× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 183dbd8750cb4e627c992776b130be3c734083c28a5e8d5228c1c1a2b52dcdda
File name: emotet_e2_183dbd8750cb4e627c992776b130be3c734083c28a5e8d5228c1c1a...
Detection ratio: 39 / 61
Analysis date: 2019-04-17 13:39:45 UTC ( 1 month ago )
Antivirus Result Update
Ad-Aware W97m.Downloader.IBQ 20190417
AegisLab Trojan.MSWord.Generic.4!c 20190417
AhnLab-V3 DOC/Downloader 20190417
ALYac Trojan.Downloader.DOC.gen 20190417
Antiy-AVL Trojan[Downloader]/MSOffice.Agent.cxc 20190417
Arcabit W97m.Downloader.IBQ 20190417
Avast Script:SNH-gen [Trj] 20190417
AVG Script:SNH-gen [Trj] 20190417
Avira (no cloud) W97M/Dldr.Agent.12458 20190417
BitDefender W97m.Downloader.IBQ 20190417
CAT-QuickHeal W97M.Emotet.Heur 20190416
ClamAV Doc.Dropper.Agent-6941435-0 20190416
Cyren W97M/Downldr.CE.gen!Eldorado 20190417
Emsisoft Trojan-Downloader.Macro.Generic.O (A) 20190417
Endgame malicious (high confidence) 20190403
ESET-NOD32 GenScript.CXC 20190417
F-Secure Malware.W97M/Dldr.Agent.12458 20190416
FireEye W97m.Downloader.IBQ 20190417
Fortinet VBA/Agent.NMG!tr.dldr 20190417
GData W97m.Downloader.IBQ 20190417
Ikarus Trojan-Downloader.VBA.Agent 20190416
K7AntiVirus Trojan ( 00536d111 ) 20190417
K7GW Trojan ( 00536d111 ) 20190417
Kaspersky HEUR:Trojan.MSOffice.SAgent.gen 20190417
MAX malware (ai score=100) 20190417
McAfee Artemis!BB5210BB6DD1 20190417
McAfee-GW-Edition W97M/Downloader.ip 20190416
Microsoft TrojanDownloader:O97M/Obfuse.EI 20190417
eScan W97m.Downloader.IBQ 20190417
SentinelOne (Static ML) DFI - Malicious OLE 20190407
Sophos AV Troj/DocDl-TDK 20190417
Symantec Trojan.Gen.MBT 20190416
TACHYON Suspicious/W97M.Obfus.Gen.6 20190417
Tencent Heur.Macro.Generic.Gen.h 20190417
TrendMicro Trojan.W97M.POWLOAD.TIHAOHDD 20190417
TrendMicro-HouseCall Trojan.W97M.POWLOAD.TIHAOHDD 20190417
ViRobot DOC.Z.Agent.239488.C 20190417
ZoneAlarm by Check Point HEUR:Trojan.MSOffice.SAgent.gen 20190417
Zoner Probably W97Obfuscated 20190416
Acronis 20190415
Alibaba 20190401
Avast-Mobile 20190415
Babable 20180918
Baidu 20190318
Bkav 20190416
CMC 20190321
Comodo 20190417
CrowdStrike Falcon (ML) 20190212
Cybereason 20190417
Cylance 20190417
DrWeb 20190417
eGambit 20190417
F-Prot 20190417
Sophos ML 20190313
Jiangmin 20190417
Kingsoft 20190417
Malwarebytes 20190417
NANO-Antivirus 20190417
Palo Alto Networks (Known Signatures) 20190417
Panda 20190416
Qihoo-360 20190417
Rising 20190417
SUPERAntiSpyware 20190410
Symantec Mobile Insight 20190410
TheHacker 20190411
TotalDefense 20190416
Trapmine 20190325
Trustlook 20190417
VBA32 20190416
VIPRE 20190416
Webroot 20190417
Yandex 20190416
Zillya 20190416
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to hide the viewer or other applications.
Summary
creation_datetime
2019-04-15 14:26:00
template
Normal.dotm
page_count
1
last_saved
2019-04-15 14:26:00
revision_number
1
application_name
Microsoft Office Word
character_count
3
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
3
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
7616
type_literal
stream
size
114
name
\x01CompObj
sid
31
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
7482
name
1Table
sid
2
type_literal
stream
size
65403
name
Data
sid
1
type_literal
stream
size
649
name
Macros/PROJECT
sid
30
type_literal
stream
size
122
name
Macros/PROJECTwm
sid
29
type_literal
stream
size
5649
type
macro
name
Macros/VBA/DGXUACA
sid
13
type_literal
stream
size
21135
type
macro
name
Macros/VBA/JABDQAx
sid
14
type_literal
stream
size
1105
type
macro (only attributes)
name
Macros/VBA/RABBAAU
sid
8
type_literal
stream
size
1159
type
macro (only attributes)
name
Macros/VBA/ZADAB4AQ
sid
11
type_literal
stream
size
73091
name
Macros/VBA/_VBA_PROJECT
sid
15
type_literal
stream
size
14665
name
Macros/VBA/__SRP_0
sid
17
type_literal
stream
size
176
name
Macros/VBA/__SRP_1
sid
18
type_literal
stream
size
66
name
Macros/VBA/__SRP_2
sid
10
type_literal
stream
size
220
name
Macros/VBA/__SRP_3
sid
9
type_literal
stream
size
1157
type
macro (only attributes)
name
Macros/VBA/bQxDDA
sid
12
type_literal
stream
size
935
name
Macros/VBA/dir
sid
16
type_literal
stream
size
97
name
Macros/ZADAB4AQ/\x01CompObj
sid
27
type_literal
stream
size
290
name
Macros/ZADAB4AQ/\x03VBFrame
sid
28
type_literal
stream
size
130
name
Macros/ZADAB4AQ/f
sid
25
type_literal
stream
size
112
name
Macros/ZADAB4AQ/o
sid
26
type_literal
stream
size
97
name
Macros/bQxDDA/\x01CompObj
sid
22
type_literal
stream
size
287
name
Macros/bQxDDA/\x03VBFrame
sid
23
type_literal
stream
size
290
name
Macros/bQxDDA/f
sid
20
type_literal
stream
size
6024
name
Macros/bQxDDA/o
sid
21
type_literal
stream
size
4096
name
WordDocument
sid
3
Macros and VBA code streams
[+] DGXUACA.bas Macros/VBA/DGXUACA 3403 bytes
[+] JABDQAx.bas Macros/VBA/JABDQAx 14148 bytes
hide-app
ExifTool file metadata
SharedDoc
No

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
3

CreateDate
2019:04:15 14:26:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2019:04:15 14:26:00

ScaleCrop
No

Characters
3

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 bb5210bb6dd1be8086abcc91ac471f67
SHA1 fe10da29253453197c159cc27375162eeb3a7d37
SHA256 183dbd8750cb4e627c992776b130be3c734083c28a5e8d5228c1c1a2b52dcdda
ssdeep
6144:b77HUUUUUUUUUUUUUUUUUUUT52Vk5jjZx1k2sXp2PAKDwIaMYj92uy3s:b77HUUUUUUUUUUUUUUUUUUUTCkRr1joX

File size 233.9 KB ( 239488 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Apr 14 14:26:00 2019, Last Saved Time/Date: Sun Apr 14 14:26:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 3, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros hide-app doc

VirusTotal metadata
First submission 2019-04-15 18:03:00 UTC ( 1 month ago )
Last submission 2019-04-15 22:16:15 UTC ( 1 month ago )
File names emotet_e1_183dbd8750cb4e627c992776b130be3c734083c28a5e8d5228c1c1a2b52dcdda_2019-04-15__130233._doc
33955101785_DE_April_15_2019.doc
771241047175_Apr_15_2019.doc
895966875544_DE_April_15_2019.doc
28034255210_Apr_15_2019.doc
707449683988_Apr_15_2019.doc
419870682974_DE_April_15_2019.doc
24545614682_DE_April_15_2019.doc
909987346952_DE_April_15_2019.doc
567523825209_Apr_15_2019.doc
42772534108_Apr_15_2019.doc
4685107260_DE_April_15_2019.doc
emotet_e2_183dbd8750cb4e627c992776b130be3c734083c28a5e8d5228c1c1a2b52dcdda_2019-04-15__180010._doc
429992188093_DE_April_15_2019.doc
10606591863_Apr_15_2019.doc
07215044805_DE_April_15_2019.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!