× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 470852d023f5705d940ddd8acf3c204fdb7a612bba6097e881ff181ba5ed4533
File name: flash.swf
Detection ratio: 25 / 55
Analysis date: 2016-11-13 10:08:22 UTC ( 2 years, 6 months ago )
Antivirus Result Update
Ad-Aware Script.SWF.C475 20161113
AegisLab Swf.Exploit.Gen!c 20161113
AhnLab-V3 SWF/Neutrino.Gen 20161112
ALYac Script.SWF.C475 20161113
Arcabit Script.SWF.C475 20161113
Avast SWF:Malware-gen [Trj] 20161113
AVG SWF/Exploit 20161113
Avira (no cloud) EXP/FLASH.Pubenush.S.Gen 20161112
AVware Exploit.SWF.Neutrino.a (v) 20161113
BitDefender Script.SWF.C475 20161113
CAT-QuickHeal Exp.SWF.Neutrino.A 20161112
ClamAV Swf.Trojan.Neutrino-194 20161113
Emsisoft Script.SWF.C475 (B) 20161113
ESET-NOD32 a variant of SWF/Exploit.ExKit.AEP 20161112
F-Secure Script.SWF.C475 20161113
Fortinet SWF/ExKit.AEP!exploit 20161113
GData Script.SWF.C475 20161113
Ikarus Trojan.SWF.Exploit 20161113
McAfee SWF/Exploit-Neutrino.a 20161113
McAfee-GW-Edition BehavesLike.Flash.Exploit.cb 20161113
eScan Script.SWF.C475 20161113
Panda Exploit/Neutrino.B 20161112
Qihoo-360 susp.swf.qexvmI.95 20161113
Symantec Trojan.Swifi 20161113
VIPRE Exploit.SWF.Neutrino.a (v) 20161113
Alibaba 20161110
Antiy-AVL 20161113
Baidu 20161111
Bkav 20161112
CMC 20161113
Comodo 20161113
CrowdStrike Falcon (ML) 20161024
Cyren 20161113
DrWeb 20161113
F-Prot 20161113
Sophos ML 20161018
Jiangmin 20161113
K7AntiVirus 20161113
K7GW 20161113
Kaspersky 20161113
Kingsoft 20161113
Malwarebytes 20161113
Microsoft 20161113
NANO-Antivirus 20161113
nProtect 20161113
Rising 20161113
Sophos AV 20161113
SUPERAntiSpyware 20161112
Tencent 20161113
TheHacker 20161111
TotalDefense 20161113
TrendMicro 20161114
TrendMicro-HouseCall 20161113
VBA32 20161111
ViRobot 20161113
Yandex 20161112
Zillya 20161111
Zoner 20161113
The file being studied is a SWF file! SWF files deliver vector graphics, text, video, and sound over the Internet.
Commonly abused SWF properties
The studied SWF file makes use of ActionScript3, some exploits have been found in the past targeting the ActionScript Virtual Machine. ActionScript has also been used to force unwanted redirections and other badness. Note that many legitimate flash files may also use it to implement rich content and animations.
Contains ActionScript code to request and retrieve content from Internet URLs.
SWF Properties
SWF version
32
Compression
zlib
Frame size
271.0x551.0 px
Frame count
1
Duration
0.042 seconds
File attributes
HasMetadata, ActionScript3, UseNetwork
Unrecognized SWF tags
0
Total SWF tags
20
ActionScript 3 Packages
flash.display
flash.events
flash.media
flash.net
flash.utils
mx.core
ExifTool file metadata
MIMEType
application/x-shockwave-flash

ImageSize
271x551

FileType
SWF

Megapixels
0.149

FrameRate
24

FlashVersion
32

Warning
Invalid XMP

FileTypeExtension
swf

Compressed
True

ImageWidth
271

Duration
0.04 s

FlashAttributes
UseNetwork, ActionScript3, HasMetadata

FrameCount
1

ImageHeight
551

File identification
MD5 eb6f8086f3dced5732f824a40d49ae5c
SHA1 7ef6fe39864cc666b90c569c72f089377d149ee8
SHA256 470852d023f5705d940ddd8acf3c204fdb7a612bba6097e881ff181ba5ed4533
ssdeep
1536:xTnw2MZmuuhw5lry4iRaBJXd0MGlhNSCxMaWqkBYznduS9X00LFkfhJK149MXIj:lnQ5umlrLgaBJXuMGlOCxMaWqSYzt9kl

File size 86.0 KB ( 88093 bytes )
File type Flash
Magic literal
Macromedia Flash data (compressed), version 32

TrID Macromedia Flash Player Compressed Movie (100.0%)
Tags
flash zlib

VirusTotal metadata
First submission 2016-07-19 15:32:59 UTC ( 2 years, 10 months ago )
Last submission 2016-07-20 10:24:41 UTC ( 2 years, 10 months ago )
File names flash.swf
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!