× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
File name: vti-rescan
Detection ratio: 34 / 53
Analysis date: 2016-08-25 23:20:38 UTC ( 3 months, 2 weeks ago )
Antivirus Result Update
ALYac Exploit.CVE-2010-3333.Gen 20160825
AVware Exploit.RTF.CVE-2010-3333 (v) 20160825
Ad-Aware Exploit.CVE-2010-3333.Gen 20160825
AegisLab Exploit.Msword.Cve!c 20160825
AhnLab-V3 RTF/Cve-2010-3333 20160825
Antiy-AVL Trojan[Exploit]/Office.CVE-2010-3333.d 20160825
Arcabit Exploit.CVE-2010-3333.Gen 20160825
Avast RTF:CVE-2010-3333-BZ [Expl] 20160825
Avira (no cloud) EXP/CVE-2010-3333.A.561 20160825
Baidu RTF.Exploit.CVE-2010-3333.a 20160825
BitDefender Exploit.CVE-2010-3333.Gen 20160825
Bkav Exploit.CVE-2012-0158.Heur 20160825
CAT-QuickHeal Exp.RTF.Shellcode.CL 20160825
Comodo UnclassifiedMalware 20160825
Cyren CVE-2010-3333!Camelot 20160825
DrWeb Exploit.Rtf.12 20160825
ESET-NOD32 Win32/Exploit.CVE-2010-3333.AC 20160825
F-Secure Exploit.CVE-2010-3333.Gen 20160826
Fortinet MSWord/CVE20103333.A!exploit 20160826
GData Exploit.CVE-2010-3333.Gen 20160825
Ikarus Exploit.MSWord.Agent 20160825
Kaspersky Exploit.MSWord.CVE-2010-3333.ci 20160825
McAfee Exploit-CVE2010-3333 20160825
McAfee-GW-Edition Exploit-CVE2010-3333 20160825
eScan Exploit.CVE-2010-3333.Gen 20160825
Microsoft Exploit:Win32/CVE-2010-3333 20160825
NANO-Antivirus Exploit.Rtf.CVE-2010-3333.hzts 20160825
Qihoo-360 Win32/Trojan.Exploit.920 20160826
Sophos Exp/20103333-A 20160825
Symantec Trojan.Mdropper 20160825
Tencent Word.Exploit.Cve-2010-3333.Cre 20160826
TrendMicro TROJ_MDROP.USR 20160825
TrendMicro-HouseCall TROJ_MDROP.USR 20160825
VIPRE Exploit.RTF.CVE-2010-3333 (v) 20160825
AVG 20160825
Alibaba 20160825
CMC 20160824
ClamAV 20160825
F-Prot 20160826
Jiangmin 20160825
K7AntiVirus 20160825
K7GW 20160825
Kingsoft 20160826
Malwarebytes 20160825
Panda 20160825
Rising 20160825
SUPERAntiSpyware 20160825
TheHacker 20160824
VBA32 20160825
ViRobot 20160825
Zillya 20160825
Zoner 20160825
nProtect 20160825
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
175
Embedded drawings
1
Rtf header
rtf1
Read only protection
False
User protection
False
Default character set
ANSI (default)
Custom xml data properties
0
Dos stubs
0
Embedded pictures
0
Longest hex string
753
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

File identification
MD5 0436754886be3b06d0765fc096bfcb62
SHA1 e2f2b61cda9f447520ddc109fd5beee9e0899523
SHA256 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
ssdeep
48:Cl6mnZLZ833233gT9d31sKzvf3+FdzNRH7ofFjE1Y3oqxBZg8b2Z:C8mnVZ833233gT9d31jf3+nHMNjE18oB

File size 2.7 KB ( 2749 bytes )
File type Rich Text Format
Magic literal
Rich Text Format data, version 1, unknown character set

TrID Rich Text Format (100.0%)
Tags
cve-2012-0158 cve-2010-3333 exploit rtf

VirusTotal metadata
First submission 2012-07-04 16:12:32 UTC ( 4 years, 5 months ago )
Last submission 2015-02-27 07:07:38 UTC ( 1 year, 9 months ago )
File names vti-rescan
exploit.doc
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!