× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4471c48619ea319f45b431c98028b407e6e25de4040f84bd060fc9e6651076dc
File name: docfetcher-1.1.19-portable.zip
Detection ratio: 1 / 59
Analysis date: 2018-06-04 12:21:08 UTC ( 10 months, 3 weeks ago ) View latest
Antivirus Result Update
Cylance Unsafe 20180604
Ad-Aware 20180604
AegisLab 20180604
AhnLab-V3 20180604
Alibaba 20180604
ALYac 20180604
Antiy-AVL 20180604
Arcabit 20180604
Avast 20180604
Avast-Mobile 20180603
AVG 20180604
Avira (no cloud) 20180604
AVware 20180604
Babable 20180406
Baidu 20180604
BitDefender 20180604
Bkav 20180604
CAT-QuickHeal 20180604
ClamAV 20180604
CMC 20180604
Comodo 20180604
CrowdStrike Falcon (ML) 20180202
Cybereason None
Cyren 20180604
DrWeb 20180604
eGambit 20180604
Emsisoft 20180604
Endgame 20180507
ESET-NOD32 20180604
F-Prot 20180604
F-Secure 20180604
Fortinet 20180604
GData 20180604
Sophos ML 20180601
Jiangmin 20180604
K7AntiVirus 20180604
K7GW 20180604
Kingsoft 20180604
Malwarebytes 20180604
MAX 20180604
McAfee 20180604
McAfee-GW-Edition 20180604
Microsoft 20180604
eScan 20180604
NANO-Antivirus 20180604
nProtect 20180604
Palo Alto Networks (Known Signatures) 20180604
Panda 20180603
Qihoo-360 20180604
Rising 20180604
SentinelOne (Static ML) 20180225
Sophos AV 20180604
SUPERAntiSpyware 20180604
Symantec 20180604
Symantec Mobile Insight 20180601
Tencent 20180604
TheHacker 20180531
TrendMicro 20180604
TrendMicro-HouseCall 20180604
Trustlook 20180604
VBA32 20180604
VIPRE 20180604
ViRobot 20180604
Webroot 20180604
Yandex 20180529
Zillya 20180601
ZoneAlarm by Check Point 20180604
Zoner 20180604
The file being studied is a compressed stream! More specifically, it is a ZIP file. It seems to be a bundled Mac OS X application.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
The studied file contains at least one Mac OS X executable.
Contained files
Compression metadata
Contained files
184
Uncompressed size
53760039
Highest datetime
2017-01-10 16:36:26
Lowest datetime
2017-01-10 16:36:26
Contained files by extension
jar
49
gif
32
png
11
exe
9
dll
4
so
4
txt
4
css
3
sh
2
bat
1
zip
1
19/
1
bmp
1
Contained files by type
ZIP
50
GIF
32
HTML
27
unknown
21
directory
19
Portable Executable
13
PNG
11
ELF
5
script
3
XML
1
BMP
1
Mac OS X Executable
1
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
10

ZipCRC
0x00000000

FileType
ZIP

ZipCompression
None

ZipUncompressedSize
0

ZipCompressedSize
0

FileTypeExtension
zip

ZipFileName
DocFetcher-1.1.19/

ZipBitFlag
0

ZipModifyDate
2017:01:10 16:36:26

File identification
MD5 02896fe5232aa603eff2cc98d50185db
SHA1 5b978e28e426045cb81fdcba1563a7922bb28527
SHA256 4471c48619ea319f45b431c98028b407e6e25de4040f84bd060fc9e6651076dc
ssdeep
786432:LXmAXYtRQcS2uP/vAFInuYh+cTelH0fEa2qYB7QuaGRuIr4QQKnOO:LXmDtRQcjm/4mVy6ckIZajNa

File size 43.8 MB ( 45911459 bytes )
File type ZIP
Magic literal
Zip archive data, at least v1.0 to extract

TrID ZIP compressed archive (80.0%)
PrintFox/Pagefox bitmap (var. P) (20.0%)
Tags
contains-macho contains-pe mac-app zip contains-elf

VirusTotal metadata
First submission 2017-01-11 08:07:06 UTC ( 2 years, 3 months ago )
Last submission 2018-06-04 12:21:08 UTC ( 10 months, 3 weeks ago )
File names DocFetcher 1.1.19 Portable.zip
docfetcher-1.1.19-portable.zip
docfetcher-1.1.19-portable
docfetcher-1.1.19-portable.zip
docfetcher-1.1.19-portable.zip
docfetcher-1.1.19-portable.zip
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections