× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
File name: vti-rescan
Detection ratio: 37 / 58
Analysis date: 2018-04-02 22:27:51 UTC ( 2 weeks, 5 days ago )
Antivirus Result Update
Ad-Aware Exploit.CVE-2010-3333.Gen 20180402
AegisLab Exploit.Msword.Cve!c 20180402
AhnLab-V3 RTF/Cve-2010-3333 20180402
ALYac Exploit.CVE-2010-3333.Gen 20180402
Antiy-AVL Trojan[Exploit]/Office.CVE-2010-3333 20180402
Arcabit Exploit.CVE-2010-3333.Gen 20180402
Avast RTF:CVE-2010-3333-BZ [Expl] 20180402
AVG RTF:CVE-2010-3333-BZ [Expl] 20180402
Avira (no cloud) EXP/CVE-2010-3333.A.561 20180402
AVware Exploit.RTF.CVE-2010-3333 (v) 20180402
Baidu RTF.Exploit.CVE-2010-3333.a 20180402
BitDefender Exploit.CVE-2010-3333.Gen 20180402
Bkav Exploit.Office.Heur 20180402
CAT-QuickHeal Exp.RTF.Shellcode.CL 20180402
Comodo UnclassifiedMalware 20180402
Cyren CVE-2010-3333!Camelot 20180402
DrWeb Exploit.Rtf.12 20180402
Emsisoft Exploit.CVE-2010-3333.Gen (B) 20180402
ESET-NOD32 Win32/Exploit.CVE-2010-3333.AC 20180402
F-Secure Exploit.CVE-2010-3333.Gen 20180402
Fortinet MSWord/CVE20103333.A!exploit 20180402
GData Exploit.CVE-2010-3333.Gen 20180402
Ikarus Exploit.MSWord.Agent 20180402
Kaspersky Exploit.MSWord.CVE-2010-3333.ci 20180402
MAX malware (ai score=81) 20180402
McAfee Exploit-CVE2010-3333 20180402
McAfee-GW-Edition Exploit-CVE2010-3333 20180402
eScan Exploit.CVE-2010-3333.Gen 20180402
NANO-Antivirus Exploit.Rtf.CVE-2010-3333.hzts 20180402
Qihoo-360 Win32/Trojan.Exploit.920 20180402
Sophos AV Exp/20103333-A 20180402
Symantec Trojan.Mdropper 20180402
Tencent Word.Exploit.Cve-2010-3333.Cre 20180402
TrendMicro TROJ_MDROP.USR 20180402
TrendMicro-HouseCall TROJ_MDROP.USR 20180402
VIPRE Exploit.RTF.CVE-2010-3333 (v) 20180402
ZoneAlarm by Check Point Exploit.MSWord.CVE-2010-3333.ci 20180402
Alibaba 20180402
Avast-Mobile 20180402
ClamAV 20180402
CMC 20180402
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180402
eGambit 20180402
Endgame 20180316
F-Prot 20180402
Sophos ML 20180121
Jiangmin 20180402
K7AntiVirus 20180402
K7GW 20180402
Kingsoft 20180402
Malwarebytes 20180402
Microsoft 20180402
nProtect 20180402
Palo Alto Networks (Known Signatures) 20180402
Panda 20180402
Rising 20180402
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180402
Symantec Mobile Insight 20180401
TheHacker 20180330
Trustlook 20180402
VBA32 20180402
ViRobot 20180402
WhiteArmor 20180324
Yandex 20180331
Zillya 20180402
Zoner 20180401
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
175
Embedded drawings
1
Rtf header
rtf1
Read only protection
False
User protection
False
Default character set
ANSI (default)
Custom xml data properties
0
Dos stubs
0
Embedded pictures
0
Longest hex string
753
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

File identification
MD5 0436754886be3b06d0765fc096bfcb62
SHA1 e2f2b61cda9f447520ddc109fd5beee9e0899523
SHA256 81e9647a3371568cddd0a4db597de8423179773d910d9a7b3d945cb2c3b7e1c2
ssdeep
48:Cl6mnZLZ833233gT9d31sKzvf3+FdzNRH7ofFjE1Y3oqxBZg8b2Z:C8mnVZ833233gT9d31jf3+nHMNjE18oB

File size 2.7 KB ( 2749 bytes )
File type Rich Text Format
Magic literal
Rich Text Format data, version 1, unknown character set

TrID Rich Text Format (100.0%)
Tags
cve-2010-3333 exploit rtf

VirusTotal metadata
First submission 2012-07-04 16:12:32 UTC ( 5 years, 9 months ago )
Last submission 2018-04-02 22:27:51 UTC ( 2 weeks, 5 days ago )
File names vti-rescan
exploit.doc
ExifTool file metadata
MIMEType
text/rtf

FileType
RTF

Warning
Unspecified RTF encoding. Will assume Latin

FileTypeExtension
rtf

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!