× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
File name: vti-rescan
Detection ratio: 33 / 56
Analysis date: 2018-11-16 10:06:54 UTC ( 2 months, 1 week ago )
Antivirus Result Update
Ad-Aware Exploit.CVE-2010-3333.Gen 20181116
AegisLab Hacktool.MSWord.CVE-2010-3333.3!c 20181116
AhnLab-V3 RTF/Cve-2010-3333 20181115
ALYac Exploit.CVE-2010-3333.Gen 20181116
Antiy-AVL Trojan[Exploit]/Office.CVE-2010-3333 20181116
Arcabit Exploit.CVE-2010-3333.Gen 20181116
Avast RTF:CVE-2010-3333-BZ [Expl] 20181116
AVG RTF:CVE-2010-3333-BZ [Expl] 20181116
Avira (no cloud) EXP/CVE-2010-3333 20181116
Baidu RTF.Exploit.CVE-2010-3333.a 20181116
BitDefender Exploit.CVE-2010-3333.Gen 20181116
Bkav Exploit.Office.Heur 20181116
CAT-QuickHeal Exp.RTF.Shellcode.CL 20181115
DrWeb Exploit.Rtf.12 20181116
Emsisoft Exploit.CVE-2010-3333.Gen (B) 20181116
ESET-NOD32 Win32/Exploit.CVE-2010-3333.AC 20181116
F-Secure Exploit.CVE-2010-3333.Gen 20181116
Fortinet MSWord/CVE20103333.A!exploit 20181116
GData Exploit.CVE-2010-3333.Gen 20181116
Ikarus Exploit.MSWord.Agent 20181116
Kaspersky Exploit.MSWord.CVE-2010-3333.ci 20181116
MAX malware (ai score=98) 20181116
McAfee Exploit-CVE2010-3333 20181116
McAfee-GW-Edition Exploit-CVE2010-3333 20181116
eScan Exploit.CVE-2010-3333.Gen 20181116
NANO-Antivirus Exploit.Rtf.CVE-2010-3333.hzts 20181116
Qihoo-360 Win32/Trojan.Exploit.920 20181116
Sophos AV Exp/20103333-A 20181116
Symantec Trojan.Mdropper 20181116
Tencent Word.Exploit.Cve-2010-3333.Cre 20181116
TrendMicro TROJ_MDROP.USR 20181116
TrendMicro-HouseCall TROJ_MDROP.USR 20181116
ZoneAlarm by Check Point Exploit.MSWord.CVE-2010-3333.ci 20181116
Alibaba 20180921
Avast-Mobile 20181115
Babable 20180918
ClamAV 20181116
CMC 20181116
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181116
Cyren 20181116
eGambit 20181116
Endgame 20181108
F-Prot 20181116
Sophos ML 20181108
Jiangmin 20181116
K7AntiVirus 20181116
K7GW 20181116
Kingsoft 20181116
Malwarebytes 20181116
Microsoft 20181116
Palo Alto Networks (Known Signatures) 20181116
Panda 20181115
Rising 20181116
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181114
Symantec Mobile Insight 20181108
TACHYON 20181116
TheHacker 20181113
TotalDefense 20181116
Trustlook 20181116
VBA32 20181115
ViRobot 20181116
Webroot 20181116
Yandex 20181115
Zillya 20181115
Zoner 20181116
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
175
Embedded drawings
1
Rtf header
rtf1
Read only protection
False
User protection
False
Default character set
ANSI (default)
Custom xml data properties
0
Dos stubs
0
Embedded pictures
0
Longest hex string
753
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

File identification
MD5 0436754886be3b06d0765fc096bfcb62
SHA1 e2f2b61cda9f447520ddc109fd5beee9e0899523
SHA256 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
ssdeep
48:Cl6mnZLZ833233gT9d31sKzvf3+FdzNRH7ofFjE1Y3oqxBZg8b2Z:C8mnVZ833233gT9d31jf3+nHMNjE18oB

File size 2.7 KB ( 2749 bytes )
File type Rich Text Format
Magic literal
Rich Text Format data, version 1, unknown character set

TrID Rich Text Format (100.0%)
Tags
cve-2010-3333 exploit rtf

VirusTotal metadata
First submission 2012-07-04 16:12:32 UTC ( 6 years, 6 months ago )
Last submission 2018-04-02 22:27:51 UTC ( 9 months, 3 weeks ago )
File names vti-rescan
exploit.doc
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!