N/A | |
Zip archive data, at least v2.0 to extract | 74026 |
N/A | |
1ea7283d92a1117ec044d44bbbce2f3a | |
dfd34b6c9dc6106e566c60e02cd5433afc6ed93e | |
8fdf545a4d0931e997f7c141fe1daaf26aed889d68553e8bbbcbdbf4e957f07b | |
N/A | |
N/A | |
N/A | |
N/A | |
Deflated | |
application/zip | |
N/A | |
73720 | |
0xc6c964e9 | |
243641 | |
ZIP | |
72 kB | |
Dhl_Status_3017390406853842__Id10__5069510040051125DXEVL____JQ__IRO__L11_06_2015___atdeDHL_DXE235115.exe | |
20 | |
Source: |
Arcabit | Trojan.Agent.BKKT |
Avira | TR/Dropper.VB.1720 |
Baidu-International | Trojan.Win32.VBKrypt.vppq |
BitDefender | Trojan.Agent.BKKT |
ClamAV | Suspect.Bredozip-zippwd-2 |
ESET-NOD32 | Win32/Emotet.AD |
Emsisoft | Trojan.Agent.BKKT (B) |
GData | Archive.Malware.FakeInvoice.A@gen |
Kaspersky | Trojan.Win32.VBKrypt.vppq |
McAfee | Emotet-FGNI!4149846D0C5A |
McAfee-GW-Edition | Artemis |
MicroWorld-eScan | Trojan.Agent.BKKT |
Microsoft | Trojan:Win32/Emotet.G |
Panda | Trj/Genetic.gen |
Qihoo-360 | Win32/Trojan.Multi.daf |
Sophos | Troj/Invo-Zip |
Symantec | W32.Cridex.B |
TrendMicro | TSPY_EMOTET.XXSI |
TrendMicro-HouseCall | TSPY_EMOTET.XXSI |