SHA256: | 0e3b855543dedde6bb3ee864cb37816241b445739fc12ae61c96e5ee73789739 |
File name: | a989c362a234593a07a7d7876b5df0547d237b92 |
Detection ratio: | 37 / 62 |
Analysis date: | 2018-04-21 07:05:28 UTC ( 10 months ago ) View latest |
Antivirus | Result | Update |
---|---|---|
Ad-Aware | VB:Trojan.Downloader.JUFQ | 20180421 |
AegisLab | Vba.Gen!c | 20180420 |
ALYac | Trojan.Downloader.VBA.gen | 20180421 |
Arcabit | HEUR.VBA.Trojan.e | 20180421 |
Avast | Other:Malware-gen [Trj] | 20180421 |
AVG | Other:Malware-gen [Trj] | 20180421 |
Avira (no cloud) | TR/Dldr.Mtnet | 20180421 |
AVware | LooksLike.Macro.Malware.k (v) | 20180421 |
Baidu | VBA.Trojan-Downloader.Agent.cpw | 20180419 |
BitDefender | VB:Trojan.Downloader.JUFQ | 20180421 |
ClamAV | Doc.Dropper.Agent-6502340-0 | 20180420 |
Cyren | W97M/Agent | 20180421 |
Emsisoft | VB:Trojan.Downloader.JUFQ (B) | 20180421 |
ESET-NOD32 | VBA/TrojanDownloader.Agent.HPR | 20180421 |
F-Prot | New or modified W97M/Agent | 20180421 |
F-Secure | VB:Trojan.Downloader.JUFQ | 20180421 |
Fortinet | VBA/Agent.HQO!tr.dldr | 20180421 |
GData | VB:Trojan.Downloader.JUFQ | 20180421 |
Ikarus | Trojan.VBA.Agent | 20180420 |
Kaspersky | HEUR:Trojan.Script.Agent.gen | 20180421 |
MAX | malware (ai score=98) | 20180421 |
McAfee | RDN/Generic Downloader.x | 20180421 |
McAfee-GW-Edition | BehavesLike.Downloader.cg | 20180420 |
Microsoft | Trojan:Win32/Occamy.A | 20180421 |
eScan | VB:Trojan.Downloader.JUFQ | 20180421 |
NANO-Antivirus | Trojan.Ole2.Vbs-heuristic.druvzi | 20180421 |
nProtect | Suspicious/W97M.Obfus.Gen | 20180421 |
Qihoo-360 | virus.office.obfuscated.1 | 20180421 |
Sophos AV | Troj/DocDl-NIV | 20180421 |
Symantec | W97M.Downloader | 20180420 |
Tencent | Win32.Trojan-downloader.Agent.Wpth | 20180421 |
TrendMicro | W2KM_POWLOAD.UHAOEDX | 20180421 |
TrendMicro-HouseCall | W2KM_POWLOAD.UHAOEDX | 20180421 |
VIPRE | LooksLike.Macro.Malware.k (v) | 20180421 |
ViRobot | DOC.Z.Agent.169472.GG | 20180421 |
ZoneAlarm by Check Point | HEUR:Trojan.Script.Agent.gen | 20180421 |
Zoner | Probably W97Obfuscated | 20180421 |
AhnLab-V3 | 20180420 | |
Alibaba | 20180420 | |
Antiy-AVL | 20180418 | |
Avast-Mobile | 20180420 | |
Babable | 20180406 | |
Bkav | 20180410 | |
CAT-QuickHeal | 20180419 | |
CMC | 20180420 | |
Comodo | 20180421 | |
CrowdStrike Falcon (ML) | 20180418 | |
Cybereason | None | |
Cylance | 20180421 | |
DrWeb | 20180421 | |
eGambit | 20180421 | |
Endgame | 20180403 | |
Sophos ML | 20180121 | |
Jiangmin | 20180421 | |
K7AntiVirus | 20180420 | |
K7GW | 20180421 | |
Kingsoft | 20180421 | |
Malwarebytes | 20180421 | |
Palo Alto Networks (Known Signatures) | 20180421 | |
Panda | 20180420 | |
Rising | 20180421 | |
SentinelOne (Static ML) | 20180225 | |
SUPERAntiSpyware | 20180421 | |
Symantec Mobile Insight | 20180419 | |
TheHacker | 20180415 | |
TotalDefense | 20180421 | |
Trustlook | 20180421 | |
VBA32 | 20180420 | |
Webroot | 20180421 | |
Yandex | 20180420 | |
Zillya | 20180420 |
TrID |
Microsoft Word document (54.2%) Microsoft Word document (old ver.) (32.2%) Generic OLE2 / Multistream Compound File (13.5%) |
File names |
Outstanding Invoices.doc 94.doc Scan.doc Invoice Number 73960.doc Invoice 7781328 April.doc Question.doc Invoice for you.doc Paid Invoices.doc Service Report (4036).doc 44.doc Fwd: ACH form.doc 6 Past Due Invoices.doc a989c362a234593a07a7d7876b5df0547d237b92 Invoice.doc Invoices Overdue.doc New order.doc Need to send the attachment.doc output.113428249.txt Past Due Invoices.doc 1 Past Due Invoices.doc Invoice Number 51693.doc ACH form.doc Paid Invoice.doc Document needed.doc Paid Invoice & Credit Card Receipt.doc |
You have not signed in. Only registered users can leave comments, sign in and have a voice!