× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9ba4ecc5d067b1dabc85fe725700111c3c8e8dc4926f8f745c9e5c426de65551
File name: emotet_e2_9ba4ecc5d067b1dabc85fe725700111c3c8e8dc4926f8f745c9e5c4...
Detection ratio: 39 / 59
Analysis date: 2019-02-04 19:35:50 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware W97M.DownLoader.HWF 20190204
AegisLab Trojan.MSWord.Agent.4!c 20190204
AhnLab-V3 DOC/Downloader 20190204
ALYac W97M.DownLoader.HWF 20190204
Antiy-AVL Trojan[Downloader]/MSOffice.Agent.mlc 20190204
Arcabit W97M.DownLoader.HWF 20190204
Avast Other:Malware-gen [Trj] 20190204
AVG Other:Malware-gen [Trj] 20190204
Avira (no cloud) VBA/Dldr.Agent.bvojm 20190204
Baidu VBA.Trojan-Downloader.Agent.edq 20190202
BitDefender W97M.DownLoader.HWF 20190204
ClamAV Doc.Dropper.Agent-6843193-0 20190204
Cyren W97M/Sonbokli 20190204
DrWeb W97M.DownLoader.3315 20190204
Emsisoft W97M.DownLoader.HWF (B) 20190204
Endgame malicious (high confidence) 20181108
ESET-NOD32 VBA/TrojanDownloader.Agent.MLC 20190204
F-Prot New or modified W97M/Sonbokli 20190204
F-Secure W97M.DownLoader.HWF 20190204
GData W97M.DownLoader.HWF 20190204
Ikarus Trojan-Downloader.VBA.Agent 20190204
K7AntiVirus Trojan ( 00536d111 ) 20190204
K7GW Trojan ( 00536d111 ) 20190204
Kaspersky Trojan-Downloader.MSWord.Agent.cex 20190204
McAfee RDN/Generic.dx 20190204
McAfee-GW-Edition BehavesLike.Downloader.dl 20190204
Microsoft Trojan:Win32/Occamy.C 20190204
eScan W97M.DownLoader.HWF 20190204
Qihoo-360 virus.office.qexvmc.1090 20190204
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Troj/DocDl-RTZ 20190204
Symantec Trojan.Gen.2 20190204
TACHYON Suspicious/W97M.Obfus.Gen.6 20190204
Tencent Heur.Macro.Generic.Gen.f 20190204
TrendMicro Trojan.W97M.POWLOAD.THBODAI 20190204
TrendMicro-HouseCall Trojan.W97M.POWLOAD.THBODAI 20190204
ViRobot DOC.Z.Agent.271872.AV 20190203
ZoneAlarm by Check Point Trojan-Downloader.MSWord.Agent.cex 20190204
Zoner Probably W97Obfuscated 20190204
Acronis 20190130
Alibaba 20180921
Avast-Mobile 20190204
Babable 20180918
Bkav 20190201
CAT-QuickHeal 20190204
CMC 20190204
Comodo 20190204
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190204
eGambit 20190204
Fortinet 20190201
Sophos ML 20181128
Jiangmin 20190204
Kingsoft 20190204
Malwarebytes 20190204
MAX 20190204
NANO-Antivirus 20190204
Palo Alto Networks (Known Signatures) 20190204
Panda 20190204
Rising 20190204
SUPERAntiSpyware 20190130
TheHacker 20190203
TotalDefense 20190204
Trapmine 20190123
Trustlook 20190204
VBA32 20190204
Webroot 20190204
Yandex 20190204
Zillya 20190201
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-01 21:51:00
revision_number
4
author
admin
page_count
1
last_saved
2019-02-01 21:52:00
edit_time
60
template
Normal.dotm
application_name
Microsoft Office Word
character_count
1
code_page
Cyrillic
Document summary
line_count
1
company
Salve
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
19072
type_literal
stream
sid
26
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
7046
type_literal
stream
sid
1
name
Data
size
224579
type_literal
stream
sid
24
name
Macros/PROJECT
size
598
type_literal
stream
sid
25
name
Macros/PROJECTwm
size
131
type_literal
stream
sid
19
type
macro
name
Macros/VBA/RejH9yKR
size
1235
type_literal
stream
sid
20
type
macro
name
Macros/VBA/T0hAE9Cp
size
2367
type_literal
stream
sid
22
type
macro
name
Macros/VBA/ThisDocument
size
1671
type_literal
stream
sid
23
name
Macros/VBA/_VBA_PROJECT
size
3917
type_literal
stream
sid
15
name
Macros/VBA/__SRP_0
size
2231
type_literal
stream
sid
16
name
Macros/VBA/__SRP_1
size
206
type_literal
stream
sid
17
name
Macros/VBA/__SRP_2
size
532
type_literal
stream
sid
18
name
Macros/VBA/__SRP_3
size
156
type_literal
stream
sid
14
name
Macros/VBA/dir
size
954
type_literal
stream
sid
13
type
macro (only attributes)
name
Macros/VBA/f
size
1173
type_literal
stream
sid
21
type
macro
name
Macros/VBA/wIS4PAO8m
size
1279
type_literal
stream
sid
10
name
Macros/f/\x01CompObj
size
97
type_literal
stream
sid
11
name
Macros/f/\x03VBFrame
size
284
type_literal
stream
sid
8
name
Macros/f/f
size
122
type_literal
stream
sid
9
name
Macros/f/o
size
1416
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 155 bytes
[+] T0hAE9Cp.bas Macros/VBA/T0hAE9Cp 667 bytes
run-file
[+] wIS4PAO8m.bas Macros/VBA/wIS4PAO8m 218 bytes
[+] RejH9yKR.bas Macros/VBA/RejH9yKR 193 bytes
ExifTool file metadata
SharedDoc
No

Author
admin

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:01 20:52:00

Company
Salve

Characters
1

CodePage
Windows Cyrillic

RevisionNumber
4

MIMEType
application/msword

Words
0

CreateDate
2019:02:01 20:51:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
1 minute

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 ac8471956b2b97fe2f87fc778c401491
SHA1 a9950049b4ee635b86e923665671455ea6193a47
SHA256 9ba4ecc5d067b1dabc85fe725700111c3c8e8dc4926f8f745c9e5c426de65551
ssdeep
6144:wCwQK3RpVS7G4SVuz1QzLhxztsZGPwu41:yQQLGSVuz1QHhxztCu4

File size 265.5 KB ( 271872 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: admin, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 4, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Mon Dec 31 20:51:00 2018, Last Saved Time/Date: Mon Dec 31 20:52:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2019-02-02 06:42:16 UTC ( 3 months, 3 weeks ago )
Last submission 2019-04-16 16:46:20 UTC ( 1 month, 1 week ago )
File names US0988840086.doc
US76487320876993350133.doc
7769055087958.doc
emotet_e2_9ba4ecc5d067b1dabc85fe725700111c3c8e8dc4926f8f745c9e5c426de65551_2019-02-02__063504.doc
PAY172555393539130.doc
1945184199699.doc
US34278566861590711.doc
U12722076317789.doc
170871634969.doc
4350679481098340.doc
PAY2525781392734.doc
7753009379.doc
6209079146996.doc
26868332725348444057.doc
DF7541610904361386.doc
US910507489114587750.doc
US015431748526592747.doc
US33305782408291757.doc
US9769907387.doc
US7638917534512.doc
PAY67231031635.doc
US126430198.doc
PAY0038509427.doc
US1883965556153.doc
PAY06772615620084899.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!