× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fce3fef3ecb30e3dd10c4a0b80eb62f2e98a4892aee81f7660e2f125a9f2f17b
File name: fce3fef3ecb30e3dd10c4a0b80eb62f2e98a4892aee81f7660e2f125a9f2f17b
Detection ratio: 25 / 67
Analysis date: 2018-11-17 18:46:10 UTC ( 3 months ago ) View latest
Antivirus Result Update
AegisLab Trojan.Win32.Generic.4!c 20181117
AhnLab-V3 Trojan/Win32.Emotet.R243857 20181117
Avast Win32:BankerX-gen [Trj] 20181117
AVG Win32:BankerX-gen [Trj] 20181117
Bkav HW32.Packed. 20181116
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.3de306 20180225
Cylance Unsafe 20181117
eGambit Unsafe.AI_Score_94% 20181117
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CRJE 20181117
Fortinet W32/GenKryptik.CRJE!tr 20181117
GData Win32.Trojan-Spy.Emotet.1TH8SP 20181117
Sophos ML heuristic 20181108
Kaspersky Trojan-Banker.Win32.Emotet.bqlq 20181117
MAX malware (ai score=99) 20181117
McAfee Artemis!FB66491A1290 20181117
Microsoft Trojan:Win32/Emotet.AC!bit 20181117
NANO-Antivirus Virus.Win32.Gen.ccmw 20181117
Palo Alto Networks (Known Signatures) generic.ml 20181117
Qihoo-360 HEUR/QVM20.1.4382.Malware.Gen 20181117
Rising Trojan.Kryptik!1.B4D6 (CLASSIC) 20181117
Symantec ML.Attribute.HighConfidence 20181117
Webroot W32.Trojan.Emotet 20181117
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bqlq 20181117
Ad-Aware 20181117
Alibaba 20180921
ALYac 20181117
Antiy-AVL 20181117
Arcabit 20181117
Avast-Mobile 20181117
Avira (no cloud) 20181117
Babable 20180918
Baidu 20181116
BitDefender 20181117
CAT-QuickHeal 20181117
ClamAV 20181117
CMC 20181117
Cyren 20181117
DrWeb 20181117
Emsisoft 20181117
F-Prot 20181117
F-Secure 20181117
Ikarus 20181117
Jiangmin 20181117
K7AntiVirus 20181117
K7GW 20181117
Kingsoft 20181117
Malwarebytes 20181117
McAfee-GW-Edition 20181117
eScan 20181117
Panda 20181117
SentinelOne (Static ML) 20181011
Sophos AV 20181117
SUPERAntiSpyware 20181114
Symantec Mobile Insight 20181108
TACHYON 20181117
Tencent 20181117
TheHacker 20181117
TotalDefense 20181117
TrendMicro 20181117
TrendMicro-HouseCall 20181117
Trustlook 20181117
VBA32 20181116
ViRobot 20181117
Yandex 20181116
Zillya 20181116
Zoner 20181117
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Internal name sims
Description Poomare
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1996-06-16 22:07:08
Entry Point 0x00003450
Number of sections 6
PE sections
PE imports
PrivilegeCheck
RegFlushKey
SetConsoleCP
SetUserGeoID
GetNumaHighestNodeNumber
GetCommandLineW
GetProcessVersion
SetEndOfFile
SetConsoleCursorPosition
GetSystemTimes
FillConsoleOutputCharacterW
IsValidLanguageGroup
GetLocalTime
IsPwrHibernateAllowed
ExtractIconW
PathMakePrettyW
GetCursorPos
GetKeyboardType
IsDlgButtonChecked
DdeAbandonTransaction
SCardConnectA
Number of PE resources by type
RT_STRING 3
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
1.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Poomare

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x3450

MIMEType
application/octet-stream

TimeStamp
1996:06:17 00:07:08+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
sims

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Micr

TVersion
1.0

CodeSize
12288

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 fb66491a1290a9ad50d8b370033a485a
SHA1 d52ec8b3de30687ad56315890494f45ee9e3d362
SHA256 fce3fef3ecb30e3dd10c4a0b80eb62f2e98a4892aee81f7660e2f125a9f2f17b
ssdeep
1536:PVL5Y9teEL6h42397JuAfy/+w1qadxTbqrRyARc6y9IhCveU7kKler:PLY9UE64897J5q/+6qaXTR9IwHer

authentihash 9941b3ef6627f23ee948250d25b46e03e4c1731e3b4f32e42746935de54da4db
imphash a41d079f860890f14997a7bb0aa6b3d6
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-17 09:23:59 UTC ( 3 months ago )
Last submission 2018-11-23 05:23:01 UTC ( 2 months, 3 weeks ago )
File names sims
fb66491a1290a9ad50d8b370033a485a
T3dD8KKiyYwhLMRi.exe
cuq.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Runtime DLLs