× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 70f6a2c2976248221c251d9965ff2313bc0ed0aebb098513d76de6d8396a7125
File name: Moh2010.swf
Detection ratio: 0 / 12
Analysis date: 2012-09-15 12:01:01 UTC ( 6 years, 1 month ago ) View latest
Antivirus Result Update
ByteHero 20120910
CAT-QuickHeal 20120915
ClamAV 20120915
Commtouch 20120914
F-Prot 20120914
Ikarus 20120915
Jiangmin 20120915
K7AntiVirus 20120914
SUPERAntiSpyware 20120911
TheHacker 20120915
VIPRE 20120915
VirusBuster 20120915
The file being studied is a SWF file! SWF files deliver vector graphics, text, video, and sound over the Internet.
Commonly abused SWF properties
The studied SWF file makes use of ActionScript3, some exploits have been found in the past targeting the ActionScript Virtual Machine. ActionScript has also been used to force unwanted redirections and other badness. Note that many legitimate flash files may also use it to implement rich content and animations.
The studied SWF file makes use of the loadBytes ActionScript3 functionality, commonly used to load other files and arbitrary code at runtime.
The studied SWF file has been processed with a common flash file obfuscator, similar to portable executable packing, in order to make its reverse engineering more complex.
SWF Properties
SWF version
9
Frame size
9.0x11.0 px
Frame count
1
Duration
0.040 seconds
File attributes
HasMetadata, ActionScript3
Unrecognized SWF tags
0
Total SWF tags
8
ActionScript 3 Packages
flash.display
flash.events
flash.net
flash.system
flash.utils
SWF metadata
ExifTool file metadata
MIMEType
application/x-shockwave-flash

ImageSize
9x11

FileType
SWF

Megapixels
9.9e-05

FrameRate
25

FlashVersion
9

FileTypeExtension
swf

Compressed
False

ImageWidth
9

Duration
0.04 s

FlashAttributes
UseNetwork, [1], [5], [6]

FrameCount
1

ImageHeight
11

File identification
MD5 eb62e0051ad4ab3f626d148472dfa891
SHA1 565136d5b185d42f4510714980466f557b75b79c
SHA256 70f6a2c2976248221c251d9965ff2313bc0ed0aebb098513d76de6d8396a7125
ssdeep
384:2qUAECl5JICP1QxJcd5hDqYBdi7c8Skgzu3W3I:2qUA3SCPejyhnBg/g63W4

File size 13.3 KB ( 13631 bytes )
File type Flash
Magic literal
Macromedia Flash data, version 9

TrID Macromedia Flash Player Movie (100.0%)
Tags
obfuscated flash cve-2012-4969 exploit cve-2010-2884 loadbytes

VirusTotal metadata
First submission 2012-09-14 07:07:08 UTC ( 6 years, 2 months ago )
Last submission 2014-06-13 02:58:35 UTC ( 4 years, 5 months ago )
File names 36d5b185d42f4510714980466f557b75b79c
Moh2010.swf.txt
qtuD.xlsm
file-4525719_
Moh2010.swf
565136d5b185d42f4510714980466f557b75b79c.svn-base
vti-rescan
EB62E0051AD4AB3F626D148472DFA891.dat
Moh2010.swf
eb62e0051ad4ab3f626d148472dfa891
moh2010.swf
Moh2010.swf-
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!