× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f564bb1bf45a41ba47904c9d0cfd7f0556545af0adaff0c0b63f33be3a225d66
File name: emotet_e2_f564bb1bf45a41ba47904c9d0cfd7f0556545af0adaff0c0b63f33b...
Detection ratio: 20 / 71
Analysis date: 2019-01-19 06:16:34 UTC ( 4 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190118
AegisLab Trojan.Win32.Malicious.4!c 20190119
CAT-QuickHeal Trojan.Emotet.X4 20190118
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.e70729 20190109
Cylance Unsafe 20190119
eGambit Unsafe.AI_Score_99% 20190119
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190119
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dh 20190119
Microsoft Trojan:Win32/Emotet.AC!bit 20190119
Palo Alto Networks (Known Signatures) generic.ml 20190119
Qihoo-360 HEUR/QVM19.1.A4E5.Malware.Gen 20190119
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20190119
SentinelOne (Static ML) static engine - malicious 20190118
Symantec ML.Attribute.HighConfidence 20190118
Trapmine malicious.high.ml.score 20190103
Webroot W32.Trojan.Emotet 20190119
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190119
Ad-Aware 20190119
AhnLab-V3 20190118
Alibaba 20180921
ALYac 20190119
Antiy-AVL 20190119
Arcabit 20190119
Avast 20190119
Avast-Mobile 20190118
AVG 20190119
Avira (no cloud) 20190119
Babable 20180918
Baidu 20190118
BitDefender 20190119
Bkav 20190119
ClamAV 20190119
CMC 20190118
Comodo 20190119
Cyren 20190119
DrWeb 20190119
Emsisoft 20190119
ESET-NOD32 20190119
F-Prot 20190119
F-Secure 20190119
Fortinet 20190119
GData 20190119
Ikarus 20190118
Jiangmin 20190119
K7AntiVirus 20190119
K7GW 20190119
Kingsoft 20190119
Malwarebytes 20190119
MAX 20190119
McAfee 20190119
eScan 20190119
NANO-Antivirus 20190119
Panda 20190118
Sophos AV 20190119
SUPERAntiSpyware 20190116
TACHYON 20190119
Tencent 20190119
TheHacker 20190118
TotalDefense 20190119
TrendMicro 20190119
TrendMicro-HouseCall 20190119
Trustlook 20190119
VBA32 20190118
VIPRE 20190118
ViRobot 20190118
Yandex 20190118
Zillya 20190118
Zoner 20190119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) America Online, Inc. 1999 - 2004

Product America Online
Internal name MISCUTIL
File version 9.00.001
Description Utilities
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-19 05:00:58
Entry Point 0x0001BB8B
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
InitiateSystemShutdownA
GetServiceDisplayNameW
CryptHashSessionKey
GetSidIdentifierAuthority
TreeResetNamedSecurityInfoW
LogonUserA
QueryUsersOnEncryptedFile
EqualPrefixSid
GetClusterFromResource
JetTerm2
GetLogColorSpaceA
GetCurrentPositionEx
GetPolyFillMode
GetObjectW
GetFontLanguageInfo
GetObjectType
GetSystemTime
GetSystemWindowsDirectoryA
GetModuleFileNameW
GetOverlappedResult
DeactivateActCtx
GetTapeStatus
FlsGetValue
FlushFileBuffers
GetShortPathNameA
GetVolumePathNamesForVolumeNameW
IsWow64Process
GetAtomNameA
GetVolumeInformationA
GetWindowsDirectoryA
GetPrivateProfileStringA
WriteProfileStringA
GetConsoleCursorInfo
GetCurrentDirectoryA
GetLocalTime
GetLogicalDrives
GetTapePosition
GetProfileSectionA
GetSystemPowerStatus
GetCurrentThread
EnumResourceTypesA
EnumResourceNamesW
GetTimeFormatW
GetThreadSelectorEntry
MapViewOfFile
GetModuleHandleA
GetExitCodeThread
GlobalAddAtomA
FindResourceExW
GetCurrentProcess
ReadFile
GetComputerNameExW
IsValidLocale
GetSystemDirectoryA
GetPrivateProfileSectionW
LocalFree
GetPrivateProfileIntW
QueryIdleProcessorCycleTime
FindAtomW
GetTimeZoneInformation
DebugActiveProcess
GetConsoleMode
GetFileType
LocalUnlock
GetThreadLocale
LoadTypeLib
VariantTimeToSystemTime
GetRecordInfoFromGuids
SystemTimeToVariantTime
RasGetEapUserIdentityA
RpcRaiseException
RpcServerListen
SetupDiGetClassDescriptionExW
ExtractIconA
HashData
GetMenuPosFromID
SHDeleteValueA
DecryptMessage
FindWindowW
ExcludeUpdateRgn
GetComboBoxInfo
PostQuitMessage
GetDialogBaseUnits
FlashWindowEx
GetMenuState
ReleaseCapture
LookupIconIdFromDirectoryEx
DestroyCaret
GetTabbedTextExtentW
GetWindowRgn
LockWorkStation
GetMenuItemRect
GetLastActivePopup
IsWindowVisible
GetWindowPlacement
DrawMenuBar
DrawTextW
GetThreadDesktop
LoadAcceleratorsA
GetPriorityClipboardFormat
DdeClientTransaction
ChangeMenuA
GetKeyboardLayout
GetMenuItemCount
DeferWindowPos
CreateIconFromResource
LoadCursorW
GetWindowLongW
GetWindowTextA
CharNextW
GetMenuContextHelpId
GetFileVersionInfoSizeW
FindNextUrlCacheEntryW
InternetGoOnline
DeleteUrlCacheEntryW
mmioSendMessage
DeletePortW
shutdown
getservbyname
realloc
fputws
fgetws
strcmp
CoUninitialize
MkParseDisplayName
CoTaskMemFree
CoGetClassObjectFromURL
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:01:19 06:00:58+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
130048

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

EntryPoint
0x1bb8b

InitializedDataSize
105472

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 d9bbec6e7a10e924f4a47c0c0a1cc70e
SHA1 1b04061e707296f3b374ea073dbb6c1aee8ed498
SHA256 f564bb1bf45a41ba47904c9d0cfd7f0556545af0adaff0c0b63f33be3a225d66
ssdeep
3072:HQRK7mdsCdJYiQfDa8Y3VOlURyyMZixJ/FJVbeETHjOu+FJPzC0O2g4ilR4a0ghH:wRByCafDQFOlCcZif8E7

authentihash d5a89298d8da15bbe67d343e639a955124319bae8ff3753cab6892570aff478d
imphash 04b31df76944c6c4773a172dbbd66e13
File size 221.0 KB ( 226304 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Microsoft Visual C++ compiled executable (generic) (46.2%)
Win32 Dynamic Link Library (generic) (18.4%)
Win32 Executable (generic) (12.6%)
Win16/32 Executable Delphi generic (5.8%)
OS/2 Executable (generic) (5.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-19 05:03:47 UTC ( 4 weeks ago )
Last submission 2019-01-19 23:27:26 UTC ( 3 weeks, 6 days ago )
File names Q4ANzyO1_vkKrq_rAAT9.exe
bwccbZP_X3.exe
4g3oCx_Y3KF.exe
29XTQ_z1M1H_FME6jZ.exe
c_YLMy1.exe
157.exe
MISCUTIL
DjKh.exe
emotet_e2_f564bb1bf45a41ba47904c9d0cfd7f0556545af0adaff0c0b63f33be3a225d66_2019-01-19__051002.exe_
MgGm_Nznk.exe
HLD_KlPHNbNj_X5d.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!