× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50
File name: G-A0287580036267754265.doc
Detection ratio: 37 / 57
Analysis date: 2017-04-30 05:11:57 UTC ( 15 hours, 13 minutes ago )
Antivirus Result Update
Ad-Aware w97m.Downloader.ACZ 20170430
AhnLab-V3 W97M/Downloader 20170429
ALYac w97m.Downloader.ACZ 20170430
Antiy-AVL Trojan[Downloader]/MSWord.Agent.vj 20170429
Arcabit HEUR.VBA.Trojan.d 20170430
Avast VBA:Downloader-RW [Trj] 20170430
AVG Generic14_c.ALVU 20170430
Baidu VBA.Trojan-Downloader.Agent.my 20170428
BitDefender w97m.Downloader.ACZ 20170430
CAT-QuickHeal W97M.Dropper.MA 20170429
Comodo TrojWare.W97M.Agent.~AA 20170430
Cyren W97M/Downldr 20170430
DrWeb W97M.DownLoader.691 20170429
Emsisoft w97m.Downloader.ACZ (B) 20170430
ESET-NOD32 VBA/TrojanDownloader.Agent.AFT 20170429
F-Prot New or modified W97M/Downldr 20170430
F-Secure Trojan-Downloader:W97M/Dridex.R 20170430
Fortinet WM/Agent!tr 20170430
GData Macro.Trojan-Downloader.Agent.KF 20170430
Ikarus Trojan-Downloader.VBA.Agent 20170429
Jiangmin Trojan-Downloader/MSWord.Agent.uh 20170428
Kaspersky Trojan-Downloader.MSWord.Agent.vj 20170430
McAfee W97M/Downloader.atv 20170430
McAfee-GW-Edition W97M/Downloader.atv 20170429
Microsoft TrojanDownloader:O97M/Donoff 20170430
eScan w97m.Downloader.ACZ 20170430
NANO-Antivirus Trojan.Script.Agent.dyqfbn 20170430
Panda O97M/Downloader 20170429
Qihoo-360 virus.office.obfuscated.1 20170430
Sophos Troj/DocDl-ADJ 20170430
Symantec W97M.Downloader 20170429
Tencent Word.Trojan-downloader.Agent.Wtoe 20170430
TrendMicro W2KM_DRIDEX.NAJ 20170430
TrendMicro-HouseCall W2KM_DRIDEX.NAJ 20170430
VBA32 Trojan-Downloader.MSWord.Agent.vj 20170429
ViRobot W97M.S.Downloader.115712[h] 20170429
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20170430
AegisLab 20170430
Alibaba 20170428
Avira (no cloud) 20170429
AVware 20170430
Bkav 20170428
ClamAV 20170429
CMC 20170427
CrowdStrike Falcon (ML) 20170130
Endgame 20170419
Invincea 20170413
K7AntiVirus 20170430
K7GW 20170426
Kingsoft 20170430
Malwarebytes 20170429
nProtect 20170430
Palo Alto Networks (Known Signatures) 20170430
Rising None
SentinelOne (Static ML) 20170330
SUPERAntiSpyware 20170430
Symantec Mobile Insight 20170428
TheHacker 20170429
TotalDefense 20170426
Trustlook 20170430
VIPRE 20170430
Webroot 20170430
WhiteArmor 20170409
Yandex 20170428
Zillya 20170428
Zoner 20170430
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May open a file.
May write to a file.
May create additional files.
May try to run other files, shell commands or applications.
May create OLE objects.
May try to download additional files from the Internet.
Seems to contain deobfuscation code.
Summary
last_author
1
creation_datetime
2015-10-26 09:25:00
template
Normal
author
1
page_count
1
last_saved
2015-10-26 09:25:00
revision_number
2
application_name
Microsoft Office Word
code_page
Cyrillic
Document summary
company
Home
version
917504
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
3584
type_literal
stream
size
114
name
\x01CompObj
sid
15
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
4
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
3
type_literal
stream
size
11322
name
1Table
sid
1
type_literal
stream
size
517
name
Macros/PROJECT
sid
14
type_literal
stream
size
113
name
Macros/PROJECTwm
sid
13
type_literal
stream
size
26526
type
macro
name
Macros/VBA/Module1
sid
8
type_literal
stream
size
25638
type
macro
name
Macros/VBA/Module2
sid
9
type_literal
stream
size
14510
type
macro
name
Macros/VBA/Module3
sid
10
type_literal
stream
size
2104
type
macro
name
Macros/VBA/ThisDocument
sid
7
type_literal
stream
size
16104
name
Macros/VBA/_VBA_PROJECT
sid
11
type_literal
stream
size
617
name
Macros/VBA/dir
sid
12
type_literal
stream
size
4096
name
WordDocument
sid
2
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 146 bytes
[+] Module1.bas Macros/VBA/Module1 13612 bytes
exe-pattern create-file create-ole download obfuscated open-file write-file
[+] Module2.bas Macros/VBA/Module2 11773 bytes
exe-pattern create-ole obfuscated open-file run-file write-file
[+] Module3.bas Macros/VBA/Module3 6621 bytes
exe-pattern create-ole obfuscated run-file
ExifTool file metadata
SharedDoc
No

Author
1

CodePage
Windows Cyrillic

LinksUpToDate
No

LastModifiedBy
1

HeadingPairs
, 1

Template
Normal

CharCountWithSpaces
0

CreateDate
2015:10:26 08:25:00

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2015:10:26 08:25:00

Company
Home

HyperlinksChanged
No

Characters
0

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
0

FileType
DOC

Lines
0

AppVersion
14.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
0

Compressed bundles
File identification
MD5 6ecc60f8b140ed5feed8dbe0bce1a7ad
SHA1 85bdb56011fe8a39b5fdb4661674105e08f5c667
SHA256 11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50
ssdeep
3072:d33rIyaiGpmt1shZBUXMwW9G3TxmE24NPXqHC:tbIbzrGjXq

File size 113.0 KB ( 115712 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: 1, Template: Normal, Last Saved By: 1, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Oct 25 08:25:00 2015, Last Saved Time/Date: Sun Oct 25 08:25:00 2015, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated open-file exe-pattern doc create-file run-file macros attachment download write-file create-ole

VirusTotal metadata
First submission 2015-10-26 09:21:08 UTC ( 1 year, 6 months ago )
Last submission 2015-11-19 23:09:31 UTC ( 1 year, 5 months ago )
File names 46c85ff074da88831b83179e250ff79e
11d137631d43b731e633ebf8dfecbd41bd5ca16f93be48678789a3fd275f3d50.doc.000
invoice-2425.doc.file
86621e765ba64c845260dbcfa45eccd3
460c995959217d35045c6cc96bb02e05
55cb4213f63fe2adf01107ea8c16734c
5900fc079217ceb6d3337ca1b6e6ad8b
b9166a351f5716ed75e06ea0bc720f40
invoice-2425.doc
invoice-2425.doc.file
invoice-2425.doc.mal.bin
aae8196dc0cc1c4f72c18888bd40f898
1.doc
0f99168332035718251d7274a5a0c660
G-A0287580036267754265.doc
G-A0287580036267754265-08.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!