× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 77f9592780aa111bff267ced6c83653de92cc9512b250983bffe361c41f0e546
File name: Info_K0UB.doc
Detection ratio: 12 / 58
Analysis date: 2019-02-04 13:05:12 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Endgame malicious (high confidence) 20181108
K7AntiVirus Trojan ( 00536d111 ) 20190204
K7GW Trojan ( 00536d111 ) 20190204
Microsoft Trojan:O97M/Sonbokli.A!cl 20190204
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190204
Qihoo-360 virus.office.qexvmc.1080 20190204
SentinelOne (Static ML) static engine - malicious 20190203
TACHYON Suspicious/W97M.Obfus.Gen.1 20190204
Tencent Heur.Macro.Generic.Gen.h 20190204
TrendMicro HEUR_VBA.O.ELBP 20190204
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190204
Zoner Probably W97Shell 20190204
Acronis 20190130
Ad-Aware 20190204
AegisLab 20190204
AhnLab-V3 20190204
Alibaba 20180921
ALYac 20190204
Antiy-AVL 20190204
Arcabit 20190204
Avast 20190204
Avast-Mobile 20190204
AVG 20190204
Avira (no cloud) 20190204
Babable 20180918
Baidu 20190202
BitDefender 20190204
Bkav 20190201
CAT-QuickHeal 20190203
ClamAV 20190204
CMC 20190204
Comodo 20190204
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190204
Cyren 20190204
DrWeb 20190204
eGambit 20190204
Emsisoft 20190204
ESET-NOD32 20190204
F-Prot 20190204
F-Secure 20190204
Fortinet 20190201
GData 20190204
Ikarus 20190204
Sophos ML 20181128
Jiangmin 20190204
Kaspersky 20190204
Kingsoft 20190204
Malwarebytes 20190204
MAX 20190204
McAfee 20190204
McAfee-GW-Edition 20190203
eScan 20190204
Palo Alto Networks (Known Signatures) 20190204
Panda 20190203
Rising 20190204
Sophos AV 20190204
SUPERAntiSpyware 20190130
Symantec 20190204
TheHacker 20190203
Trapmine 20190123
TrendMicro-HouseCall 20190204
Trustlook 20190204
VBA32 20190204
ViRobot 20190203
Webroot 20190204
Yandex 20190203
Zillya 20190201
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-04 11:03:00
revision_number
2
author
admin
page_count
1
last_saved
2019-02-04 11:03:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
1
code_page
Cyrillic
Document summary
line_count
1
company
Salve
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
18240
type_literal
stream
sid
25
name
\x01CompObj
size
114
type_literal
stream
sid
4
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
3
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
1
name
1Table
size
7296
type_literal
stream
sid
24
name
Macros/PROJECT
size
588
type_literal
stream
sid
23
name
Macros/PROJECTwm
size
122
type_literal
stream
sid
12
type
macro
name
Macros/VBA/DCla3LIs
size
1252
type_literal
stream
sid
7
type
macro
name
Macros/VBA/ThisDocument
size
1458
type_literal
stream
sid
14
name
Macros/VBA/_VBA_PROJECT
size
3776
type_literal
stream
sid
16
name
Macros/VBA/__SRP_0
size
2236
type_literal
stream
sid
17
name
Macros/VBA/__SRP_1
size
206
type_literal
stream
sid
8
name
Macros/VBA/__SRP_2
size
532
type_literal
stream
sid
9
name
Macros/VBA/__SRP_3
size
156
type_literal
stream
sid
11
type
macro
name
Macros/VBA/a3U62fHLX
size
1112
type_literal
stream
sid
15
name
Macros/VBA/dir
size
940
type_literal
stream
sid
13
type
macro (only attributes)
name
Macros/VBA/f
size
1172
type_literal
stream
sid
10
type
macro
name
Macros/VBA/xqDzK
size
1719
type_literal
stream
sid
21
name
Macros/f/\x01CompObj
size
97
type_literal
stream
sid
22
name
Macros/f/\x03VBFrame
size
284
type_literal
stream
sid
19
name
Macros/f/f
size
126
type_literal
stream
sid
20
name
Macros/f/o
size
1920
type_literal
stream
sid
2
name
WordDocument
size
47268
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 75 bytes
[+] xqDzK.bas Macros/VBA/xqDzK 324 bytes
exe-pattern run-file
[+] a3U62fHLX.bas Macros/VBA/a3U62fHLX 147 bytes
[+] DCla3LIs.bas Macros/VBA/DCla3LIs 175 bytes
ExifTool file metadata
SharedDoc
No

Author
admin

CodePage
Windows Cyrillic

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:04 10:03:00

Company
Salve

Characters
1

HyperlinksChanged
No

RevisionNumber
2

MIMEType
application/msword

Words
0

CreateDate
2019:02:04 10:03:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
1Table, ExtChar

File identification
MD5 f1d5c950556cc2e0429b5a21a05ba830
SHA1 8d92f095e69733326f2b958e535ab48ff7fcb8cb
SHA256 77f9592780aa111bff267ced6c83653de92cc9512b250983bffe361c41f0e546
ssdeep
1536:4sO5ucuqIljPOs+jH8VuVllNVJ850lYV/XySlSrvTUB5BEw:455ucglqs28YbdJ85BV/Xy+SrvTUB5Bf

File size 86.5 KB ( 88576 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: admin, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Feb 03 10:03:00 2019, Last Saved Time/Date: Sun Feb 03 10:03:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file exe-pattern doc

VirusTotal metadata
First submission 2019-02-04 13:00:27 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-09 10:22:59 UTC ( 1 month, 2 weeks ago )
File names proposition_cFgO.doc
letter_UJ6J.doc
offer_bk22.doc
list_krKd.doc
proposal_QsFG.doc
Invoice_4o1n.doc
Invoice_Yzlt.doc
Info_K0UB.doc
Inquiry_ugER.doc
list_JLOA.doc
Information_zsrS.doc
proposal_JkTc.doc
offer_m6qF.doc
In_UjN0.doc
Files_zyGV.doc
Info_7G0x.doc
proposal_qlwg.doc
letter_AOxs.doc
Files_Ir6f.doc
proposition_b0SL.doc
letter_CXjr.doc
proffer_mCEy.doc
Info_YxME.doc
In_VI3Q.doc
f1d5c950556cc2e0429b5a21a05ba830.virobj
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!