× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0fd92c81376c606642ce8534f107e2166a92a698aa1727662872bb9e89773ab0
File name: emotet_e2_0fd92c81376c606642ce8534f107e2166a92a698aa1727662872bb9...
Detection ratio: 32 / 60
Analysis date: 2018-12-23 16:39:23 UTC ( 3 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware VB:Trojan.Emotet.QM 20181223
AegisLab Trojan.MSWord.Generic.4!c 20181223
AhnLab-V3 VBA/Downloader 20181223
ALYac VB:Trojan.Emotet.QM 20181223
Arcabit HEUR.VBA.Trojan.e 20181223
Avast Other:Malware-gen [Trj] 20181223
AVG Other:Malware-gen [Trj] 20181223
Avira (no cloud) VBA/Dldr.Agent.ttgmv 20181223
BitDefender VB:Trojan.Emotet.QM 20181223
ClamAV Doc.Malware.Generic-6791501-0 20181223
Comodo Malware@#13qickct1eay7 20181223
Emsisoft Trojan-Downloader.Macro.Generic.L (A) 20181223
Endgame malicious (high confidence) 20181108
ESET-NOD32 VBA/TrojanDownloader.Agent.LXA 20181223
F-Secure VB:Trojan.Emotet.QM 20181223
Fortinet VBA/Agent.LWI!tr.dldr 20181223
GData VB:Trojan.Emotet.QM 20181223
Ikarus Trojan.VB.Emotet 20181223
Kaspersky Trojan-Downloader.MSWord.Agent.cem 20181223
McAfee W97M/Downloader.gg 20181223
McAfee-GW-Edition BehavesLike.Downloader.cg 20181223
Microsoft Trojan:O97M/Obfuse.CH 20181223
eScan VB:Trojan.Emotet.QM 20181223
Qihoo-360 Win32/Trojan.Downloader.327 20181223
Rising Macro.Agent.dx (CLASSIC) 20181223
SentinelOne (Static ML) static engine - malicious 20181223
Symantec W97M.Downloader 20181222
TACHYON Suspicious/W97M.Obfus.Gen.6 20181223
Tencent Win32.Trojan-downloader.Agent.Dwtb 20181223
TrendMicro Trojan.W97M.POWLOAD.AM 20181223
TrendMicro-HouseCall Trojan.W97M.POWLOAD.AM 20181223
ZoneAlarm by Check Point Trojan-Downloader.MSWord.Agent.cem 20181223
Acronis 20181222
Alibaba 20180921
Antiy-AVL 20181223
Avast-Mobile 20181223
Babable 20180918
Baidu 20181207
Bkav 20181221
CAT-QuickHeal 20181223
CMC 20181223
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181223
Cyren 20181223
DrWeb 20181223
eGambit 20181223
F-Prot 20181223
Sophos ML 20181128
Jiangmin 20181223
K7AntiVirus 20181222
K7GW 20181222
Kingsoft 20181223
Malwarebytes 20181223
MAX 20181223
NANO-Antivirus 20181223
Palo Alto Networks (Known Signatures) 20181223
Panda 20181223
Sophos AV 20181223
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181215
TheHacker 20181220
TotalDefense 20181223
Trapmine 20181205
Trustlook 20181223
VBA32 20181222
VIPRE 20181223
ViRobot 20181223
Yandex 20181223
Zillya 20181222
Zoner 20181223
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
creation_datetime
2018-12-21 15:47:00
template
Normal.dotm
page_count
1
last_saved
2018-12-21 15:47:00
word_count
2
revision_number
1
application_name
Microsoft Office Word
character_count
17
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
18
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
24256
type_literal
stream
size
114
name
\x01CompObj
sid
38
type_literal
stream
size
280
name
\x05DocumentSummaryInformation
sid
12
type_literal
stream
size
404
name
\x05SummaryInformation
sid
11
type_literal
stream
size
7922
name
1Table
sid
10
type_literal
stream
size
82329
name
Data
sid
1
type_literal
stream
size
1223
name
Macros/PROJECT
sid
37
type_literal
stream
size
569
name
Macros/PROJECTwm
sid
36
type_literal
stream
size
989
type
macro (only attributes)
name
Macros/VBA/A656188819
sid
29
type_literal
stream
size
4180
type
macro
name
Macros/VBA/H10342674
sid
18
type_literal
stream
size
684
type
macro (only attributes)
name
Macros/VBA/J96957598260844
sid
24
type_literal
stream
size
994
type
macro (only attributes)
name
Macros/VBA/O9344004845097
sid
27
type_literal
stream
size
7656
name
Macros/VBA/_VBA_PROJECT
sid
32
type_literal
stream
size
2274
name
Macros/VBA/__SRP_0
sid
34
type_literal
stream
size
238
name
Macros/VBA/__SRP_1
sid
35
type_literal
stream
size
428
name
Macros/VBA/__SRP_2
sid
16
type_literal
stream
size
142
name
Macros/VBA/__SRP_3
sid
17
type_literal
stream
size
679
type
macro (only attributes)
name
Macros/VBA/a921272830
sid
23
type_literal
stream
size
990
type
macro (only attributes)
name
Macros/VBA/c8092406443
sid
26
type_literal
stream
size
1568
name
Macros/VBA/dir
sid
33
type_literal
stream
size
680
type
macro (only attributes)
name
Macros/VBA/f2076439489
sid
22
type_literal
stream
size
995
type
macro (only attributes)
name
Macros/VBA/f31912568948428
sid
25
type_literal
stream
size
1738
type
macro
name
Macros/VBA/h165440005402
sid
15
type_literal
stream
size
677
type
macro (only attributes)
name
Macros/VBA/p2616705
sid
21
type_literal
stream
size
679
type
macro (only attributes)
name
Macros/VBA/p264483465
sid
19
type_literal
stream
size
995
type
macro (only attributes)
name
Macros/VBA/q43108661501488
sid
28
type_literal
stream
size
681
type
macro (only attributes)
name
Macros/VBA/v43889598743
sid
20
type_literal
stream
size
988
type
macro (only attributes)
name
Macros/VBA/w10116279
sid
31
type_literal
stream
size
991
type
macro (only attributes)
name
Macros/VBA/w48666003953
sid
30
type_literal
stream
size
116
name
ObjectPool/_1606919614/\x01CompObj
sid
6
type_literal
stream
size
20
name
ObjectPool/_1606919614/\x03OCXNAME
sid
8
type_literal
stream
size
6
name
ObjectPool/_1606919614/\x03ObjInfo
sid
7
type_literal
stream
size
510
name
ObjectPool/_1606919614/\x03PRINT
sid
5
type_literal
stream
size
2732
name
ObjectPool/_1606919614/contents
sid
9
type_literal
stream
size
4096
name
WordDocument
sid
2
Macros and VBA code streams
[+] h165440005402.cls Macros/VBA/h165440005402 137 bytes
[+] H10342674.bas Macros/VBA/H10342674 2249 bytes
run-file
ExifTool file metadata
SharedDoc
No

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
18

CreateDate
2018:12:21 14:47:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:12:21 14:47:00

ScaleCrop
No

Characters
17

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
2

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 812f9df6c368d0805951ccff466593f3
SHA1 037134c0785ff07f6afeedf75a0dd4edb2a1baf1
SHA256 0fd92c81376c606642ce8534f107e2166a92a698aa1727662872bb9e89773ab0
ssdeep
1536:V181ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadsEzf1a5sM9+a9:V18GhDS0o9zTGOZD6EbzCdTT1a5s

File size 151.5 KB ( 155136 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Dec 20 14:47:00 2018, Last Saved Time/Date: Thu Dec 20 14:47:00 2018, Number of Pages: 1, Number of Words: 2, Number of Characters: 17, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2018-12-21 20:06:19 UTC ( 4 months ago )
Last submission 2019-04-14 00:26:37 UTC ( 1 week ago )
File names 21660758160732.doc
US4067444892.doc
output.115004540.txt
PAY376158093730.doc
PAY5228184292654.doc
output.114768421.txt
output.123710319.txt
US0478039551.doc
PAY0771424498001613628.doc
PAY820861011329.doc
PAY5916613156.doc
US7517998663.doc
ATT8191050225966.doc
US2420526519.doc
US500055407563.doc
PAY72559699843601.doc
output.114756122.txt
PAY0344061649.doc
US947444885916.doc
output.115019511.txt
PAY7413974479752.doc
ATT8568900034123381472.doc
ATT53111610155393.doc
25428764080155100414.doc
US5770472972993.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!