× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: af9bdad4cfd538b6bf23617db51e6499b21eda57aff97e739fba65f3da63631f
File name: Express 96648461362-SPEB-EHD.doc
Detection ratio: 35 / 58
Analysis date: 2018-03-27 19:53:56 UTC ( 11 months ago ) View latest
Antivirus Result Update
Ad-Aware VB:Trojan.Valyria.1454 20180327
AegisLab Troj.Script.Agent!c 20180327
AhnLab-V3 VBA/Downloader 20180327
ALYac VB:Trojan.Valyria.1454 20180327
Antiy-AVL Trojan[Downloader]/MSOffice.Agent.hix 20180327
Arcabit HEUR.VBA.Trojan.e 20180327
Avast Other:Malware-gen [Trj] 20180327
AVG Other:Malware-gen [Trj] 20180327
Avira (no cloud) VBA/Dldr.Agent.yvkvl 20180327
Baidu VBA.Trojan-Downloader.Agent.cpw 20180327
BitDefender VB:Trojan.Valyria.1454 20180327
ClamAV Doc.Dropper.Agent-6480834-0 20180327
Cyren Trojan.SPJW-7 20180327
DrWeb W97M.DownLoader.2581 20180327
Emsisoft Trojan-Downloader.Agent (A) 20180327
ESET-NOD32 VBA/TrojanDownloader.Agent.HIX 20180327
F-Secure VB:Trojan.Valyria.1454 20180327
Fortinet VBA/Agent.HHV!tr 20180327
GData VB:Trojan.Valyria.1454 20180327
Ikarus Trojan-Downloader.VBA.Agent 20180327
Kaspersky HEUR:Trojan.Script.Agent.gen 20180327
MAX malware (ai score=94) 20180327
McAfee RDN/Generic Downloader.x 20180327
McAfee-GW-Edition RDN/Generic Downloader.x 20180327
Microsoft TrojanDownloader:O97M/Donoff!rfn 20180327
eScan VB:Trojan.Valyria.1454 20180327
Rising Macro.Run.d (CLASSIC) 20180327
Sophos AV Troj/DocDl-NDG 20180327
Symantec W97M.Downloader 20180327
Tencent Win32.Trojan-downloader.Agent.Syhk 20180327
TrendMicro W2KM_DLOADER.THCOGAM 20180327
TrendMicro-HouseCall W2KM_POWLOAD.SMSTRV 20180327
ViRobot DOC.Z.Agent.217088.AB 20180327
ZoneAlarm by Check Point HEUR:Trojan.Script.Agent.gen 20180327
Zoner Probably W97Obfuscated 20180326
Alibaba 20180327
Avast-Mobile 20180327
AVware 20180327
Bkav 20180327
CAT-QuickHeal 20180327
CMC 20180327
Comodo 20180327
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180327
eGambit 20180327
Endgame 20180316
F-Prot 20180327
Sophos ML 20180121
Jiangmin 20180327
K7AntiVirus 20180327
K7GW 20180327
Kingsoft 20180327
Malwarebytes 20180327
NANO-Antivirus 20180327
nProtect 20180327
Palo Alto Networks (Known Signatures) 20180327
Panda 20180327
Qihoo-360 20180327
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180327
Symantec Mobile Insight 20180311
TheHacker 20180327
Trustlook 20180327
VBA32 20180327
VIPRE 20180327
WhiteArmor 20180324
Yandex 20180327
Zillya 20180327
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
May create OLE objects.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-03-21 15:35:00
author
Vuxahupo
title
Vuxahupo
page_count
1
last_saved
2018-03-21 15:35:00
revision_number
1
application_name
Microsoft Office Word
character_count
1
template
Normal.dotm
code_page
Latin I
subject
Vuxahupo
Document summary
category
Vuxahu
line_count
1
company
Vuxahupo
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
7424
type_literal
stream
sid
21
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
332
type_literal
stream
sid
4
name
\x05SummaryInformation
size
428
type_literal
stream
sid
2
name
1Table
size
7256
type_literal
stream
sid
1
name
Data
size
20436
type_literal
stream
sid
19
name
Macros/PROJECT
size
605
type_literal
stream
sid
20
name
Macros/PROJECTwm
size
191
type_literal
stream
sid
13
type
macro
name
Macros/VBA/QAkKLIKv
size
1785
type_literal
stream
sid
15
name
Macros/VBA/_VBA_PROJECT
size
43038
type_literal
stream
sid
9
name
Macros/VBA/__SRP_0
size
1398
type_literal
stream
sid
10
name
Macros/VBA/__SRP_1
size
118
type_literal
stream
sid
11
name
Macros/VBA/__SRP_2
size
220
type_literal
stream
sid
12
name
Macros/VBA/__SRP_3
size
66
type_literal
stream
sid
8
name
Macros/VBA/dir
size
764
type_literal
stream
sid
16
type
macro
name
Macros/VBA/hHCAEKhwrlztl
size
63047
type_literal
stream
sid
14
type
macro (only attributes)
name
Macros/VBA/wJFcflwuwq
size
1108
type_literal
stream
sid
17
type
macro
name
Macros/VBA/wNKodkMaHwCbU
size
14967
type_literal
stream
sid
18
type
macro
name
Macros/VBA/wOVjJECihElYUA
size
40479
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] hHCAEKhwrlztl.bas Macros/VBA/hHCAEKhwrlztl 39987 bytes
[+] wOVjJECihElYUA.bas Macros/VBA/wOVjJECihElYUA 25976 bytes
create-ole obfuscated run-file
[+] wNKodkMaHwCbU.bas Macros/VBA/wNKodkMaHwCbU 9253 bytes
obfuscated
[+] QAkKLIKv.bas Macros/VBA/QAkKLIKv 603 bytes
ExifTool file metadata
Category
Vuxahu

SharedDoc
No

Author
Vuxahupo

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:03:21 14:35:00

Company
Vuxahupo

Title
Vuxahupo

Characters
1

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
0

CreateDate
2018:03:21 14:35:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

Subject
Vuxahupo

File identification
MD5 c58026be64edad4f40ced2414c9586b3
SHA1 3c4ffcc7de76fc2bca42ee076535c501c72a6965
SHA256 af9bdad4cfd538b6bf23617db51e6499b21eda57aff97e739fba65f3da63631f
ssdeep
3072:A3iqkU7oBuyjOeMKBqpT/t2ZuP8ljeFKFGK/76/GjAHuGk:A7FUBuyjX/BqdXYXyGjy2

File size 212.0 KB ( 217088 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Vuxahupo, Subject: Vuxahupo, Author: Vuxahupo, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Mar 20 14:35:00 2018, Last Saved Time/Date: Tue Mar 20 14:35:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc create-ole

VirusTotal metadata
First submission 2018-03-21 20:06:50 UTC ( 11 months ago )
Last submission 2018-04-04 20:46:26 UTC ( 10 months, 3 weeks ago )
File names Express 027143366-QSN-FXBJ.doc
Tracking 45929229-AVYL-ICTH.doc
0646609-BFJK-ZTE.doc
Rechnung #1357614.doc
70122709927-CE-OOA.doc
757520815-MQVB-IIV.doc
Tracking-774462-HR-ARDI.doc
Number 924104-UWOB-ZBSAQ.doc
Express 001353-HSW-NDCJ.doc
Rechnung #754431628.doc
Tracking 16625093-NLAP-QRJ.doc
Number 49686923176-APR-UFZ.doc
Tracking-08891669915-LAZF-XSZS.doc
Express 575400-ROEY-LLVQX.doc
77753511198-KGOR-XPIIN.doc
Express 84756767009-XL-WOOB.doc
Number 7103851292-CVCK-YGIY.doc
Number 3124185264-HUD-RYJ.doc
Express 96648461362-SPEB-EHD.doc
7bd35cd301fc6defcbacdf3c623a7fc9efeb31e9
Tracking 06764-EME-VERZ.doc
94463998825-KKKD-MQLR.doc
Express 57483728111-XM-ZFLWN.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!