× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 021765dbaa86213681690f3b10af3fa7f85eeb61bb80bacb7ac698f5e46915a3
File name: =?UTF-8?B?7J2066+47KeAIOuCtOyaqSDrsI8g66eB7YGs7KCV66asLmRvYw==?=
Detection ratio: 26 / 58
Analysis date: 2018-12-24 04:43:12 UTC ( 4 months ago ) View latest
Antivirus Result Update
Ad-Aware VB.EmoDldr.14.Gen 20181224
ALYac VB.EmoDldr.14.Gen 20181224
Arcabit VB.EmoDldr.14.Gen 20181224
Baidu VBA.Trojan-Downloader.Agent.dsn 20181207
BitDefender VB.EmoDldr.14.Gen 20181224
ClamAV Doc.Macro.Obfuscated-6397052-2 20181224
Emsisoft VB.EmoDldr.14.Gen (B) 20181224
Endgame malicious (high confidence) 20181108
F-Secure VB.EmoDldr.14.Gen 20181224
Fortinet VBA/Agent.LMJ!tr.dldr 20181224
GData VB.EmoDldr.14.Gen 20181224
Ikarus Trojan-Downloader.VBA.Agent 20181224
K7AntiVirus Trojan ( 00536d111 ) 20181223
K7GW Trojan ( 00536d111 ) 20181223
MAX malware (ai score=87) 20181224
McAfee-GW-Edition BehavesLike.Downloader.gb 20181223
Microsoft Trojan:O97M/Sonbokli.A!cl 20181224
eScan VB.EmoDldr.14.Gen 20181224
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20181224
Qihoo-360 virus.office.qexvmc.1085 20181224
SentinelOne (Static ML) static engine - malicious 20181223
Symantec ISB.Downloader!gen60 20181224
TACHYON Suspicious/W97M.Obfus.Gen.1 20181224
Tencent Heur.Macro.Generic.Gen.a 20181224
TrendMicro HEUR_VBA.O.ELBP 20181224
Zoner Probably W97Obfuscated 20181224
Acronis 20181222
AegisLab 20181224
AhnLab-V3 20181223
Alibaba 20180921
Antiy-AVL 20181223
Avast 20181224
Avast-Mobile 20181223
AVG 20181224
Avira (no cloud) 20181223
Babable 20180918
Bkav 20181221
CAT-QuickHeal 20181223
CMC 20181223
Comodo 20181224
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181224
Cyren 20181224
DrWeb 20181224
eGambit 20181224
ESET-NOD32 20181224
F-Prot 20181224
Sophos ML 20181128
Jiangmin 20181223
Kaspersky 20181224
Kingsoft 20181224
Malwarebytes 20181224
McAfee 20181224
Palo Alto Networks (Known Signatures) 20181224
Panda 20181223
Rising 20181224
Sophos AV 20181224
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181215
TheHacker 20181220
Trapmine 20181205
TrendMicro-HouseCall 20181224
Trustlook 20181224
VBA32 20181222
ViRobot 20181223
Webroot 20181224
Yandex 20181223
Zillya 20181222
ZoneAlarm by Check Point 20181224
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May perform operations with other files.
May try to run other files, shell commands or applications.
May create OLE objects.
Seems to contain deobfuscation code.
Summary
last_author
HP
creation_datetime
2018-12-23 19:43:00
revision_number
2
author
HP
page_count
1
last_saved
2018-12-23 19:44:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
4
code_page
Korean
Document summary
line_count
1
characters_with_spaces
4
version
1048576
paragraph_count
1
code_page
Korean
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
6400
type_literal
stream
sid
26
name
\x01CompObj
size
110
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
6980
type_literal
stream
sid
1
name
Data
size
387843
type_literal
stream
sid
14
name
Macros/PROJECT
size
628
type_literal
stream
sid
15
name
Macros/PROJECTwm
size
182
type_literal
stream
sid
10
type
macro (only attributes)
name
Macros/VBA/ThisDocument
size
938
type_literal
stream
sid
11
name
Macros/VBA/_VBA_PROJECT
size
9533
type_literal
stream
sid
8
name
Macros/VBA/dir
size
982
type_literal
stream
sid
9
type
macro
name
Macros/VBA/hlnIMwtKLyA
size
2174
type_literal
stream
sid
13
type
macro
name
Macros/VBA/lGXPqdoiMEEYtWtZvoG
size
32456
type_literal
stream
sid
12
type
macro
name
Macros/VBA/mwGRUyNBCkeado
size
5484
type_literal
stream
sid
19
name
Macros/hlnIMwtKLyA/\x01CompObj
size
97
type_literal
stream
sid
20
name
Macros/hlnIMwtKLyA/\x03VBFrame
size
270
type_literal
stream
sid
17
name
Macros/hlnIMwtKLyA/f
size
38
type_literal
stream
sid
18
name
Macros/hlnIMwtKLyA/o
size
0
type_literal
stream
sid
24
name
Macros/mwGRUyNBCkeado/\x01CompObj
size
97
type_literal
stream
sid
25
name
Macros/mwGRUyNBCkeado/\x03VBFrame
size
299
type_literal
stream
sid
22
name
Macros/mwGRUyNBCkeado/f
size
138
type_literal
stream
sid
23
name
Macros/mwGRUyNBCkeado/o
size
116
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] lGXPqdoiMEEYtWtZvoG.bas Macros/VBA/lGXPqdoiMEEYtWtZvoG 19412 bytes
create-ole obfuscated
[+] mwGRUyNBCkeado.frm Macros/VBA/mwGRUyNBCkeado 2498 bytes
handle-file open-file write-file
[+] hlnIMwtKLyA.frm Macros/VBA/hlnIMwtKLyA 412 bytes
run-file
ExifTool file metadata
SharedDoc
No

Author
HP

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

LastModifiedBy
HP

HeadingPairs
????, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
4

CreateDate
2018:12:24 03:43:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 ????

ModifyDate
2018:12:24 03:44:00

Characters
4

CodePage
Windows Korean (Unified Hangul Code)

RevisionNumber
2

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
28

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar, Far east

File identification
MD5 d985e9ab7a1bf5b6a3c03efbfd210e32
SHA1 723abf80fcc289e8b41f79f002d876a97769bd38
SHA256 021765dbaa86213681690f3b10af3fa7f85eeb61bb80bacb7ac698f5e46915a3
ssdeep
6144:YXKoMFWPXikY7GmT7VCIsUQ+4h+XUK7FfaL2JY4LdAFGcuwJBAl8uQvkVtwR22Pe:YXKoMFH9GoUUQfUNZa6JY8X8JM8rQ0Q

File size 460.0 KB ( 471040 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 949, Author: HP, Template: Normal.dotm, Last Saved By: HP, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Dec 23 03:43:00 2018, Last Saved Time/Date: Sun Dec 23 03:44:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 4, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated open-file handle-file doc run-file macros write-file create-ole

VirusTotal metadata
First submission 2018-12-24 04:43:12 UTC ( 4 months ago )
Last submission 2018-12-24 04:43:12 UTC ( 4 months ago )
File names =?UTF-8?B?7J2066+47KeAIOuCtOyaqSDrsI8g66eB7YGs7KCV66asLmRvYw==?=
%EC%9D%B4%EB%AF%B8%EC%A7%80%20%EB%82%B4%EC%9A%A9%20%EB%B0%8F%20%EB%A7%81%ED%81%AC%EC%A0%95%EB%A6%AC.doc
??? ?? ? ????.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!