× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b1e05cc9e4784c7cfda338496816486cb35d79624843e0eaf01c78965a2e96a3
File name: emotet_e1_b1e05cc9e4784c7cfda338496816486cb35d79624843e0eaf01c789...
Detection ratio: 33 / 59
Analysis date: 2019-02-07 00:38:46 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware W97m.Downloader.HWR 20190207
AhnLab-V3 DOC/Downloader 20190206
ALYac W97m.Downloader.HWR 20190207
Arcabit W97m.Downloader.HWR 20190206
Avast Other:Malware-gen [Trj] 20190206
AVG Other:Malware-gen [Trj] 20190206
Avira (no cloud) W97M/Agent.46717244 20190206
BitDefender W97m.Downloader.HWR 20190206
Cyren W97M/Downldr 20190206
DrWeb W97M.DownLoader.3343 20190207
Emsisoft W97m.Downloader.HWR (B) 20190207
Endgame malicious (high confidence) 20181108
ESET-NOD32 VBA/TrojanDownloader.Agent.MMX 20190206
F-Prot New or modified W97M/Downldr 20190207
F-Secure Malware.W97M/Agent.46717244 20190207
Fortinet VBA/Agent.MMX!tr.dldr 20190206
GData W97m.Downloader.HWR 20190207
Ikarus Trojan-Downloader.VBA.Agent 20190206
Kaspersky HEUR:Trojan.MSOffice.SAgent.gen 20190207
McAfee W97M/Downloader.ha 20190206
McAfee-GW-Edition BehavesLike.Downloader.dl 20190206
Microsoft TrojanDownloader:O97M/Obfuse.CV 20190207
eScan W97m.Downloader.HWR 20190207
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190206
Qihoo-360 virus.office.obfuscated.4 20190207
SentinelOne (Static ML) static engine - malicious 20190203
Symantec Trojan.Gen.2 20190207
TACHYON Suspicious/W97M.Obfus.Gen.1 20190206
Tencent Heur.Macro.Generic.Gen.e 20190207
TrendMicro Trojan.W97M.POWLOAD.THBOFAI 20190206
TrendMicro-HouseCall Trojan.W97M.POWLOAD.THBOFAI 20190206
ZoneAlarm by Check Point HEUR:Trojan.MSOffice.SAgent.gen 20190206
Zoner Probably W97Obfuscated 20190207
Acronis 20190130
AegisLab 20190206
Alibaba 20180921
Antiy-AVL 20190206
Avast-Mobile 20190206
Babable 20180918
Baidu 20190202
Bkav 20190201
CAT-QuickHeal 20190206
ClamAV 20190206
CMC 20190206
Comodo 20190206
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190207
eGambit 20190207
Sophos ML 20181128
Jiangmin 20190207
K7AntiVirus 20190206
K7GW 20190206
Kingsoft 20190207
Malwarebytes 20190206
MAX 20190207
Palo Alto Networks (Known Signatures) 20190207
Panda 20190206
Rising 20190207
Sophos AV 20190206
SUPERAntiSpyware 20190206
TheHacker 20190203
TotalDefense 20190206
Trapmine 20190123
Trustlook 20190207
VBA32 20190206
ViRobot 20190206
Webroot 20190207
Yandex 20190206
Zillya 20190206
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-05 22:18:00
revision_number
8
author
dood
page_count
2
last_saved
2019-02-05 22:20:00
edit_time
60
word_count
5
template
Normal.dotm
application_name
Microsoft Office Word
character_count
31
code_page
Cyrillic
Document summary
line_count
1
company
home
characters_with_spaces
35
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
21376
type_literal
stream
sid
26
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
7004
type_literal
stream
sid
1
name
Data
size
224579
type_literal
stream
sid
24
name
Macros/PROJECT
size
572
type_literal
stream
sid
25
name
Macros/PROJECTwm
size
113
type_literal
stream
sid
16
type
macro
name
Macros/VBA/GXbkFnp
size
2679
type_literal
stream
sid
17
type
macro
name
Macros/VBA/Hx2KATO
size
1861
type_literal
stream
sid
15
type
macro
name
Macros/VBA/PFUGY
size
1141
type_literal
stream
sid
22
type
macro
name
Macros/VBA/ThisDocument
size
1906
type_literal
stream
sid
23
name
Macros/VBA/_VBA_PROJECT
size
4017
type_literal
stream
sid
18
name
Macros/VBA/__SRP_0
size
2225
type_literal
stream
sid
19
name
Macros/VBA/__SRP_1
size
206
type_literal
stream
sid
20
name
Macros/VBA/__SRP_2
size
532
type_literal
stream
sid
21
name
Macros/VBA/__SRP_3
size
156
type_literal
stream
sid
14
name
Macros/VBA/dir
size
926
type_literal
stream
sid
13
type
macro (only attributes)
name
Macros/VBA/f
size
1171
type_literal
stream
sid
10
name
Macros/f/\x01CompObj
size
97
type_literal
stream
sid
11
name
Macros/f/\x03VBFrame
size
284
type_literal
stream
sid
8
name
Macros/f/f
size
126
type_literal
stream
sid
9
name
Macros/f/o
size
2772
type_literal
stream
sid
3
name
WordDocument
size
4148
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 251 bytes
[+] GXbkFnp.bas Macros/VBA/GXbkFnp 632 bytes
[+] PFUGY.bas Macros/VBA/PFUGY 151 bytes
run-file
[+] Hx2KATO.bas Macros/VBA/Hx2KATO 399 bytes
ExifTool file metadata
SharedDoc
No

Author
dood

CodePage
Windows Cyrillic

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
35

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:05 21:20:00

Company
home

Characters
31

HyperlinksChanged
No

RevisionNumber
8

MIMEType
application/msword

Words
5

CreateDate
2019:02:05 21:18:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
1 minute

Pages
2

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 9359e4680b684f425d2cc38c96e40983
SHA1 5cea7a1de5d84480587f4a9bb33da54170f80dfc
SHA256 b1e05cc9e4784c7cfda338496816486cb35d79624843e0eaf01c78965a2e96a3
ssdeep
6144:cCwQK3RpVS7G4SVuz1QzLhxztsZGPwtM:eQQLGSVuz1QHhxztCtM

File size 268.0 KB ( 274432 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: dood, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 8, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Mon Feb 04 21:18:00 2019, Last Saved Time/Date: Mon Feb 04 21:20:00 2019, Number of Pages: 2, Number of Words: 5, Number of Characters: 31, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2019-02-06 00:06:00 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-06 04:36:53 UTC ( 1 month, 2 weeks ago )
File names bill_2019_02_06.doc
emotet_e1_b1e05cc9e4784c7cfda338496816486cb35d79624843e0eaf01c78965a2e96a3_2019-02-06__001002.doc
ebill_file_02-06-2019.doc
invoice_02062019.doc
ebill_file_2019_02_06.doc
payment_02062019.doc
zbetcheckin_tracker_9359e4680b684f425d2cc38c96e40983
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!