119
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dh 20190119
Microsoft Trojan:Win32/Emotet.AC!bit 20190119
Palo Alto Networks (Known Signatures) generic.ml 20190119
Qihoo-360 HEUR/QVM19.1.A413.Malware.Gen 20190119
Rising Malware.Heuristic.MLite(87%) (AI-LITE:smDeYM7dvbFJK9dfHvl5pQ) 20190119
SentinelOne (Static ML) static engine - malicious 20190118
Symantec ML.Attribute.HighConfidence 20190118
Trapmine malicious.high.ml.score 20190103
Webroot W32.Trojan.Emotet 20190119
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190119
Ad-Aware 20190119
AegisLab 20190119
AhnLab-V3 20190118
Alibaba 20180921
ALYac 20190119
Antiy-AVL 20190119
Arcabit 20190119
Avast 20190119
Avast-Mobile 20190118
AVG 20190119
Avira (no cloud) 20190119
Babable 20180918
Baidu 20190118
BitDefender 20190119
Bkav 20190119
ClamAV 20190119
CMC 20190118
Comodo 20190119
Cyren 20190119
DrWeb 20190119
Emsisoft 20190119
ESET-NOD32 20190119
F-Prot 20190119
F-Secure 20190119
Fortinet 20190119
GData 20190119
Ikarus 20190118
Jiangmin 20190119
K7AntiVirus 20190119
K7GW 20190119
Kingsoft 20190119
MAX 20190119
eScan 20190119
NANO-Antivirus 20190119
Panda 20190118
Sophos AV 20190119
SUPERAntiSpyware 20190116
TACHYON 20190119
Tencent 20190119
TheHacker 20190118
TotalDefense 20190119
TrendMicro-HouseCall 20190119
Trustlook 20190119
VBA32 20190118
VIPRE 20190118
ViRobot 20190118
Yandex 20190118
Zillya 20190118
Zoner 20190119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) America Online, Inc. 1999 - 2004

Product America Online
Internal name MISCUTIL
File version 9.00.001
Description Utilities
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-19 01:40:10
Entry Point 0x0001BDC5
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
InitiateSystemShutdownA
GetServiceDisplayNameW
CryptHashSessionKey
GetSidIdentifierAuthority
TreeResetNamedSecurityInfoW
LogonUserA
QueryUsersOnEncryptedFile
EqualPrefixSid
GetClusterFromResource
JetTerm2
GetLogColorSpaceA
GetCurrentPositionEx
GetPolyFillMode
GetObjectW
GetFontLanguageInfo
GetObjectType
GetSystemTime
GetSystemWindowsDirectoryA
GetModuleFileNameW
DeactivateActCtx
GetTapeStatus
GetExitCodeThread
GetPrivateProfileIntW
FlushFileBuffers
GetLocalTime
GetVolumePathNamesForVolumeNameW
GetCurrentProcess
GetVolumeInformationA
GetCurrentDirectoryA
GetPrivateProfileStringA
WriteProfileStringA
GetConsoleCursorInfo
GetWindowsDirectoryA
GetThreadLocale
GetShortPathNameA
GetLogicalDrives
GetTapePosition
GetProfileSectionA
GetSystemPowerStatus
GetCurrentThread
EnumResourceTypesA
EnumResourceNamesW
GetTimeFormatW
MapViewOfFile
GetModuleHandleA
QueryIdleProcessorCycleTime
ReadFile
GlobalAddAtomA
FindResourceExW
GetAtomNameA
GetOverlappedResult
GetComputerNameExW
IsValidLocale
GetSystemDirectoryA
GetPrivateProfileSectionW
LocalFree
GetThreadSelectorEntry
IsWow64Process
FindAtomW
GetTimeZoneInformation
DebugActiveProcess
GetConsoleMode
GetFileType
LocalUnlock
FlsGetValue
LoadTypeLib
VariantTimeToSystemTime
GetRecordInfoFromGuids
SystemTimeToVariantTime
RasGetEapUserIdentityA
RpcRaiseException
RpcServerListen
SetupDiGetClassDescriptionExW
ExtractIconA
HashData
SHDeleteValueA
GetMenuPosFromID
DecryptMessage
FindWindowW
ExcludeUpdateRgn
GetComboBoxInfo
PostQuitMessage
GetDialogBaseUnits
FlashWindowEx
DeferWindowPos
ReleaseCapture
LookupIconIdFromDirectoryEx
DestroyCaret
GetTabbedTextExtentW
GetWindowRgn
LockWorkStation
GetMenuItemRect
GetLastActivePopup
IsWindowVisible
GetWindowPlacement
DrawMenuBar
DrawTextW
GetThreadDesktop
LoadAcceleratorsA
GetPriorityClipboardFormat
DdeClientTransaction
ChangeMenuA
GetKeyboardLayout
GetMenuItemCount
GetMenuState
CreateIconFromResource
LoadCursorW
GetWindowLongW
GetWindowTextA
CharNextW
GetMenuContextHelpId
GetFileVersionInfoSizeW
FindNextUrlCacheEntryW
InternetGoOnline
DeleteUrlCacheEntryW
mmioSendMessage
DeletePortW
shutdown
getservbyname
realloc
fputws
fgetws
strcmp
CoTaskMemFree
MkParseDisplayName
CoUninitialize
CoGetClassObjectFromURL
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:01:19 02:40:10+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
130048

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

EntryPoint
0x1bdc5

InitializedDataSize
109568

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

Execution parents
File identification
MD5 8af726850d90d8897096429c8f677fb9
SHA1 fb3a0b470cfe24b44f9fa711dda456cfac588fb1
SHA256 f0aa38900f76f8e7470ab4f7b0b1c72bf1404e7a727b31522e1a9c1cef249644
ssdeep
3072:/ersCUYBmxZzh6CzX4XSk/HvaTeFjpPWbpteEJWyQBi111y0nLA3lfh46cPmcSQ:/eoumH/zf8aT2jpuPXg

authentihash 9e1abd44bf289405e4608c11d3c85b9205c55dd96a966f1eaf1b32dda5e8054a
imphash 3006c8057f65e40e7da12cd9d4485b0a
File size 226.0 KB ( 231424 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Microsoft Visual C++ compiled executable (generic) (46.2%)
Win32 Dynamic Link Library (generic) (18.4%)
Win32 Executable (generic) (12.6%)
Win16/32 Executable Delphi generic (5.8%)
OS/2 Executable (generic) (5.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-19 01:47:55 UTC ( 4 months ago )
Last submission 2019-01-20 01:14:27 UTC ( 4 months ago )
File names GCitmVoRL.exe
zNFbc.exe
18737624.exe
19130840.exe
TjLELXPpLEM.exe
emotet_e1_f0aa38900f76f8e7470ab4f7b0b1c72bf1404e7a727b31522e1a9c1cef249644_2019-01-19__015002.exe_
477.exe
MISCUTIL
351.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!