× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f58351a7215eed6f3469e6d7e2a2f31b52b73bdf78ad16d9b1f4c0d2f0ff8044
File name: output.114669393.txt
Detection ratio: 50 / 69
Analysis date: 2018-12-17 02:16:30 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31402027 20181217
AegisLab Trojan.Win32.Emotet.4!c 20181214
AhnLab-V3 Trojan/Win32.Emotet.R248171 20181216
ALYac Trojan.Agent.Emotet 20181217
Antiy-AVL Trojan[Banker]/Win32.Emotet 20181216
Avast Win32:MalwareX-gen [Trj] 20181216
AVG Win32:MalwareX-gen [Trj] 20181216
BitDefender Trojan.Autoruns.GenericKDS.31402027 20181216
CAT-QuickHeal Trojan.Drixed.100454 20181216
Comodo Malware@#24zvfm4wu6i8p 20181216
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.c9725a 20180225
Cylance Unsafe 20181217
Cyren W32/Emotet.KT.gen!Eldorado 20181216
DrWeb Trojan.DownLoader27.18662 20181216
Emsisoft Trojan.Autoruns.GenericKDS.31402027 (B) 20181216
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNQC 20181216
F-Prot W32/Emotet.KT.gen!Eldorado 20181216
F-Secure Trojan.Autoruns.GenericKDS.31402027 20181216
Fortinet Malicious_Behavior.SB 20181216
GData Trojan.Autoruns.GenericKDS.31402027 20181216
Ikarus Trojan-Banker.Emotet 20181216
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005434991 ) 20181216
K7GW Trojan ( 005434991 ) 20181216
Kaspersky Trojan-Banker.Win32.Emotet.bumy 20181216
Malwarebytes Trojan.Emotet.Generic 20181216
MAX malware (ai score=100) 20181217
McAfee Emotet-FJX!0023397C9133 20181216
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20181216
Microsoft Trojan:Win32/Emotet.BF 20181216
eScan Trojan.Autoruns.GenericKDS.31402027 20181216
NANO-Antivirus Trojan.Win32.Generic.fkzfig 20181216
Palo Alto Networks (Known Signatures) generic.ml 20181217
Panda Trj/GdSda.A 20181216
Qihoo-360 Win32/Trojan.632 20181217
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20181216
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181216
Symantec Trojan.Emotet 20181216
TACHYON Banker/W32.Emotet.135168.BL 20181214
Tencent Win32.Trojan-banker.Emotet.Tv 20181217
Trapmine malicious.high.ml.score 20181205
TrendMicro TrojanSpy.Win32.EMOTET.THABAOAH 20181216
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THABAOAH 20181217
VBA32 BScope.Trojan.Emotet 20181214
ViRobot Trojan.Win32.Agent.135168.FK 20181217
Webroot W32.Trojan.Emotet 20181217
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bumy 20181217
Alibaba 20180921
Arcabit 20181216
Avast-Mobile 20181216
Avira (no cloud) 20181216
Babable 20180918
Baidu 20181207
Bkav 20181214
ClamAV 20181216
CMC 20181216
eGambit 20181217
Jiangmin 20181216
Kingsoft 20181217
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181215
TheHacker 20181216
TotalDefense 20181216
Trustlook 20181217
Yandex 20181214
Zillya 20181215
Zoner 20181217
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Win
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-19 14:53:40
Entry Point 0x00003070
Number of sections 8
PE sections
PE imports
GetSecurityDescriptorGroup
ClusterRegEnumValue
ImmSetCompositionFontW
GetProcessId
GlobalAddAtomA
GetCurrentProcess
SwitchToThread
lstrcmpiA
GetCommandLineW
SetConsoleHistoryInfo
GetConsoleProcessList
GetDynamicTimeZoneInformation
VirtualAlloc
GetStdHandle
RasGetProjectionInfoW
PathIsFileSpecA
GetAsyncKeyState
EmptyClipboard
GetMenuItemRect
GetWindowThreadProcessId
GetScrollPos
PrivacySetZonePreferenceW
SCardListCardsW
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
TELUGU DEFAULT 1
ARABIC EGYPT 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Win

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x3070

MIMEType
application/octet-stream

TimeStamp
1995:11:19 06:53:40-08:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TVersion
1.7

CodeSize
12288

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 0023397c91334a77605a2454ecf21e46
SHA1 b0936dfc9725a54829bd393cc75f161c928ee21b
SHA256 f58351a7215eed6f3469e6d7e2a2f31b52b73bdf78ad16d9b1f4c0d2f0ff8044
ssdeep
1536:EgWX271G/bzjWWq7Oj2RaaaTdWaXkYQy2d2QAGf9MzeD6EBd8C+lvm4eqzdzMs:vWXU10jWWq7o2R6p42qLD6ZC+AWVN

authentihash f243c1a774c46dd27e734a6d39adf36e6fad5420f001ed807795d717a88fed78
imphash 3f9cf1ebc0bee0961d25347c97406382
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-09 12:08:34 UTC ( 2 months, 2 weeks ago )
Last submission 2018-12-22 18:07:37 UTC ( 2 months ago )
File names 413.exe
571334.exe
ROgXnNuAoB6m4ee.exe
output.114669393.txt
output.114668658.txt
0.exe
4092.exe
0023397c91334a77605a2454ecf21e46
1700046.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!