× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 10c67c350aeaaec9a1de095dfb31aac0fc72afab36f9e8390005a5ba4748d2b1
File name: Fakturierung.doc
Detection ratio: 8 / 57
Analysis date: 2019-02-18 14:12:58 UTC ( 2 months ago ) View latest
Antivirus Result Update
Endgame malicious (high confidence) 20190215
Fortinet VBA/Agent.MPF!tr.dldr 20190218
Ikarus Trojan-Downloader.VBA.Agent 20190218
K7AntiVirus Trojan ( 00536d111 ) 20190218
K7GW Trojan ( 00536d111 ) 20190218
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ISB.Downloader!gen80 20190218
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190218
Acronis 20190213
Ad-Aware 20190218
AegisLab 20190218
AhnLab-V3 20190218
Alibaba 20180921
ALYac 20190218
Antiy-AVL 20190218
Arcabit 20190218
Avast 20190218
Avast-Mobile 20190218
AVG 20190218
Avira (no cloud) 20190218
Babable 20180918
Baidu 20190215
BitDefender 20190218
Bkav 20190218
CAT-QuickHeal 20190218
ClamAV 20190218
CMC 20190218
Comodo 20190218
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190218
Cyren 20190218
DrWeb 20190218
eGambit 20190218
Emsisoft 20190218
ESET-NOD32 20190218
F-Prot 20190218
F-Secure 20190218
GData 20190218
Sophos ML 20181128
Jiangmin 20190218
Kaspersky 20190218
Kingsoft 20190218
Malwarebytes 20190218
MAX 20190218
McAfee 20190218
McAfee-GW-Edition 20190218
Microsoft 20190218
eScan 20190218
NANO-Antivirus 20190218
Palo Alto Networks (Known Signatures) 20190218
Panda 20190218
Qihoo-360 20190218
Rising 20190218
Sophos AV 20190218
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190207
TACHYON 20190218
Tencent 20190218
TheHacker 20190217
Trapmine 20190123
TrendMicro-HouseCall 20190218
Trustlook 20190218
VBA32 20190218
VIPRE 20190218
ViRobot 20190218
Webroot 20190218
Yandex 20190215
Zillya 20190218
Zoner 20190218
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to hide the viewer or other applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2019-02-18 11:15:00
template
Normal.dotm
page_count
1
last_saved
2019-02-18 11:15:00
word_count
1
revision_number
1
application_name
Microsoft Office Word
character_count
7
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
7
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4160
type_literal
stream
size
114
name
\x01CompObj
sid
18
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
7518
name
1Table
sid
2
type_literal
stream
size
129889
name
Data
sid
1
type_literal
stream
size
420
name
Macros/PROJECT
sid
17
type_literal
stream
size
53
name
Macros/PROJECTwm
sid
16
type_literal
stream
size
1106
type
macro (only attributes)
name
Macros/VBA/J7836927
sid
8
type_literal
stream
size
85402
type
macro
name
Macros/VBA/K3__0_9
sid
11
type_literal
stream
size
42792
name
Macros/VBA/_VBA_PROJECT
sid
12
type_literal
stream
size
1223
name
Macros/VBA/__SRP_0
sid
14
type_literal
stream
size
106
name
Macros/VBA/__SRP_1
sid
15
type_literal
stream
size
220
name
Macros/VBA/__SRP_2
sid
9
type_literal
stream
size
66
name
Macros/VBA/__SRP_3
sid
10
type_literal
stream
size
557
name
Macros/VBA/dir
sid
13
type_literal
stream
size
4096
name
WordDocument
sid
3
Macros and VBA code streams
[+] K3__0_9.bas Macros/VBA/K3__0_9 50730 bytes
hide-app obfuscated
ExifTool file metadata
SharedDoc
No

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
7

CreateDate
2019:02:18 10:15:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2019:02:18 10:15:00

ScaleCrop
No

Characters
7

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
1

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 5f50b647266844214cdad4dd1331a5a8
SHA1 cb338e8c7f05d89a0599404218a46f9d1b8d229b
SHA256 10c67c350aeaaec9a1de095dfb31aac0fc72afab36f9e8390005a5ba4748d2b1
ssdeep
6144:PG5/BnVfRFJ7KK9aHScdX9znGUEW1ZT+TveVmhjdtSm5:P2n9R/lA5dX9znGUESZTuveWdtSm5

File size 285.1 KB ( 291968 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Feb 17 10:15:00 2019, Last Saved Time/Date: Sun Feb 17 10:15:00 2019, Number of Pages: 1, Number of Words: 1, Number of Characters: 7, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros hide-app doc

VirusTotal metadata
First submission 2019-02-18 14:12:58 UTC ( 2 months ago )
Last submission 2019-02-18 22:03:03 UTC ( 2 months ago )
File names ZG723322438383-19.doc
Fakturierung.doc
emotet_e1_10c67c350aeaaec9a1de095dfb31aac0fc72afab36f9e8390005a5ba4748d2b1_2019-02-18__141001.doc
51426457940494_022019.doc
7059475411513610_022019.doc
17486769544.doc
59387306830-19.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!