× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6c654921074a82ff6f4a6309b5dfa94587efcb81cd3d8559eac3488102f51d0a
File name: invoice17731.doc
Detection ratio: 10 / 47
Analysis date: 2013-11-06 14:08:13 UTC ( 5 years, 6 months ago ) View latest
Antivirus Result Update
BitDefender Exploit.CVE-2012-0158.Gen 20131106
Bkav Exploit.CVE-2012-0158.Heur 20131106
Emsisoft Exploit.CVE-2012-0158.Gen (B) 20131106
F-Secure Exploit.CVE-2012-0158.Gen 20131106
GData Exploit.CVE-2012-0158.Gen 20131106
Kaspersky Exploit.Win32.CVE-2012-0158.aq 20131106
eScan Exploit.CVE-2012-0158.Gen 20131106
nProtect Exploit.CVE-2012-0158.Gen 20131106
TrendMicro HEUR_RTFMALFORME 20131106
TrendMicro-HouseCall TROJ_GEN.F47V1106 20131106
Yandex 20131105
AhnLab-V3 20131106
AntiVir 20131106
Antiy-AVL 20131101
Avast 20131106
AVG 20131106
Baidu-International 20131106
ByteHero 20131105
CAT-QuickHeal 20131106
ClamAV 20131106
Commtouch 20131106
Comodo 20131106
DrWeb 20131106
ESET-NOD32 20131106
F-Prot 20131106
Fortinet 20131106
Ikarus 20131106
Jiangmin 20131106
K7AntiVirus 20131105
K7GW 20131105
Kingsoft 20130829
Malwarebytes 20131106
McAfee 20131106
McAfee-GW-Edition 20131105
Microsoft 20131106
NANO-Antivirus 20131106
Norman 20131106
Panda 20131106
Rising 20131106
Sophos AV 20131106
SUPERAntiSpyware 20131106
Symantec 20131106
TheHacker 20131106
TotalDefense 20131105
VBA32 20131106
VIPRE 20131106
ViRobot 20131106
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
0
Embedded drawings
0
Rtf header
rtA1
Default ansi codepage
Cyrillic
Generator
Msftedit 5.41.21.2510
Read only protection
False
User protection
False
Default character set
ANSI
Custom xml data properties
0
Dos stubs
0
Objects
OLE embedded (Package)
OLE control (Package)
Embedded pictures
0
Longest hex string
285440
Default languages
Russian
ExifTool file metadata
FileAccessDate
2015:01:27 17:34:32+01:00

FileCreateDate
2015:01:27 17:34:32+01:00

File identification
MD5 b20d0254faedc6608d640290aeb20b4a
SHA1 33a2de5d0d2df304d5e1180c1811302084dc836c
SHA256 6c654921074a82ff6f4a6309b5dfa94587efcb81cd3d8559eac3488102f51d0a
ssdeep
3072:1t04AhItHwPkQBv2cBQYikMShEsuNBkN55ecn1DpUR5kEYf4sfdO+bK+XZHLwNmT:zIhIuPsXYikJuHkNDpUYEYNfxT

File size 297.1 KB ( 304267 bytes )
File type Rich Text Format
Magic literal
ASCII text, with CRLF line terminators

TrID Unknown!
Tags
ole-embedded rtf cve-2012-0158 ole-control exploit attachment

VirusTotal metadata
First submission 2013-11-06 09:40:56 UTC ( 5 years, 6 months ago )
Last submission 2018-05-30 01:11:02 UTC ( 11 months, 3 weeks ago )
File names sample.doc
customer.php
16784625
invoiceCM0V9ORWJF23KX8PAP.doc
invoice17731.doc
invoiceCM0V9ORWJF23KX8PAP.do_
invoiceCM0V9ORWJF23KX8PAP.doc
File_0.ok
invoiceCM0V9ORWJF23KX8PAP.doc_000147356_E__Mau forum nuoc ngoai_mau dac biet.doc
customer.php@h=a3lsZXN0ZXZlbnNvbkBvdXRsb29rLmNvbQ0K
6c654921074a82ff6f4a6309b5dfa94587efcb81cd3d8559eac3488102f51d0a
ilORWJF23KX8PAP.doc
invoiceCM0V9ORWJF23KX8PAP.doc
invoiceCM0V9ORWJF23KX8PAP-2.doc
b20d0254faedc6608d640290aeb20b4a.doc
invoiceCM0V9ORWJF23KX8PAP.doc
sample.dat
invoiceCM0V9ORWJF23KX8PAP.doc
invoiceCM0V9ORWJF23KX8PAP.txt
output.16784625.txt
careful.doc.z
customer.php?h=a2VuLmh1YW5nQGNnaWZlZGVyYWwuY29tDQo=
mal.docx
invoiceCM0V9ORWJF23KX28PAP.doc
123word (5).doc
ExifTool file metadata
FileAccessDate
2015:01:27 17:34:32+01:00

FileCreateDate
2015:01:27 17:34:32+01:00

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!