× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 91d6a575782c9957447fb520a693d45941a862a4abf23a1edb5b2637ab208cc3
File name: 6c89f7d5783d9987f42c5fea73344763fb9b137d
Detection ratio: 27 / 60
Analysis date: 2018-04-29 01:36:07 UTC ( 9 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware VB:Trojan.Valyria.1722 20180428
AegisLab Mo97.Downloader.Qv!c 20180428
Arcabit HEUR.VBA.Trojan.e 20180428
Avast MO97:Downloader-QV [Trj] 20180428
AVG MO97:Downloader-QV [Trj] 20180428
AVware LooksLike.Macro.Malware.k (v) 20180428
BitDefender VB:Trojan.Valyria.1722 20180428
ClamAV Doc.Dropper.Agent-6520875-0 20180428
Emsisoft VB:Trojan.Valyria.1722 (B) 20180428
ESET-NOD32 VBA/TrojanDownloader.Agent.HYN 20180428
F-Secure VB:Trojan.Valyria.1722 20180428
GData VB:Trojan.Valyria.1722 20180428
Ikarus Trojan.VB.Valyria 20180428
Kaspersky HEUR:Trojan.Script.Agent.gen 20180428
MAX malware (ai score=94) 20180429
Microsoft Trojan:Script/Cloxer.A!cl 20180428
eScan VB:Trojan.Valyria.1722 20180428
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20180428
Qihoo-360 virus.office.qexvmc.1075 20180429
Rising Trojan.Confusion!1.AD86 (CLASSIC) 20180428
Sophos AV Troj/DocDl-NOR 20180428
Symantec W97M.Downloader 20180428
TrendMicro TROJ_FRS.VSN1CD18 20180428
TrendMicro-HouseCall TROJ_FRS.VSN1CD18 20180428
VIPRE LooksLike.Macro.Malware.k (v) 20180428
ZoneAlarm by Check Point HEUR:Trojan.Script.Agent.gen 20180428
Zoner Probably W97Obfuscated 20180428
AhnLab-V3 20180428
Alibaba 20180428
ALYac 20180428
Antiy-AVL 20180428
Avast-Mobile 20180428
Avira (no cloud) 20180428
Babable 20180406
Baidu 20180428
Bkav 20180426
CAT-QuickHeal 20180428
CMC 20180428
Comodo 20180428
CrowdStrike Falcon (ML) 20180418
Cybereason None
Cylance 20180429
Cyren 20180428
DrWeb 20180428
eGambit 20180429
Endgame 20180402
F-Prot 20180428
Fortinet 20180428
Sophos ML 20180120
Jiangmin 20180428
K7AntiVirus 20180428
K7GW 20180428
Kingsoft 20180429
Malwarebytes 20180428
McAfee 20180428
McAfee-GW-Edition 20180425
nProtect 20180428
Palo Alto Networks (Known Signatures) 20180429
Panda 20180428
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180428
Symantec Mobile Insight 20180424
Tencent 20180429
TheHacker 20180426
TotalDefense 20180428
Trustlook 20180429
VBA32 20180428
ViRobot 20180428
Webroot 20180429
Yandex 20180428
Zillya 20180427
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-04-27 20:44:00
author
Vitogynedaxi
title
Vitogynedaxi
page_count
1
last_saved
2018-04-27 20:44:00
revision_number
1
application_name
Microsoft Office Word
character_count
1
template
Normal.dotm
code_page
Latin I
subject
Vitogynedaxidu
Document summary
category
Vitogy
line_count
1
company
Vitogyne
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
5248
type_literal
stream
sid
20
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
332
type_literal
stream
sid
4
name
\x05SummaryInformation
size
440
type_literal
stream
sid
2
name
1Table
size
8098
type_literal
stream
sid
1
name
Data
size
22273
type_literal
stream
sid
18
name
Macros/PROJECT
size
548
type_literal
stream
sid
19
name
Macros/PROJECTwm
size
140
type_literal
stream
sid
15
type
macro
name
Macros/VBA/HKaXrwPZBTn
size
17200
type_literal
stream
sid
13
type
macro
name
Macros/VBA/PwnujMaI
size
6944
type_literal
stream
sid
16
name
Macros/VBA/_VBA_PROJECT
size
39001
type_literal
stream
sid
9
name
Macros/VBA/__SRP_0
size
1474
type_literal
stream
sid
10
name
Macros/VBA/__SRP_1
size
183
type_literal
stream
sid
11
name
Macros/VBA/__SRP_2
size
652
type_literal
stream
sid
12
name
Macros/VBA/__SRP_3
size
333
type_literal
stream
sid
8
name
Macros/VBA/dir
size
693
type_literal
stream
sid
14
type
macro
name
Macros/VBA/ubQSzajRj
size
46684
type_literal
stream
sid
17
type
macro
name
Macros/VBA/zmkWsDZTVEwALR
size
14918
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] PwnujMaI.cls Macros/VBA/PwnujMaI 3435 bytes
obfuscated
[+] HKaXrwPZBTn.bas Macros/VBA/HKaXrwPZBTn 10532 bytes
obfuscated
[+] ubQSzajRj.bas Macros/VBA/ubQSzajRj 30492 bytes
obfuscated run-file
[+] zmkWsDZTVEwALR.bas Macros/VBA/zmkWsDZTVEwALR 9210 bytes
obfuscated
ExifTool file metadata
Category
Vitogy

SharedDoc
No

Author
Vitogynedaxi

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:04:27 19:44:00

Company
Vitogyne

Title
Vitogynedaxi

Characters
1

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
0

CreateDate
2018:04:27 19:44:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

Warning
Error reading property value

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

Subject
Vitogynedaxidu

File identification
MD5 261c2ae10e5b71c07f9d47b3d96f1891
SHA1 8ffbe28851880c331166dd19033483c34200f89f
SHA256 91d6a575782c9957447fb520a693d45941a862a4abf23a1edb5b2637ab208cc3
ssdeep
3072:g7EdFNUzxo02CX0fbeQymrugs6H1wpJMgva:BdFNUdo0J0Emrugs6H1wpJe

File size 176.0 KB ( 180224 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Vitogynedaxi, Subject: Vitogynedaxidu, Author: Vitogynedaxi, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Apr 26 19:44:00 2018, Last Saved Time/Date: Thu Apr 26 19:44:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc

VirusTotal metadata
First submission 2018-04-27 20:02:19 UTC ( 9 months, 4 weeks ago )
Last submission 2018-07-22 04:39:41 UTC ( 7 months ago )
File names Outstanding Invoices.doc
Invoice 85207656 April.doc
58.doc
6c89f7d5783d9987f42c5fea73344763fb9b137d
Inv 285427 - PO #2B545222.doc
4 Past Due Invoices.doc
Invoice 66640066 April.doc
Question.doc
output.113231070.txt
Invoice for you.doc
Invoice 4276492 April.doc
Paid Invoices.doc
Fwd: ACH form.doc
Invoice Number 43750.doc
ACH form.doc
Invoice #5104635.doc
output.113274581.txt
Invoice.doc
Invoice Number 210666.doc
Invoice 31491077 April.doc
New order.doc
Service Report (1039).doc
Need to send the attachment.doc
Past Due Invoices.doc
Invoice 41146496 April.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!