| N/A | |
| Zip archive data, at least v2.0 to extract | 74036 |
| N/A | |
| 00e27b747581ec298c0dbc6ad05c620d | |
| ed8661b35233435646b87c669bcaeb323b0c112d | |
| 668ac3688f47d84465987cc661fca9e3831a7a463eecb9f1351ab159c38a2c84 | |
| N/A | |
| N/A | |
| N/A | |
| N/A | |
| Deflated | |
| application/zip | |
| N/A | |
| 73730 | |
| 0x4ca53751 | |
| 243641 | |
| ZIP | |
| 72 kB | |
| Dhl_Status_4848596765019914__Id10__6601009239842402AXYLJ____LS__LRC__S11_06_2015___atdeDHL_HHF235115.exe | |
| 20 | |
| Source: |

| ALYac | Trojan.Agent.BKKT |
| AVware | Trojan.Win32.Generic!BT |
| Ad-Aware | Trojan.GenericKD.2480952 |
| Antiy-AVL | Trojan/Win32.VBKrypt |
| Arcabit | Trojan.Generic.D25DB38 |
| Avast | Win32:Malware-gen |
| Avira | TR/Dropper.VB.1724 |
| Baidu-International | Trojan.Win32.VBKrypt.vppq |
| BitDefender | Trojan.GenericKD.2480952 |
| ClamAV | Suspect.Bredozip-zippwd-2 |
| Cyren | W32/Trojan.WCLC-4176 |
| DrWeb | Trojan.Emotet.108 |
| ESET-NOD32 | Win32/Emotet.AD |
| Emsisoft | Trojan.GenericKD.2480952 (B) |
| F-Secure | Trojan.GenericKD.2480952 |
| Fortinet | W32/VBKrypt.AD!tr |
| GData | Trojan.GenericKD.2480952 |
| Ikarus | Trojan.Inject |
| K7AntiVirus | Trojan ( 004b8c611 ) |
| K7GW | Trojan ( 004b8c611 ) |
| Kaspersky | Trojan.Win32.VBKrypt.vppq |
| Malwarebytes | Trojan.Agent.HDL |
| McAfee | Emotet-CJ!heur!00E27B747581 |
| McAfee-GW-Edition | Artemis!Trojan |
| MicroWorld-eScan | Trojan.GenericKD.2480952 |
| Microsoft | Trojan:Win32/Emotet.G |
| Panda | Trj/Genetic.gen |
| Qihoo-360 | Win32/Trojan.2cf |
| Sophos | Troj/Invo-Zip |
| Symantec | W32.Cridex.B |
| TrendMicro | TSPY_EMOTET.CC |
| TrendMicro-HouseCall | Suspicious_GEN.F47V0612 |
| VIPRE | Trojan.Win32.Generic!BT |
| nProtect | Trojan.GenericKD.2480952 |