× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50
File name: G-A0287580036267754265.doc
Detection ratio: 38 / 57
Analysis date: 2017-06-22 05:07:54 UTC ( 13 hours, 9 minutes ago )
Antivirus Result Update
Ad-Aware w97m.Downloader.ACZ 20170622
AegisLab Troj.Downloader.Msword!c 20170622
AhnLab-V3 W97M/Downloader 20170622
ALYac w97m.Downloader.ACZ 20170622
Antiy-AVL Trojan[Downloader]/MSWord.Agent.vj 20170622
Arcabit HEUR.VBA.Trojan.d 20170622
Avast VBA:Downloader-RW [Trj] 20170622
AVG VBA:Downloader-RW [Trj] 20170622
Baidu VBA.Trojan-Downloader.Agent.my 20170622
BitDefender w97m.Downloader.ACZ 20170622
CAT-QuickHeal W97M.Dropper.MA 20170622
Comodo TrojWare.W97M.Agent.~AA 20170622
Cyren W97M/Downldr 20170622
DrWeb W97M.DownLoader.691 20170622
Emsisoft w97m.Downloader.ACZ (B) 20170622
ESET-NOD32 VBA/TrojanDownloader.Agent.AFT 20170622
F-Prot New or modified W97M/Downldr 20170622
F-Secure Trojan-Downloader:W97M/Dridex.R 20170622
Fortinet WM/Agent!tr 20170622
GData Macro.Trojan-Downloader.Agent.KF 20170622
Ikarus Trojan-Downloader.VBA.Agent 20170621
Jiangmin Trojan-Downloader/MSWord.Agent.uh 20170622
Kaspersky Trojan-Downloader.MSWord.Agent.vj 20170622
McAfee W97M/Downloader.atv 20170622
McAfee-GW-Edition W97M/Downloader.atv 20170622
Microsoft TrojanDownloader:O97M/Donoff 20170622
eScan w97m.Downloader.ACZ 20170622
NANO-Antivirus Trojan.Script.Agent.dyqfbn 20170622
Panda O97M/Downloader 20170621
Qihoo-360 virus.office.obfuscated.1 20170622
Sophos Troj/DocDl-ADJ 20170622
Symantec W97M.Downloader 20170622
Tencent Word.Trojan-downloader.Agent.Wtoe 20170622
TrendMicro W2KM_DRIDEX.NAJ 20170622
TrendMicro-HouseCall W2KM_DRIDEX.NAJ 20170622
VBA32 Trojan-Downloader.MSWord.Agent.vj 20170621
ViRobot W97M.S.Downloader.115712 20170622
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20170622
Alibaba 20170622
Avira (no cloud) 20170621
AVware 20170622
Bkav 20170621
ClamAV 20170622
CMC 20170619
CrowdStrike Falcon (ML) 20170420
Endgame 20170615
Invincea 20170607
K7AntiVirus 20170622
K7GW 20170622
Kingsoft 20170622
Malwarebytes 20170622
nProtect 20170622
Palo Alto Networks (Known Signatures) 20170622
Rising None
SentinelOne (Static ML) 20170516
SUPERAntiSpyware 20170622
Symantec Mobile Insight 20170621
TheHacker 20170621
TotalDefense 20170622
Trustlook 20170622
VIPRE 20170622
Webroot 20170622
WhiteArmor 20170616
Yandex 20170621
Zillya 20170619
Zoner 20170622
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May create additional files.
May try to run other files, shell commands or applications.
May create OLE objects.
May try to download additional files from the Internet.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2015-10-26 09:25:00
template
Normal
author
1
page_count
1
last_saved
2015-10-26 09:25:00
revision_number
2
application_name
Microsoft Office Word
code_page
Cyrillic
Document summary
company
Home
version
917504
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
3584
type_literal
stream
size
114
name
\x01CompObj
sid
15
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
4
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
3
type_literal
stream
size
11322
name
1Table
sid
1
type_literal
stream
size
517
name
Macros/PROJECT
sid
14
type_literal
stream
size
113
name
Macros/PROJECTwm
sid
13
type_literal
stream
size
26526
type
macro
name
Macros/VBA/Module1
sid
8
type_literal
stream
size
25638
type
macro
name
Macros/VBA/Module2
sid
9
type_literal
stream
size
14510
type
macro
name
Macros/VBA/Module3
sid
10
type_literal
stream
size
2104
type
macro
name
Macros/VBA/ThisDocument
sid
7
type_literal
stream
size
16104
name
Macros/VBA/_VBA_PROJECT
sid
11
type_literal
stream
size
617
name
Macros/VBA/dir
sid
12
type_literal
stream
size
4096
name
WordDocument
sid
2
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 146 bytes
[+] Module1.bas Macros/VBA/Module1 13612 bytes
exe-pattern create-file create-ole download obfuscated open-file write-file
[+] Module2.bas Macros/VBA/Module2 11773 bytes
exe-pattern create-ole obfuscated open-file run-file write-file
[+] Module3.bas Macros/VBA/Module3 6621 bytes
exe-pattern create-ole obfuscated run-file
ExifTool file metadata
SharedDoc
No

Author
1

CodePage
Windows Cyrillic

LinksUpToDate
No

LastModifiedBy
1

HeadingPairs
, 1

Template
Normal

CharCountWithSpaces
0

CreateDate
2015:10:26 08:25:00

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2015:10:26 08:25:00

Company
Home

HyperlinksChanged
No

Characters
0

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
0

FileType
DOC

Lines
0

AppVersion
14.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
0

Compressed bundles
File identification
MD5 6ecc60f8b140ed5feed8dbe0bce1a7ad
SHA1 85bdb56011fe8a39b5fdb4661674105e08f5c667
SHA256 11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50
ssdeep
3072:d33rIyaiGpmt1shZBUXMwW9G3TxmE24NPXqHC:tbIbzrGjXq

File size 113.0 KB ( 115712 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: 1, Template: Normal, Last Saved By: 1, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Oct 25 08:25:00 2015, Last Saved Time/Date: Sun Oct 25 08:25:00 2015, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated open-file exe-pattern doc create-file run-file macros attachment download write-file create-ole

VirusTotal metadata
First submission 2015-10-26 09:21:08 UTC ( 1 year, 8 months ago )
Last submission 2015-11-19 23:09:31 UTC ( 1 year, 7 months ago )
File names 46c85ff074da88831b83179e250ff79e
11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50.doc.000
invoice-2425.doc.file
86621e765ba64c845260dbcfa45eccd3
460c995959217d35045c6cc96bb02e05
55cb4213f63fe2adf01107ea8c16734c
5900fc079217ceb6d3337ca1b6e6ad8b
b9166a351f5716ed75e06ea0bc720f40
invoice-2425.doc
invoice-2425.doc.file
invoice-2425.doc.mal.bin
aae8196dc0cc1c4f72c18888bd40f898
1.doc
0f99168332035718251d7274a5a0c660
G-A0287580036267754265.doc
G-A0287580036267754265-08.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!