× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f4ed48a4c7b2f6a41dee456fc5d9839ec477d138fa8974b6e77222d8970e79a8
File name: vhGbB3.exe
Detection ratio: 50 / 70
Analysis date: 2018-12-07 05:34:06 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31276328 20181207
AhnLab-V3 Trojan/Win32.Agent.R238870 20181207
ALYac Trojan.Autoruns.GenericKDS.31276328 20181207
Arcabit Trojan.Autoruns.GenericS.D1DD3D28 20181207
Avast Win32:BankerX-gen [Trj] 20181207
AVG Win32:BankerX-gen [Trj] 20181207
Avira (no cloud) HEUR/AGEN.1036243 20181206
BitDefender Trojan.Autoruns.GenericKDS.31276328 20181207
CAT-QuickHeal Trojan.IGENERIC 20181206
CMC Trojan.Win32.Obfuscated.en!O 20181206
Comodo Malware@#pz44n9bwfbiu 20181207
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cylance Unsafe 20181207
Cyren W32/Trojan.ZADS-3236 20181207
Emsisoft Trojan.Autoruns.GenericKDS.31276328 (B) 20181207
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GLNM 20181207
F-Prot W32/Emotet.JU.gen!Eldorado 20181206
F-Secure Trojan.Autoruns.GenericKDS.31276328 20181206
Fortinet W32/Kryptik.GLNM!tr 20181206
GData Trojan.Autoruns.GenericKDS.31276328 20181206
Ikarus Trojan-Spy.Win32.Emotet 20181206
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.dfz 20181206
K7AntiVirus Trojan ( 0053e8a81 ) 20181207
K7GW Trojan ( 0053e8a81 ) 20181207
Kaspersky HEUR:Trojan.Win32.Generic 20181207
Malwarebytes Trojan.Emotet 20181207
McAfee RDN/Generic.hbg 20181207
McAfee-GW-Edition RDN/Generic.hbg 20181207
Microsoft Trojan:Win32/Emotet!rfn 20181207
eScan Trojan.Autoruns.GenericKDS.31276328 20181207
NANO-Antivirus Virus.Win32.Gen.ccmw 20181207
Palo Alto Networks (Known Signatures) generic.ml 20181207
Panda Trj/GdSda.A 20181206
Qihoo-360 HEUR/QVM20.1.6F29.Malware.Gen 20181207
Rising Trojan.Kryptik!8.8 (CLOUD) 20181207
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181207
Symantec Trojan.Emotet 20181207
TACHYON Banker/W32.Emotet.696320.G 20181207
Tencent Win32.Trojan-banker.Emotet.Akos 20181207
Trapmine malicious.high.ml.score 20181205
TrendMicro TSPY_EMOTET.THAOAAAH 20181207
TrendMicro-HouseCall TSPY_EMOTET.THAOAAAH 20181207
VBA32 BScope.Trojan.Refinka 20181206
VIPRE Trojan.Win32.Generic!BT 20181205
Webroot W32.Trojan.Emotet 20181207
Zillya Trojan.Emotet.Win32.5189 20181206
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181207
AegisLab 20181207
Alibaba 20180921
Antiy-AVL 20181207
Avast-Mobile 20181206
Babable 20180918
Baidu 20181206
Bkav 20181206
ClamAV 20181207
Cybereason 20180225
DrWeb 20181207
eGambit 20181207
Kingsoft 20181207
MAX 20181207
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
TheHacker 20181202
TotalDefense 20181206
Trustlook 20181207
ViRobot 20181207
Yandex 20181204
Zoner 20181207
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-01 09:39:18
Entry Point 0x0000EC93
Number of sections 4
PE sections
PE imports
GetClusterResourceNetworkName
GetTextCharsetInfo
GetFontLanguageInfo
GdiSetBatchLimit
GetPath
GetCommModemStatus
GetCurrentProcessId
WritePrivateProfileStructA
GetDynamicTimeZoneInformation
GetTapePosition
GetPrivateProfileIntW
LZSeek
FreeDDElParam
GetWindowTextLengthA
OffsetRect
GetCapture
IsWindowEnabled
GetUpdateRect
GetMenuStringW
FindNextUrlCacheGroup
FindClosePrinterChangeNotification
localeconv
memset
Number of PE resources by type
TEXT 1
Number of PE resources by language
NEUTRAL 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:03:01 10:39:18+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
507904

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0xec93

InitializedDataSize
188416

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 e4a6ac98cc7971a87a3f580449511da1
SHA1 31b714c4939ac6cf2738bcaef4f347f34df2d497
SHA256 f4ed48a4c7b2f6a41dee456fc5d9839ec477d138fa8974b6e77222d8970e79a8
ssdeep
6144:UcDMqciKOu3+0sTuwplo6NRw4/zJzgwmQ6J:UcQ9NPeno6NRNJzBm5J

authentihash 48508b20d4cc4c76c58e98fe45e927ba4cf7c7edf9be537bb7296dbe4e36a757
imphash b5e1f37f3b8b85943f8c08176c51eb1e
File size 680.0 KB ( 696320 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-10 15:09:38 UTC ( 4 months, 2 weeks ago )
Last submission 2018-10-10 15:09:38 UTC ( 4 months, 2 weeks ago )
File names vhGbB3.exe
tsdlayout.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!