× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 83406efe7ed88bd7a744baf9244367baf4c118a06e77e40210dc0da01c315c01
File name: myrFO3.swf
Detection ratio: 8 / 46
Analysis date: 2013-02-25 22:25:26 UTC ( 4 years, 2 months ago ) View latest
Antivirus Result Update
AntiVir EXP/FLASH.Ikwlino.Gen 20130225
Avast Win32:Malware-gen 20130225
Comodo UnclassifiedMalware 20130225
GData Win32:Malware-gen 20130225
Ikarus Trojan-Downloader.Win32.Small 20130225
Microsoft TrojanDownloader:Win32/Small.gen!K 20130225
Symantec Bloodhound.Flash.19 20130225
TrendMicro-HouseCall TROJ_GEN.F47V0222 20130225
Yandex 20130225
AhnLab-V3 20130225
Antiy-AVL 20130225
AVG 20130225
BitDefender 20130225
ByteHero 20130221
CAT-QuickHeal 20130225
ClamAV 20130225
Commtouch 20130225
DrWeb 20130225
Emsisoft 20130225
eSafe 20130211
ESET-NOD32 20130225
F-Prot 20130225
F-Secure 20130225
Fortinet 20130225
Jiangmin 20130225
K7AntiVirus 20130225
Kaspersky 20130225
Kingsoft 20130225
Malwarebytes 20130225
McAfee 20130225
McAfee-GW-Edition 20130225
eScan 20130225
NANO-Antivirus 20130225
Norman 20130225
nProtect 20130225
Panda 20130225
PCTools 20130225
Rising 20130225
Sophos 20130225
SUPERAntiSpyware 20130225
TheHacker 20130224
TotalDefense 20130225
TrendMicro 20130225
VBA32 20130225
VIPRE 20130225
ViRobot 20130225
The file being studied is a SWF file! SWF files deliver vector graphics, text, video, and sound over the Internet.
Commonly abused SWF properties
The studied SWF file makes use of ActionScript3, some exploits have been found in the past targeting the ActionScript Virtual Machine. ActionScript has also been used to force unwanted redirections and other badness. Note that many legitimate flash files may also use it to implement rich content and animations.
The studied SWF file fingerprints the OS executing it.
The studied SWF file performs environment identification.
The flash file embeds one or more Portable Executables.
SWF Properties
SWF version
11
Compression
zlib
Frame size
500.0x375.0 px
Frame count
1
Duration
0.042 seconds
File attributes
HasMetadata, ActionScript3
Unrecognized SWF tags
0
Total SWF tags
11
ActionScript 3 Packages
flash.display
flash.events
flash.media
flash.net
flash.system
flash.text
flash.utils
mx.core
SWF metadata
ExifTool file metadata
ImageSize
500x375

InstanceID
xmp.iid:D657BBA65B7CE211874DF9344184C74E

OriginalDocumentID
xmp.did:603A3FCD8772E211A159DFC8AE3D881C

MetadataDate
2013:02:22 03:19:45+08:00

ModifyDate
2013:02:22 03:19:45+08:00

Format
application/x-shockwave-flash

DerivedFromDocumentID
xmp.did:603A3FCD8772E211A159DFC8AE3D881C

FrameRate
24

FlashVersion
11

DerivedFromOriginalDocumentID
xmp.did:603A3FCD8772E211A159DFC8AE3D881C

Compressed
True

ImageWidth
500

DerivedFromInstanceID
xmp.iid:D557BBA65B7CE211874DF9344184C74E

FrameCount
1

MIMEType
application/x-shockwave-flash

FileType
SWF

Megapixels
0.188

ImageHeight
375

DocumentID
xmp.did:D657BBA65B7CE211874DF9344184C74E

FileTypeExtension
swf

Duration
0.04 s

FlashAttributes
ActionScript3, HasMetadata

File identification
MD5 506fe8f82ea151959c5160bc40da25b5
SHA1 23327c9599da6dda9c53aaff17c7a5ed63893004
SHA256 83406efe7ed88bd7a744baf9244367baf4c118a06e77e40210dc0da01c315c01
ssdeep
768:266lcOlhL+6/rZWpHg2pxW0ehHF16/2hTNGkNc495n/I8kmRMX8:2WOlhL+6FWpHN8hl1BTNGkJy8nV

File size 39.4 KB ( 40350 bytes )
File type Flash
Magic literal
Macromedia Flash data (compressed), version 11

TrID Macromedia Flash Player Compressed Movie (100.0%)
Tags
os-checking zlib cve-2013-0634 flash capabilities exploit exe-embedded cve-2015-0323

VirusTotal metadata
First submission 2013-02-22 16:12:04 UTC ( 4 years, 2 months ago )
Last submission 2013-07-14 13:21:26 UTC ( 3 years, 9 months ago )
File names vti-rescan
myrFO3.swf.infected
myrFO3.swf
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!