× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
File name: vti-rescan
Detection ratio: 33 / 57
Analysis date: 2015-02-27 07:07:38 UTC ( 5 months, 1 week ago )
Antivirus Result Update
ALYac Exploit.CVE-2010-3333.Gen 20150227
AVware Exploit.RTF.CVE-2010-3333 (v) 20150226
Ad-Aware Exploit.CVE-2010-3333.Gen 20150227
Antiy-AVL Trojan[Exploit]/Office.CVE-2010-3333.d 20150227
Avast RTF:CVE-2010-3333-DO [Expl] 20150227
Avira EXP/CVE-2010-3333.A.561 20150227
BitDefender Exploit.CVE-2010-3333.Gen 20150227
Bkav Exploit.CVE-2012-0158.Heur 20150226
CAT-QuickHeal Exp.RTF.Shellcode.CL 20150227
Comodo UnclassifiedMalware 20150227
DrWeb Exploit.Rtf.12 20150227
ESET-NOD32 Win32/Exploit.CVE-2010-3333.AC 20150227
Emsisoft Exploit.CVE-2010-3333.Gen (B) 20150227
F-Secure Exploit.CVE-2010-3333.Gen 20150227
Fortinet MSWord/CVE20103333.A!exploit 20150227
GData Exploit.CVE-2010-3333.Gen 20150227
Ikarus Exploit.MSWord.Agent 20150227
Kaspersky Exploit.MSWord.CVE-2010-3333.ci 20150227
McAfee Exploit-CVE2010-3333 20150227
McAfee-GW-Edition Exploit-CVE2010-3333 20150227
MicroWorld-eScan Exploit.CVE-2010-3333.Gen 20150227
Microsoft Exploit:Win32/CVE-2010-3333 20150227
NANO-Antivirus Exploit.Rtf.CVE-2010-3333.hzts 20150227
Norman CVE_2010_3333.A 20150226
Qihoo-360 virus.exp.20103333 20150227
Sophos Exp/20103333-A 20150227
Symantec Trojan.Mdropper 20150227
Tencent Word.Exploit.Cve-2010-3333.Cre 20150227
TrendMicro TROJ_MDROP.USR 20150227
TrendMicro-HouseCall TROJ_MDROP.USR 20150227
VIPRE Exploit.RTF.CVE-2010-3333 (v) 20150227
ViRobot MSWord.A.EX-Agent.2749[h] 20150227
nProtect Exploit.CVE-2010-3333.Gen 20150226
AVG 20150227
AegisLab 20150227
Agnitum 20150226
AhnLab-V3 20150227
Alibaba 20150225
Baidu-International 20150226
ByteHero 20150227
CMC 20150227
ClamAV 20150227
Cyren 20150227
F-Prot 20150227
Jiangmin 20150226
K7AntiVirus 20150226
K7GW 20150227
Kingsoft 20150227
Malwarebytes 20150227
Panda 20150226
Rising 20150226
SUPERAntiSpyware 20150227
TheHacker 20150225
TotalDefense 20150227
VBA32 20150226
Zillya 20150226
Zoner 20150223
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
175
Embedded drawings
1
Rtf header
rtf1
Read only protection
False
User protection
False
Default character set
ANSI (default)
Custom xml data properties
0
Dos stubs
0
Embedded pictures
0
Longest hex string
753
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

File identification
MD5 0436754886be3b06d0765fc096bfcb62
SHA1 e2f2b61cda9f447520ddc109fd5beee9e0899523
SHA256 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
ssdeep
48:Cl6mnZLZ833233gT9d31sKzvf3+FdzNRH7ofFjE1Y3oqxBZg8b2Z:C8mnVZ833233gT9d31jf3+nHMNjE18oB

File size 2.7 KB ( 2749 bytes )
File type Rich Text Format
Magic literal
Rich Text Format data, version 1, unknown character set

TrID Rich Text Format (100.0%)
Tags
cve-2012-0158 cve-2010-3333 exploit rtf

VirusTotal metadata
First submission 2012-07-04 16:12:32 UTC ( 3 years, 1 month ago )
Last submission 2015-02-27 07:07:38 UTC ( 5 months, 1 week ago )
File names vti-rescan
exploit.doc
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!