× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9d560407f69382c0b71c2c0461d280c7454824548e5af08b6c8234beaa7a1eac
File name: dttcodexgigas.807aa649acd68e368b7a97db6e2b845a762d83c7
Detection ratio: 30 / 57
Analysis date: 2018-11-07 03:12:32 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Exploit.RTF-ObfsStrm.Gen 20181107
AhnLab-V3 RTF/Malform-A.Gen 20181106
Antiy-AVL Trojan[Exploit]/RTF.CVE-2017-0199 20181106
Arcabit Exploit.RTF-ObfsStrm.Gen 20181107
Avira (no cloud) EXP/CVE-2017-0199.Gen 20181106
Baidu Win32.Exploit.CVE-2017-0199.g 20181106
BitDefender Exploit.RTF-ObfsStrm.Gen 20181107
CAT-QuickHeal Exp.RTF.CVE-2017-0199.AL 20181105
Cyren CVE-2017-0199.A.gen!Camelot 20181107
DrWeb Exploit.Rtf.CVE2012-0158 20181107
Emsisoft Exploit.RTF-ObfsStrm.Gen (B) 20181107
ESET-NOD32 Win32/Exploit.Agent.MY 20181107
F-Secure Exploit.RTF-ObfsStrm.Gen 20181107
GData Script.Exploit.CVE-2017-0199.A 20181107
Ikarus Exploit.CVE-2017-8570 20181106
Kaspersky HEUR:Exploit.MSOffice.Generic 20181106
MAX malware (ai score=84) 20181107
McAfee Exploit-CVE2017-11882.ax 20181107
McAfee-GW-Edition Exploit-CVE2017-11882.ax 20181106
Microsoft Trojan:Win32/Skeeyah.A!rfn 20181107
eScan Exploit.RTF-ObfsStrm.Gen 20181107
NANO-Antivirus Exploit.Rtf.Heuristic-rtf.dinbqn 20181107
Qihoo-360 susp.rtf.objupdate.c 20181107
Symantec Trojan.Gen.NPE 20181106
TACHYON Suspicious/RTF.Obfus.Gen 20181107
Tencent Office.Exploit.Generic.Wsjv 20181107
TrendMicro Trojan.Win32.CVE201711882.SMA 20181107
TrendMicro-HouseCall Trojan.Win32.CVE201711882.SMA 20181107
ZoneAlarm by Check Point HEUR:Exploit.MSOffice.Generic 20181107
Zoner Probably RTFBadSpacing 20181107
AegisLab 20181107
Alibaba 20180921
ALYac 20181107
Avast 20181107
Avast-Mobile 20181106
AVG 20181107
Babable 20180918
Bkav 20181107
ClamAV 20181107
CMC 20181107
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181107
eGambit 20181107
Endgame 20180730
F-Prot 20181107
Fortinet 20181107
Sophos ML 20180717
Jiangmin 20181106
K7AntiVirus 20181106
K7GW 20181106
Kingsoft 20181107
Malwarebytes 20181107
Palo Alto Networks (Known Signatures) 20181107
Panda 20181106
Rising 20181107
SentinelOne (Static ML) 20181011
Sophos AV 20181107
SUPERAntiSpyware 20181107
Symantec Mobile Insight 20181105
TheHacker 20181104
TotalDefense 20181106
Trustlook 20181107
VBA32 20181106
VIPRE 20181107
ViRobot 20181106
Webroot 20181107
Yandex 20181106
Zillya 20181106
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
0
Embedded drawings
0
Rtf header
rtv0
Longest hex string
1823
Read only protection
False
User protection
False
Default character set
ANSI (default)
Custom xml data properties
0
Dos stubs
0
Objects
OLE autolink (\'57\'6f\'72\'64.Document.8)
Embedded pictures
0
Default languages
English - United States, Arabic - Saudi Arabia, Chinese - People's Republic of China
File identification
MD5 d797352e5df981c5529f0a5d5c121d04
SHA1 807aa649acd68e368b7a97db6e2b845a762d83c7
SHA256 9d560407f69382c0b71c2c0461d280c7454824548e5af08b6c8234beaa7a1eac
ssdeep
48:W/+zc3wDV/CQEEcU5HVEglNFb4Sn0vhe86nm:W/cxDV/Cy53brnIU86nm

File size 42.4 KB ( 43461 bytes )
File type Rich Text Format
Magic literal
data

TrID Unknown!
Tags
rtf cve-2017-11882 cve-2017-8570 exploit ole-autolink cve-2017-0199

VirusTotal metadata
First submission 2018-11-05 10:57:23 UTC ( 5 months, 2 weeks ago )
Last submission 2018-11-16 05:27:16 UTC ( 5 months ago )
File names d797352e5df981c5529f0a5d5c121d04
Kntrl.doc
dttcodexgigas.807aa649acd68e368b7a97db6e2b845a762d83c7
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!