× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: 2450e73a232c6cbddf70add62265297de0c5f393b69fe28c8c684572fd0f8e3e
Dateiname: emotet_e2_2450e73a232c6cbddf70add62265297de0c5f393b69fe28c8c68457...
Erkennungsrate: 42 / 59
Analyse-Datum: 2018-12-10 04:22:09 UTC ( vor 4 Monate, 1 Woche ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
Ad-Aware VB:Trojan.Agent.DKVN 20181210
AegisLab Trojan.MSOffice.SLoad.4!c 20181209
AhnLab-V3 VBA/Downloader 20181209
ALYac VB:Trojan.Agent.DKVN 20181210
Antiy-AVL Trojan[Downloader]/MSOffice.Agent.lqm 20181209
Arcabit HEUR.VBA.Trojan.e 20181210
Avast Other:Malware-gen [Trj] 20181210
AVG Other:Malware-gen [Trj] 20181210
Avira (no cloud) W97M/Agent.01839153 20181209
Baidu VBA.Trojan-Downloader.Agent.duz 20181207
BitDefender VB:Trojan.Agent.DKVN 20181210
CAT-QuickHeal W97M.Emotet.33538 20181209
ClamAV Doc.Downloader.Generic-6773945-0 20181209
Comodo Malware@#1sj31byg1md0o 20181210
Cyren W97M/Downldr.C.gen!Eldorado 20181210
DrWeb Exploit.Siggen.16590 20181210
Emsisoft Trojan-Downloader.Macro.Generic.L (A) 20181210
Endgame malicious (high confidence) 20181108
ESET-NOD32 VBA/TrojanDownloader.Agent.LQM 20181210
F-Secure VB:Trojan.Agent.DKVN 20181210
Fortinet VBA/Agent.60A1!tr.dldr 20181210
GData Macro.Trojan-Downloader.Shallow.S 20181210
Ikarus Trojan.VBA.Agent 20181209
K7AntiVirus Trojan ( 0001140e1 ) 20181209
K7GW Trojan ( 0001140e1 ) 20181209
Kaspersky HEUR:Trojan-Downloader.MSOffice.SLoad.gen 20181210
McAfee W97M/Downloader.ga 20181210
McAfee-GW-Edition BehavesLike.Downloader.cg 20181209
Microsoft Trojan:O97M/Obfuse.BG 20181209
eScan VB:Trojan.Agent.DKVN 20181210
Qihoo-360 virus.office.qexvmc.1075 20181210
Rising Trojan.Obfuse!8.10126 (TOPIS:GzVd6rRPD1I) 20181210
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Troj/DocDl-QXH 20181210
Symantec W97M.Downloader 20181209
TACHYON Suspicious/W97M.Obfus.Gen.6 20181210
Tencent Heur.Macro.Generic.Gen.h 20181210
TrendMicro Trojan.W97M.POWLOAD.ABOEAI 20181210
TrendMicro-HouseCall Trojan.W97M.POWLOAD.ABOEAI 20181210
ViRobot DOC.Z.Agent.140544.Q 20181209
ZoneAlarm by Check Point HEUR:Trojan-Downloader.MSOffice.SLoad.gen 20181210
Zoner Probably W97Obfuscated 20181207
Alibaba 20180921
Avast-Mobile 20181209
Babable 20180918
Bkav 20181208
CMC 20181209
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181210
eGambit 20181210
F-Prot 20181210
Sophos ML 20181128
Jiangmin 20181210
Kingsoft 20181210
Malwarebytes 20181210
MAX 20181210
NANO-Antivirus 20181210
Palo Alto Networks (Known Signatures) 20181210
Panda 20181209
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181207
TheHacker 20181202
TotalDefense 20181209
Trapmine 20181205
Trustlook 20181210
VBA32 20181207
Webroot 20181210
Yandex 20181207
Zillya 20181208
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-12-05 09:20:00
template
Normal.dotm
page_count
1
last_saved
2018-12-05 09:20:00
word_count
3
revision_number
1
application_name
Microsoft Office Word
character_count
18
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
20
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
3008
type_literal
stream
size
114
name
\x01CompObj
sid
17
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
9325
name
1Table
sid
2
type_literal
stream
size
81766
name
Data
sid
1
type_literal
stream
size
403
name
Macros/PROJECT
sid
16
type_literal
stream
size
47
name
Macros/PROJECTwm
sid
15
type_literal
stream
size
7176
name
Macros/VBA/_VBA_PROJECT
sid
11
type_literal
stream
size
1196
name
Macros/VBA/__SRP_0
sid
13
type_literal
stream
size
102
name
Macros/VBA/__SRP_1
sid
14
type_literal
stream
size
304
name
Macros/VBA/__SRP_2
sid
9
type_literal
stream
size
103
name
Macros/VBA/__SRP_3
sid
10
type_literal
stream
size
523
name
Macros/VBA/dir
sid
12
type_literal
stream
size
11503
type
macro
name
Macros/VBA/fqccqJYYpXCuhi
sid
8
type_literal
stream
size
5166
name
WordDocument
sid
3
Macros and VBA code streams
[+] fqccqJYYpXCuhi.cls Macros/VBA/fqccqJYYpXCuhi 5959 bytes
obfuscated run-file
ExifTool file metadata
SharedDoc
No

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
20

CreateDate
2018:12:05 08:20:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:12:05 08:20:00

ScaleCrop
No

Characters
18

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
3

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 4f932bb0d98e4c03004e0ad94e55ee25
SHA1 ef9bd7b56d1b6fe33c24f8b494d22e308c5c4543
SHA256 2450e73a232c6cbddf70add62265297de0c5f393b69fe28c8c684572fd0f8e3e
ssdeep
1536:c81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadf+a9xv8PhcdU2:c8GhDS0o9zTGOZD6EbzCdjucdU2

File size 137.3 KB ( 140544 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Dec 04 08:20:00 2018, Last Saved Time/Date: Tue Dec 04 08:20:00 2018, Number of Pages: 1, Number of Words: 3, Number of Characters: 18, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc

VirusTotal metadata
First submission 2018-12-05 08:38:21 UTC ( vor 4 Monate, 2 Wochen )
Last submission 2018-12-12 08:10:11 UTC ( vor 4 Monate, 1 Woche )
Dateinamen 2018_12Details_zur_Transaktion.doc
2018_12Informationen_betreffend_Transaktion.doc
emotet_e2_2450e73a232c6cbddf70add62265297de0c5f393b69fe28c8c684572fd0f8e3e_2018-12-05__08:40:47.doc
RE096360-7.doc
Rechnungsbeilage_2018_12.doc
2018_12Informationen_bzgl_Transaktion.doc
2018_12Details_bzgl_Transaktion.doc
Status-zu-Sendung-472273530957.doc
Status-zu-Sendung-558745759527.doc
RE084919_6.doc
Rechnungsbeilage_05_12_2018.doc
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!