× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 627af16749033883fc3ac9dce74110f2278d20dcd40f8c3a21354fa04bbb0b70
File name: emotet_e1_627af16749033883fc3ac9dce74110f2278d20dcd40f8c3a21354fa...
Detection ratio: 10 / 57
Analysis date: 2019-02-19 22:45:08 UTC ( 2 months ago ) View latest
Antivirus Result Update
Cyren W97M/Downldr.BN.gen!Eldorado 20190219
Endgame malicious (high confidence) 20190215
Ikarus Trojan-Downloader.VBA.Agent 20190219
K7AntiVirus Trojan ( 00536d111 ) 20190219
K7GW Trojan ( 00536d111 ) 20190219
McAfee Artemis!1B8A251452C3 20190219
McAfee-GW-Edition BehavesLike.Downloader.fg 20190219
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ISB.Downloader!gen80 20190219
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190219
Acronis 20190219
Ad-Aware 20190219
AegisLab 20190219
AhnLab-V3 20190219
Alibaba 20180921
ALYac 20190219
Antiy-AVL 20190219
Arcabit 20190219
Avast 20190219
Avast-Mobile 20190219
AVG 20190219
Avira (no cloud) 20190219
Babable 20180917
Baidu 20190214
BitDefender 20190219
Bkav 20190219
CAT-QuickHeal 20190219
ClamAV 20190219
CMC 20190219
Comodo 20190219
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190219
DrWeb 20190219
eGambit 20190219
Emsisoft 20190219
ESET-NOD32 20190219
F-Prot 20190219
F-Secure 20190219
Fortinet 20190219
GData 20190219
Sophos ML 20181128
Jiangmin 20190219
Kaspersky 20190219
Kingsoft 20190219
Malwarebytes 20190219
MAX 20190219
Microsoft 20190219
eScan 20190219
NANO-Antivirus 20190219
Palo Alto Networks (Known Signatures) 20190219
Panda 20190219
Qihoo-360 20190219
Rising 20190219
Sophos AV 20190219
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190206
TACHYON 20190218
Tencent 20190219
TheHacker 20190217
TotalDefense 20190219
Trapmine 20190123
TrendMicro 20190219
TrendMicro-HouseCall 20190219
Trustlook 20190219
VBA32 20190219
ViRobot 20190219
Webroot 20190219
Yandex 20190218
Zillya 20190219
Zoner 20190219
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to hide the viewer or other applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2019-02-19 21:29:00
template
Normal.dotm
page_count
1
last_saved
2019-02-19 21:29:00
revision_number
1
application_name
Microsoft Office Word
character_count
3
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
3
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4160
type_literal
stream
size
114
name
\x01CompObj
sid
18
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
7514
name
1Table
sid
2
type_literal
stream
size
129889
name
Data
sid
1
type_literal
stream
size
420
name
Macros/PROJECT
sid
17
type_literal
stream
size
47
name
Macros/PROJECTwm
sid
16
type_literal
stream
size
113116
type
macro
name
Macros/VBA/D_03_5
sid
11
type_literal
stream
size
1105
type
macro (only attributes)
name
Macros/VBA/X85417_
sid
8
type_literal
stream
size
32735
name
Macros/VBA/_VBA_PROJECT
sid
12
type_literal
stream
size
1221
name
Macros/VBA/__SRP_0
sid
14
type_literal
stream
size
106
name
Macros/VBA/__SRP_1
sid
15
type_literal
stream
size
220
name
Macros/VBA/__SRP_2
sid
9
type_literal
stream
size
66
name
Macros/VBA/__SRP_3
sid
10
type_literal
stream
size
548
name
Macros/VBA/dir
sid
13
type_literal
stream
size
4096
name
WordDocument
sid
3
Macros and VBA code streams
[+] D_03_5.bas Macros/VBA/D_03_5 54407 bytes
hide-app obfuscated
ExifTool file metadata
SharedDoc
No

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
3

CreateDate
2019:02:19 20:29:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2019:02:19 20:29:00

ScaleCrop
No

Characters
3

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 1b8a251452c3f24cac3267b119e556e4
SHA1 8a2f419939193f183b7b0fab94849c93452e764a
SHA256 627af16749033883fc3ac9dce74110f2278d20dcd40f8c3a21354fa04bbb0b70
ssdeep
6144:sG5/BnVfRFJ7KK9aHScdX9znGUlOV7QthK4lgAM:s2n9R/lA5dX9znGUlPthpgAM

File size 300.1 KB ( 307328 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 18 20:29:00 2019, Last Saved Time/Date: Mon Feb 18 20:29:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 3, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros hide-app doc

VirusTotal metadata
First submission 2019-02-19 22:01:45 UTC ( 2 months ago )
Last submission 2019-02-21 03:38:11 UTC ( 2 months ago )
File names emotet_e1_d045e9e3d85f0e7616c570065cdf55c911a50bc29cb74b08ab8ef4aedea59353_2019-02-20__055008.doc
emotet_e1_627af16749033883fc3ac9dce74110f2278d20dcd40f8c3a21354fa04bbb0b70_2019-02-19__220001.doc
659605838112.doc
02-20-2019-eInvoice_recept-8927996.doc
02-20-2019_PAY_RECEIPT_816151468.doc
DCRL3689852727953_022019.doc
02-20-2019-transaction_receipt_0817563.doc
20190220-RECEIPT_168898665.doc
NQUE390743266593859-19.doc
02202019_eInvoice_recept_5968936.doc
022019_transaction_receipt_85847715.doc
SDE68499568272123-19.doc
02202019_Receipt-4039691397.doc
02202019_eInvoice_recept_291028.doc
TKFY872429047104_022019.doc
08301868747509.doc
02-20-2019-transaction_receipt_3322730.doc
78345599008.doc
92763905194.doc
OZR71758703.doc
63510080-19.doc
02-20-2019_Receipt_9944690.doc
02-20-2019_RECEIPT-4749141.doc
ZPG01753310423682.doc
02-20-2019_PAY_RECEIPT_5407520591.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!