× Cookie が無効になっています。 このサイトを正しく動作させるには、Cookie を有効にする必要があります
SHA256: c04da2aff5fa3cf046b56a01a17475063e0f9c104c07abb647716818b0c95b64
ファイル名: emotet_e1_c04da2aff5fa3cf046b56a01a17475063e0f9c104c07abb64771681...
検出率: 46 / 69
分析日時: 2019-02-16 18:40:24 UTC (3 ヶ月, 1 週間前)
ウイルス対策ソフト 結果 更新日
Acronis suspicious 20190213
Ad-Aware Trojan.GenericKD.31695867 20190216
AhnLab-V3 Trojan/Win32.Emotet.R255535 20190216
ALYac Trojan.Agent.Emotet 20190216
Arcabit Trojan.Generic.D1E3A3FB 20190216
Avast Win32:BankerX-gen [Trj] 20190216
AVG Win32:BankerX-gen [Trj] 20190216
Avira (no cloud) TR/AD.Emotet.vctqk 20190216
BitDefender Trojan.GenericKD.31695867 20190216
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.077a37 20190109
Cylance Unsafe 20190216
Cyren W32/Emotet.OZ.gen!Eldorado 20190216
eGambit Unsafe.AI_Score_51% 20190216
Emsisoft Trojan.GenericKD.31695867 (B) 20190216
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/GenKryptik.CZMT 20190216
F-Prot W32/Emotet.OZ.gen!Eldorado 20190216
F-Secure Trojan.TR/AD.Emotet.vctqk 20190216
Fortinet W32/Emotet.CZMT!tr 20190216
GData Trojan.GenericKD.31695867 20190216
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 00547c0a1 ) 20190216
K7GW Trojan ( 00547c0a1 ) 20190216
Kaspersky Trojan-Banker.Win32.Emotet.cgjy 20190216
Malwarebytes Trojan.Emotet 20190216
McAfee Emotet-FLR!6C694BBA775D 20190216
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dc 20190216
Microsoft Trojan:Win32/Emotet.AC!bit 20190215
eScan Trojan.GenericKD.31695867 20190216
NANO-Antivirus Virus.Win32.Gen.ccmw 20190216
Palo Alto Networks (Known Signatures) generic.ml 20190216
Panda Trj/GdSda.A 20190215
Qihoo-360 Win32/Trojan.b73 20190216
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20190216
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/EncPk-AOI 20190216
Symantec Trojan.Gen.2 20190215
Tencent Win32.Trojan-banker.Emotet.Wqnh 20190216
Trapmine malicious.moderate.ml.score 20190123
TrendMicro TrojanSpy.Win32.EMOTET.SMR1.hp 20190216
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMR1.hp 20190216
VBA32 BScope.Trojan.Refinka 20190215
ViRobot Trojan.Win32.Z.Emotet.215040.D 20190216
Webroot W32.Malware.Gen 20190216
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cgjy 20190216
AegisLab 20190216
Alibaba 20180921
Antiy-AVL 20190216
Avast-Mobile 20190216
Babable 20180917
Baidu 20190214
Bkav 20190215
CAT-QuickHeal 20190216
ClamAV 20190216
CMC 20190215
Comodo 20190216
DrWeb 20190216
Ikarus 20190216
Jiangmin 20190216
Kingsoft 20190216
MAX 20190216
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190206
TACHYON 20190215
TheHacker 20190215
TotalDefense 20190216
Trustlook 20190216
Yandex 20190215
Zillya 20190215
Zoner 20190216
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-14 21:42:33
Entry Point 0x0000244B
Number of sections 4
PE sections
PE imports
ImpersonateSelf
LogonUserW
IsTokenRestricted
AVIStreamInfoW
CM_Get_DevNode_Custom_PropertyW
RestoreDC
GetViewportExtEx
GdiSetBatchLimit
DeleteEnhMetaFile
OpenFileById
FlushProcessWriteBuffers
ResumeThread
ApplicationRecoveryInProgress
lstrlenA
GetOverlappedResult
OpenEventW
GetModuleHandleW
GetOEMCP
Sleep
IsProcessorFeaturePresent
CancelSynchronousIo
SleepEx
GetBinaryTypeA
DsBindWithCredW
DsFreeDomainControllerInfoW
VarCyMul
I_RpcSend
RpcStringFreeW
SetupGetFileCompressionInfoW
StrStrIW
QueryContextAttributesW
wsprintfA
UpdateWindow
GetScrollInfo
DdeSetUserHandle
DdeCreateDataHandle
LogicalToPhysicalPoint
LockSetForegroundWindow
GetMenuItemID
DestroyWindow
FindCloseUrlCache
InternetInitializeAutoProxyDll
SCardBeginTransaction
SCardSetCardTypeProviderNameA
memset
_localtime64
_time64
OleCreateLinkFromData
HlinkSimpleNavigateToString
CoInternetIsFeatureEnabled
Number of PE resources by type
RT_DIALOG 51
RT_GROUP_CURSOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_MENU 1
Number of PE resources by language
ENGLISH US 55
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:02:14 13:42:33-08:00

FileType
Win32 EXE

PEType
PE32

CodeSize
166400

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x244b

InitializedDataSize
56320

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 6c694bba775d9b4d7864ced476d4c5e6
SHA1 9cc6c45077a3703e2862175950c70a72ca81dee3
SHA256 c04da2aff5fa3cf046b56a01a17475063e0f9c104c07abb647716818b0c95b64
ssdeep
3072:jGqRXKUnHVnfM3m9ibE+uSY/E1yYPAqCt0iDNIkz6n52oigI75ehCb2dbLriMosa:jG2n1EWEo5E1FIqm0iDNIkz6DC

authentihash b06b643e61e028b12126663c2de1a1dfcfabc5b96a6a8d956f4309435195c773
imphash 138efea1e11e5a9a3c9f692a82eb7235
File size 210.0 KB ( 215040 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-14 21:48:50 UTC (3 ヶ月, 1 週間前)
Last submission 2019-02-14 22:39:06 UTC (3 ヶ月, 1 週間前)
ファイル名 De3AggU4ny.exe
SwMyPImC9U3.exe
zkzy3CNez.exe
emotet_e1_c04da2aff5fa3cf046b56a01a17475063e0f9c104c07abb647716818b0c95b64_2019-02-14__215001.exe_
コメントはありません. この項目について、VirusTotal コミュニティのメンバーはまだ誰もコメントしていません。是非、コメントしてください。

コメントを投稿してください...

?
コメントを投稿

サインインしていません。登録ユーザーのみがコメントを投稿できます。サインインして意見をお聞かせください。

投票はありません. この項目に対してまだ誰も投票していません。是非、投票してください。