× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ae4319a7ed13a0f6e7f8b6b4add46445fd695035bf6f33de7fd82118bb288bd4
File name: AnglerEK_2015-10-29_CVE-2015-7645_vip.swf
Detection ratio: 2 / 55
Analysis date: 2015-10-29 13:44:09 UTC ( 3 years, 2 months ago ) View latest
Antivirus Result Update
McAfee-GW-Edition BehavesLike.Flash.Exploit.ng 20151029
TrendMicro HEUR_SWFEXP.W 20151029
Ad-Aware 20151029
AegisLab 20151029
Yandex 20151028
AhnLab-V3 20151029
Alibaba 20151029
ALYac 20151029
Antiy-AVL 20151029
Arcabit 20151029
Avast 20151029
AVG 20151029
Avira (no cloud) 20151029
AVware 20151029
Baidu-International 20151029
BitDefender 20151029
Bkav 20151029
ByteHero 20151029
CAT-QuickHeal 20151029
ClamAV 20151029
CMC 20151029
Comodo 20151029
Cyren 20151029
DrWeb 20151029
Emsisoft 20151029
ESET-NOD32 20151029
F-Prot 20151029
F-Secure 20151029
Fortinet 20151029
GData 20151029
Ikarus 20151029
Jiangmin 20151028
K7AntiVirus 20151029
K7GW 20151029
Kaspersky 20151029
Malwarebytes 20151029
McAfee 20151029
Microsoft 20151029
eScan 20151029
NANO-Antivirus 20151029
nProtect 20151029
Panda 20151028
Qihoo-360 20151029
Rising 20151028
Sophos AV 20151029
SUPERAntiSpyware 20151028
Symantec 20151028
Tencent 20151029
TheHacker 20151028
TrendMicro-HouseCall 20151029
VBA32 20151028
VIPRE 20151029
ViRobot 20151029
Zillya 20151029
Zoner 20151029
The file being studied is a SWF file! SWF files deliver vector graphics, text, video, and sound over the Internet.
Commonly abused SWF properties
The studied SWF file makes use of ActionScript3, some exploits have been found in the past targeting the ActionScript Virtual Machine. ActionScript has also been used to force unwanted redirections and other badness. Note that many legitimate flash files may also use it to implement rich content and animations.
SWF Properties
SWF version
13
Compression
zlib
Frame size
126.0x39.0 px
Frame count
152
Duration
8.444 seconds
File attributes
ActionScript3
Unrecognized SWF tags
0
Total SWF tags
174
ActionScript 3 Packages
flash.display
flash.events
flash.system
flash.utils
SWF metadata
ExifTool file metadata
MIMEType
application/x-shockwave-flash

ImageSize
126x39

FileType
SWF

Megapixels
0.005

FrameRate
18

FlashVersion
13

FileTypeExtension
swf

Compressed
True

ImageWidth
126

Duration
8.44 s

FlashAttributes
ActionScript3

FrameCount
152

ImageHeight
39

File identification
MD5 0d72221d41eff55dcfd0da50cd1c545e
SHA1 1a4f0e3cbc3e161a354def033c0f5e5736fa945b
SHA256 ae4319a7ed13a0f6e7f8b6b4add46445fd695035bf6f33de7fd82118bb288bd4
ssdeep
1536:R8ZQT5bDsqdHhQJgB+o6DDy7xuOc892kbAUmsNU1BP+D5L90XnfhuiAd4vlRI:VV4qQJgcD2z97bAULU6D5R0XnfsqDI

File size 76.3 KB ( 78084 bytes )
File type Flash
Magic literal
Macromedia Flash data (compressed), version 13

TrID Macromedia Flash Player Compressed Movie (100.0%)
Tags
flash exploit zlib cve-2015-7645

VirusTotal metadata
First submission 2015-10-29 13:44:09 UTC ( 3 years, 2 months ago )
Last submission 2017-10-14 12:17:31 UTC ( 1 year, 3 months ago )
File names AnglerEK_2015-10-29_CVE-2015-7645_vip.swf
ae4319a7ed13a0f6e7f8b6b4add46445fd695035bf6f33de7fd82118bb288bd4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!