× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 672042e7cd634775e36010d69c363f72f3f249636d02b5d4eced10f558a587b5
File name: a.rtf
Detection ratio: 32 / 54
Analysis date: 2016-10-13 02:10:41 UTC ( 2 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware Exploit.CVE-2010-3333.Gen 20161013
ALYac Exploit.CVE-2010-3333.Gen 20161013
Antiy-AVL Trojan[Exploit]/Office.CVE-2010-3333.b 20161012
Arcabit Exploit.CVE-2010-3333.Gen 20161013
Avast RTF:CVE-2010-3333 [Expl] 20161013
AVG Luhe.Exploit.RTF.CVE-2010-3333.A 20161013
Avira (no cloud) EXP/CVE-2010-3333 20161012
AVware Exploit.RTF.CVE-2010-3333 (v) 20161013
Baidu RTF.Exploit.CVE-2010-3333.a 20161012
BitDefender Exploit.CVE-2010-3333.Gen 20161013
Bkav Exploit.CVE-2012-0158.Heur 20161012
CAT-QuickHeal Exp.RTF.CVE-2010-3333.A 20161012
ClamAV Rtf.Dropper.Agent-1752963 20161012
Cyren CVE-2010-3333!Camelot 20161013
DrWeb Exploit.Rtf.based 20161013
Emsisoft Exploit.CVE-2010-3333.Gen (B) 20161013
F-Secure Exploit.CVE-2010-3333.Gen 20161013
Fortinet MSWord/CVE20103333.A!exploit 20161013
GData Exploit.CVE-2010-3333.Gen 20161013
Ikarus Exploit.Win32.CVE-2010-3333 20161012
Kaspersky Exploit.MSWord.CVE-2010-3333.a 20161013
McAfee Exploit-CVE2010-3333 20161013
McAfee-GW-Edition Exploit-CVE2010-3333 20161013
Microsoft Exploit:Win32/CVE-2010-3333 20161013
eScan Exploit.CVE-2010-3333.Gen 20161013
NANO-Antivirus Exploit.Rtf.CVE-2010-3333.hzts 20161013
Qihoo-360 virus.exp.20103333 20161013
Rising Hack.Exploit.Script.CVE-2010-3333.a (classic) 20161013
Sophos AV Exp/20103333-A 20161013
Tencent Word.Exploit.Cve-2010-3333.Hsir 20161013
TrendMicro EXPL_CVE20103333 20161013
VIPRE Exploit.RTF.CVE-2010-3333 (v) 20161013
AegisLab 20161012
AhnLab-V3 20161012
Alibaba 20161012
CMC 20161012
Comodo 20161013
CrowdStrike Falcon (ML) 20160725
ESET-NOD32 20161013
F-Prot 20161013
Sophos ML 20160928
Jiangmin 20161012
K7AntiVirus 20161012
K7GW 20161013
Kingsoft 20161013
Malwarebytes 20161013
nProtect 20161013
Panda 20161012
SUPERAntiSpyware 20161013
Symantec 20161013
TheHacker 20161011
TrendMicro-HouseCall 20161013
VBA32 20161012
ViRobot 20161013
Yandex 20161011
Zillya 20161012
Zoner 20161013
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
0
Embedded drawings
1
Rtf header
rtf1
Read only protection
False
User protection
False
Default character set
ANSI (default)
Custom xml data properties
0
Dos stubs
0
Embedded pictures
0
Longest hex string
102818
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

File identification
MD5 2c51251c6f246946c206f0a8bedd041b
SHA1 2cef857dcc95d21d55f07b4b202089e9f88ceb1a
SHA256 672042e7cd634775e36010d69c363f72f3f249636d02b5d4eced10f558a587b5
ssdeep
3072:U6poxgoU7stApQtrsuOc715W4+H013lEM5fK:5poxw7sGpQC1Ag48O3lE

File size 104.0 KB ( 106496 bytes )
File type Rich Text Format
Magic literal
Rich Text Format data, version 1, unknown character set

TrID Rich Text Format (100.0%)
Tags
cve-2010-3333 exploit rtf

VirusTotal metadata
First submission 2016-10-07 18:55:12 UTC ( 2 years, 2 months ago )
Last submission 2018-08-25 05:14:50 UTC ( 3 months, 2 weeks ago )
File names a.rtf
file.None.0xfffffa80040b3260.Important_ECORP_Lawsuit_Washington_Leak.rtf.dat
file.None.0xfffffa80040b3260.dat
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!