× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2985e6b3df1efe64c1c581b53ef4e2d0183dcb6a685f4464b10b79178f36c895
File name: 22619901
Detection ratio: 12 / 59
Analysis date: 2019-02-06 02:18:39 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Endgame malicious (high confidence) 20181108
McAfee W97M/Downloader.ha 20190206
McAfee-GW-Edition BehavesLike.Downloader.dl 20190205
Microsoft Trojan:Script/Foretype.A!ml 20190206
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190206
Qihoo-360 virus.office.obfuscated.4 20190206
SentinelOne (Static ML) static engine - malicious 20190203
TACHYON Suspicious/W97M.Obfus.Gen.1 20190206
Tencent Heur.Macro.Generic.Gen.e 20190206
TrendMicro HEUR_VBA.O.ELBP 20190206
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190206
Zoner Probably W97Obfuscated 20190206
Acronis 20190130
Ad-Aware 20190205
AegisLab 20190206
AhnLab-V3 20190205
Alibaba 20180921
ALYac 20190205
Antiy-AVL 20190206
Arcabit 20190206
Avast 20190206
Avast-Mobile 20190205
AVG 20190206
Avira (no cloud) 20190205
Babable 20180918
Baidu 20190202
BitDefender 20190206
CAT-QuickHeal 20190205
ClamAV 20190205
CMC 20190205
Comodo 20190206
CrowdStrike Falcon (ML) 20181023
Cybereason 20180308
Cylance 20190206
Cyren 20190206
DrWeb 20190206
eGambit 20190206
Emsisoft 20190206
ESET-NOD32 20190206
F-Prot 20190205
F-Secure 20190205
Fortinet 20190206
GData 20190206
Ikarus 20190205
Sophos ML 20181128
Jiangmin 20190206
K7AntiVirus 20190205
K7GW 20190205
Kaspersky 20190206
Kingsoft 20190206
Malwarebytes 20190206
MAX 20190206
eScan 20190205
Palo Alto Networks (Known Signatures) 20190206
Panda 20190205
Rising 20190205
Sophos AV 20190206
SUPERAntiSpyware 20190130
Symantec 20190205
TheHacker 20190203
TotalDefense 20190205
Trapmine 20190123
TrendMicro-HouseCall 20190206
Trustlook 20190206
VBA32 20190205
VIPRE 20190203
ViRobot 20190205
Webroot 20190206
Yandex 20190204
Zillya 20190204
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-05 13:18:00
revision_number
8
author
dood
page_count
2
last_saved
2019-02-05 13:20:00
edit_time
60
word_count
5
template
Normal.dotm
application_name
Microsoft Office Word
character_count
31
code_page
Cyrillic
Document summary
line_count
1
company
home
characters_with_spaces
35
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
21376
type_literal
stream
sid
26
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
7004
type_literal
stream
sid
1
name
Data
size
224579
type_literal
stream
sid
24
name
Macros/PROJECT
size
572
type_literal
stream
sid
25
name
Macros/PROJECTwm
size
113
type_literal
stream
sid
16
type
macro
name
Macros/VBA/GXbkFnp
size
2679
type_literal
stream
sid
17
type
macro
name
Macros/VBA/Hx2KATO
size
1861
type_literal
stream
sid
15
type
macro
name
Macros/VBA/PFUGY
size
1141
type_literal
stream
sid
22
type
macro
name
Macros/VBA/ThisDocument
size
1906
type_literal
stream
sid
23
name
Macros/VBA/_VBA_PROJECT
size
4017
type_literal
stream
sid
18
name
Macros/VBA/__SRP_0
size
2225
type_literal
stream
sid
19
name
Macros/VBA/__SRP_1
size
206
type_literal
stream
sid
20
name
Macros/VBA/__SRP_2
size
532
type_literal
stream
sid
21
name
Macros/VBA/__SRP_3
size
156
type_literal
stream
sid
14
name
Macros/VBA/dir
size
926
type_literal
stream
sid
13
type
macro (only attributes)
name
Macros/VBA/f
size
1171
type_literal
stream
sid
10
name
Macros/f/\x01CompObj
size
97
type_literal
stream
sid
11
name
Macros/f/\x03VBFrame
size
284
type_literal
stream
sid
8
name
Macros/f/f
size
126
type_literal
stream
sid
9
name
Macros/f/o
size
2772
type_literal
stream
sid
3
name
WordDocument
size
4148
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 251 bytes
[+] GXbkFnp.bas Macros/VBA/GXbkFnp 632 bytes
[+] PFUGY.bas Macros/VBA/PFUGY 151 bytes
run-file
[+] Hx2KATO.bas Macros/VBA/Hx2KATO 399 bytes
ExifTool file metadata
SharedDoc
No

Author
dood

CodePage
Windows Cyrillic

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
35

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:05 21:20:00

Company
home

Characters
31

HyperlinksChanged
No

RevisionNumber
8

MIMEType
application/msword

Words
5

CreateDate
2019:02:05 21:18:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
1 minute

Pages
2

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 aa00b5f6be463e4fc854bc755d085c88
SHA1 07653b6fd087940c98ad964d76889313af1fda87
SHA256 2985e6b3df1efe64c1c581b53ef4e2d0183dcb6a685f4464b10b79178f36c895
ssdeep
6144:cCwQK3RpVS7G4SVuz1QzLhxztsZGPwtM:eQQLGSVuz1QHhxztCtM

File size 268.0 KB ( 274432 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: dood, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 8, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Mon Feb 04 21:18:00 2019, Last Saved Time/Date: Mon Feb 04 21:20:00 2019, Number of Pages: 2, Number of Words: 5, Number of Characters: 31, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2019-02-06 02:18:39 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-06 04:36:38 UTC ( 1 month, 2 weeks ago )
File names bill_20190206.doc
ebill_file_02-06-2019.doc
PAY_2019-02-06.doc
22619901
emotet_e1_2985e6b3df1efe64c1c581b53ef4e2d0183dcb6a685f4464b10b79178f36c895_2019-02-06__022002.doc
receipt_02-06-2019.doc
receipt_2019_02_06.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!