Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2019-Feb-01 19:40:43 |
Detected languages |
English - United States
|
Comments | Built-in compression |
CompanyName | Microsoft Corporation |
FileDescription | lispfile |
FileVersion | 2.0 |
InternalName | amstoune |
LegalCopyright | Copyright © 1995 Microsoft Corporation |
OriginalFilename | kbdinguj.dl |
ProductName | |
rosoft® W | tore |
ProductVersion | 6. |
Info | Matching compiler(s): | MASM/TASM - sig1(h) |
Info | Libraries used to perform cryptographic operations: | Microsoft's Cryptography API |
Malicious | The file headers were tampered with. | The RICH header checksum is invalid. |
Suspicious | The PE contains functions most legitimate programs don't use. |
Uses Microsoft's cryptographic API:
|
Suspicious | The file contains overlay data. |
121560 bytes of data starting at offset 0x4528.
The overlay data has an entropy of 7.51767 and is possibly compressed or encrypted. Overlay data amounts for 87.2875% of the executable. |
Malicious | VirusTotal score: 47/70 (Scanned on 2019-02-08 14:26:47) |
Bkav:
HW32.Packed.
MicroWorld-eScan: Trojan.GenericKD.31618437 CAT-QuickHeal: Trojan.Emotet McAfee: Emotet-FLI!9F58AF0317A7 Cylance: Unsafe K7GW: Trojan ( 00546d1d1 ) K7AntiVirus: Trojan ( 00546d1d1 ) Invincea: heuristic Symantec: Trojan.Emotet TrendMicro-HouseCall: TROJ_GEN.R03FC0DB219 Paloalto: generic.ml Kaspersky: Trojan-Banker.Win32.Emotet.cdeq BitDefender: Trojan.GenericKD.31618437 NANO-Antivirus: Trojan.Win32.EmotetENT.fmpqec Avast: Win32:BankerX-gen [Trj] Tencent: Win32.Trojan-banker.Emotet.Hwcu Ad-Aware: Trojan.GenericKD.31618437 Emsisoft: Trojan.GenericKD.31618437 (B) Comodo: Malware@#ycuqajzvgnn7 DrWeb: Trojan.EmotetENT.372 Zillya: Trojan.Kryptik.Win32.1575124 TrendMicro: TROJ_GEN.R03FC0DB219 McAfee-GW-Edition: BehavesLike.Win32.Emotet.cc Trapmine: malicious.moderate.ml.score SentinelOne: static engine - malicious Cyren: W32/Trojan.OQDM-7903 Webroot: W32.Trojan.Emotet Fortinet: W32/Fareit.L Endgame: malicious (high confidence) Arcabit: Trojan.Generic.D1E27585 ZoneAlarm: Trojan-Banker.Win32.Emotet.cdeq Microsoft: Trojan:Win32/Emotet!rfn Sophos: Mal/Emotet-Q AhnLab-V3: Trojan/Win32.Emotet.R254353 Acronis: suspicious VBA32: TScope.Malware-Cryptor.SB ALYac: Trojan.Agent.Emotet MAX: malware (ai score=100) Malwarebytes: Trojan.Emotet ESET-NOD32: a variant of Win32/Kryptik.GPGZ Rising: Malware.Heuristic.MLite(100%) (AI-LITE:Kk25qDiRi1j9SyH5HnA40g) Ikarus: Trojan-Banker.Emotet GData: Trojan.GenericKD.31618437 AVG: Win32:BankerX-gen [Trj] Panda: Trj/GdSda.A CrowdStrike: malicious_confidence_100% (W) Qihoo-360: Win32/Trojan.e7f |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xc4 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 5 |
TimeDateStamp | 2019-Feb-01 19:40:43 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
|
Magic | PE32 |
---|---|
LinkerVersion | 12.0 |
SizeOfCode | 0x3000 |
SizeOfInitializedData | 0x1000 |
SizeOfUninitializedData | 0x19000 |
AddressOfEntryPoint | 0x00002705 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x4000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x1000 |
OperatingSystemVersion | 6.0 |
ImageVersion | 6.0 |
SubsystemVersion | 6.1 |
Win32VersionValue | 0 |
SizeOfImage | 0x23000 |
SizeOfHeaders | 0x1000 |
Checksum | 0xcdd86667 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
WS2_32.dll |
#112
|
---|---|
ADVAPI32.dll |
IsTokenRestricted
GetSecurityDescriptorControl |
WINMM.dll |
mixerGetControlDetailsW
|
KERNEL32.dll |
GetCommandLineW
GetCurrentProcessId GetThreadLocale GetTapePosition CloseHandle Heap32Next GetComputerNameA ReadConsoleA |
IMM32.dll |
ImmGetCandidateListW
|
CRYPT32.dll |
CryptProtectData
|
USER32.dll |
GetDesktopWindow
UserHandleGrantAccess GetIconInfo UnhookWinEvent |
SHLWAPI.dll |
PathGetDriveNumberW
|
GDI32.dll |
GetPath
SelectObject |
WinSCard.dll |
SCardGetStatusChangeA
|
ole32.dll |
CoFileTimeNow
|
POWRPROF.dll |
GetActivePwrScheme
|
msvcrt.dll |
memset
|
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 2.0.0.2 |
ProductVersion | 2.0.2.0 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
FileType |
VFT_DLL
|
Language | English - United States |
Comments | Built-in compression |
CompanyName | Microsoft Corporation |
FileDescription | lispfile |
FileVersion (#2) | 2.0 |
InternalName | amstoune |
LegalCopyright | Copyright © 1995 Microsoft Corporation |
OriginalFilename | kbdinguj.dl |
ProductName | |
rosoft® W | tore |
ProductVersion (#2) | 6. |
Resource LangID | UNKNOWN |
---|
Characteristics |
37527754
|
---|---|
TimeDateStamp | 2077-Nov-10 06:37:34 |
Version | 34697.13672 |
SizeofData | 3843880519 |
AddressOfRawData | 0x52973ee5 |
PointerToRawData | 0xf53f7c43 |
Characteristics |
1370484768
|
---|---|
TimeDateStamp | 2014-Aug-23 03:04:45 |
Version | 65418.19839 |
SizeofData | 1533991832 |
AddressOfRawData | 0x19bad29 |
PointerToRawData | 0x5db08b44 |
XOR Key | 0x4fa4adae |
---|---|
Unmarked objects | 0 |
Imports (VS2015 UPD1 build 23506) | 11246875 |
Imports (VS97 SP3 link 5.10.7303) | 13429659 |
Exports (VS2013 build 21005) | 16735890 |
Resource objects (VS2002 (.NET) build 9466) | 10133273 |
Linker (VS2002 (.NET) build 9466) | 9654814 |