× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1a4c6a9c9e4bcce9f83776f87f158d39cb21eb78ea839afaa01abf3f93c49a4c
File name: emotet_e2_1a4c6a9c9e4bcce9f83776f87f158d39cb21eb78ea839afaa01abf3...
Detection ratio: 33 / 57
Analysis date: 2019-02-10 03:38:13 UTC ( 3 months, 1 week ago )
Antivirus Result Update
Ad-Aware W97m.Downloader.HWM 20190209
AhnLab-V3 DOC/Downloader 20190209
ALYac W97m.Downloader.HWM 20190209
Arcabit W97m.Downloader.HWM 20190209
AVG Other:Malware-gen [Trj] 20190209
Avira (no cloud) TR/Dldr.Script.ltfzu 20190209
BitDefender W97m.Downloader.HWM 20190209
ClamAV Doc.Downloader.Emotet-6846065-0 20190209
Comodo Malware@#18u1zo7bvkq9e 20190209
Cyren W97M/Downldr 20190209
Emsisoft W97m.Downloader.HWM (B) 20190209
Endgame malicious (high confidence) 20181108
F-Prot New or modified W97M/Downldr 20190209
F-Secure Trojan.TR/Dldr.Script.ltfzu 20190209
Fortinet VBA/Agent.BCD!tr.dldr 20190209
GData W97m.Downloader.HWM 20190209
K7AntiVirus Trojan ( 00536d111 ) 20190209
K7GW Trojan ( 00536d111 ) 20190209
Kaspersky HEUR:Trojan.MSOffice.SAgent.gen 20190209
MAX malware (ai score=100) 20190209
McAfee RDN/Generic.dx 20190209
McAfee-GW-Edition RDN/Generic.dx 20190209
eScan W97m.Downloader.HWM 20190209
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190209
Qihoo-360 virus.office.qexvmc.1075 20190209
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Troj/DocDl-RUG 20190209
Symantec W97M.Downloader 20190209
Tencent Heur.Macro.Generic.Gen.f 20190209
TrendMicro-HouseCall Trojan.W97M.POWLOAD.THBOFAI 20190209
ViRobot DOC.Z.Agent.271872.BY 20190209
ZoneAlarm by Check Point HEUR:Trojan.MSOffice.SAgent.gen 20190209
Zoner Probably W97Shell 20190209
Acronis 20190207
AegisLab 20190209
Alibaba 20180921
Antiy-AVL 20190209
Avast 20190210
Avast-Mobile 20190209
Baidu 20190201
Bkav 20190201
CAT-QuickHeal 20190209
CMC 20190209
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190209
DrWeb 20190209
eGambit 20190209
ESET-NOD32 20190209
Sophos ML 20181128
Jiangmin 20190209
Kingsoft 20190209
Malwarebytes 20190209
Microsoft 20190210
Palo Alto Networks (Known Signatures) 20190209
Panda 20190209
Rising 20190210
SUPERAntiSpyware 20190206
TACHYON 20190209
TheHacker 20190203
TotalDefense 20190206
Trapmine 20190123
TrendMicro 20190210
Trustlook 20190209
VBA32 20190208
Yandex 20190207
Zillya 20190208
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-04 04:09:00
template
Normal.dotm
author
admin
page_count
1
last_saved
2019-02-04 04:09:00
revision_number
2
application_name
Microsoft Office Word
character_count
1
code_page
Cyrillic
Document summary
line_count
1
company
Salve
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
19328
type_literal
stream
size
114
name
\x01CompObj
sid
26
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
7066
name
1Table
sid
2
type_literal
stream
size
224579
name
Data
sid
1
type_literal
stream
size
582
name
Macros/PROJECT
sid
25
type_literal
stream
size
119
name
Macros/PROJECTwm
sid
24
type_literal
stream
size
1020
type
macro
name
Macros/VBA/C62bq8hUe
sid
12
type_literal
stream
size
1712
type
macro
name
Macros/VBA/ThisDocument
sid
8
type_literal
stream
size
3859
name
Macros/VBA/_VBA_PROJECT
sid
15
type_literal
stream
size
2235
name
Macros/VBA/__SRP_0
sid
17
type_literal
stream
size
206
name
Macros/VBA/__SRP_1
sid
18
type_literal
stream
size
532
name
Macros/VBA/__SRP_2
sid
9
type_literal
stream
size
156
name
Macros/VBA/__SRP_3
sid
10
type_literal
stream
size
1857
type
macro
name
Macros/VBA/bOX8wu
sid
11
type_literal
stream
size
930
name
Macros/VBA/dir
sid
16
type_literal
stream
size
1173
type
macro (only attributes)
name
Macros/VBA/f
sid
14
type_literal
stream
size
1488
type
macro
name
Macros/VBA/ndqsZM
sid
13
type_literal
stream
size
97
name
Macros/f/\x01CompObj
sid
22
type_literal
stream
size
284
name
Macros/f/\x03VBFrame
sid
23
type_literal
stream
size
126
name
Macros/f/f
sid
20
type_literal
stream
size
2300
name
Macros/f/o
sid
21
type_literal
stream
size
4096
name
WordDocument
sid
3
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 162 bytes
[+] bOX8wu.bas Macros/VBA/bOX8wu 351 bytes
exe-pattern run-file
[+] C62bq8hUe.bas Macros/VBA/C62bq8hUe 109 bytes
[+] ndqsZM.bas Macros/VBA/ndqsZM 257 bytes
ExifTool file metadata
SharedDoc
No

Author
admin

CodePage
Windows Cyrillic

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:04 12:09:00

ScaleCrop
No

Company
Salve

Characters
1

HyperlinksChanged
No

RevisionNumber
2

MIMEType
application/msword

Words
0

CreateDate
2019:02:04 12:09:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 ec9d4b199b1323229f448cd92320d2dc
SHA1 4794e5ba0383cde6680feefdc952e315311a103a
SHA256 1a4c6a9c9e4bcce9f83776f87f158d39cb21eb78ea839afaa01abf3f93c49a4c
ssdeep
3072:ZkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPwYcdOSrvsUBe:ZCwQK3RpVS7G4SVuz1QzLhxztsZGPw8

File size 265.5 KB ( 271872 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: admin, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Feb 03 12:09:00 2019, Last Saved Time/Date: Sun Feb 03 12:09:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file exe-pattern doc

VirusTotal metadata
First submission 2019-02-04 14:14:56 UTC ( 3 months, 2 weeks ago )
Last submission 2019-02-04 19:35:12 UTC ( 3 months, 2 weeks ago )
File names emotet_e2_1a4c6a9c9e4bcce9f83776f87f158d39cb21eb78ea839afaa01abf3f93c49a4c_2019-02-04__141502.doc
PAY03065208003.doc
107897018813409.doc
PAY04807780459.doc
XA402296218545576.doc
zbetcheckin_tracker_OfgjB-sl_ghXxiZ-kv
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!