× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c166aff46cadce2db642047cdca65234c32c6634d9ed822eeeb2a911178d6cc3
File name: doc_98E350A8A6C443C72FA6DB1FBC0B79AD
Detection ratio: 28 / 55
Analysis date: 2017-05-06 21:16:26 UTC ( 2 weeks, 1 day ago )
Antivirus Result Update
AegisLab Exploit.SWF.CVE-2012-4167.a!c 20170506
AhnLab-V3 SWF/Cve-2012-5054 20170506
ALYac Exploit.DOC.CVE-2013-0633 20170506
Avast SWF:CVE-2012-5054-A [Expl] 20170506
Avira (no cloud) EXP/SWF.CZ.2 20170506
AVware LooksLike.SWF.Malware.b (v) 20170506
CAT-QuickHeal Exp.SWF.CVE-2013-0633.A 20170506
Comodo UnclassifiedMalware 20170506
Cyren MSWord/SWFDropper.A!Camelot 20170506
DrWeb Exploit.SWF.232 20170506
ESET-NOD32 SWF/Exploit.CVE-2012-5054.B 20170506
F-Prot CVE135331 20170506
F-Secure Exploit:SWF/CVE-2012-5054.A 20170506
Fortinet SWF/CVE_2012_4167.A!exploit 20170506
GData Generic.Trojan.Agent.0QV9B0 20170506
Ikarus Exploit.SWF 20170506
Kaspersky HEUR:Exploit.SWF.Agent.gen 20170506
McAfee Generic Exploit.f 20170506
McAfee-GW-Edition Generic Exploit.f 20170506
NANO-Antivirus Exploit.Swf.CVE-2012-5054.cgyubt 20170506
Qihoo-360 susp.swf.qexvmI.100 20170506
Sophos Troj/SWFExp-CI 20170506
Symantec Trojan.Mdropper 20170506
Tencent Win32.Exploit.Agent.Hwwh 20170506
TrendMicro TROJ_MDROP.USR 20170506
TrendMicro-HouseCall TROJ_MDROP.USR 20170506
VIPRE LooksLike.SWF.Malware.b (v) 20170506
ZoneAlarm by Check Point HEUR:Exploit.SWF.Agent.gen 20170506
Ad-Aware 20170506
Alibaba 20170505
Arcabit 20170506
AVG 20170506
Baidu 20170503
BitDefender 20170506
ClamAV 20170506
CMC 20170506
CrowdStrike Falcon (ML) 20170130
Emsisoft 20170506
Endgame 20170503
Invincea 20170413
Jiangmin 20170506
K7AntiVirus 20170506
K7GW 20170506
Kingsoft 20170506
Malwarebytes 20170506
Microsoft 20170506
eScan 20170506
nProtect 20170506
Palo Alto Networks (Known Signatures) 20170506
Panda 20170506
Rising 20170506
SentinelOne (Static ML) 20170330
SUPERAntiSpyware 20170506
Symantec Mobile Insight 20170504
TheHacker 20170505
TotalDefense 20170506
Trustlook 20170506
VBA32 20170506
ViRobot 20170506
Webroot 20170506
WhiteArmor 20170502
Yandex 20170504
Zillya 20170505
Zoner 20170506
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Summary
last_author
1785429
creation_datetime
2012-05-15 11:39:00
author
.......
title
page_count
1
last_saved
2012-05-15 11:39:00
word_count
7
revision_number
2
application_name
Microsoft Office Word
character_count
41
code_page
Latin I
template
Normal.dot
Document summary
line_count
1
company
Leibniz
characters_with_spaces
47
version
730895
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
3840
type_literal
stream
size
113
name
\x01CompObj
sid
14
type_literal
stream
size
284
name
\x05DocumentSummaryInformation
sid
13
type_literal
stream
size
412
name
\x05SummaryInformation
sid
12
type_literal
stream
size
2336
name
1Table
sid
11
type_literal
stream
size
4096
name
Data
sid
1
type_literal
stream
size
145
name
ObjectPool/_1398590705/\x01CompObj
sid
6
type_literal
stream
size
20
name
ObjectPool/_1398590705/\x01Ole
sid
5
type_literal
stream
size
184
name
ObjectPool/_1398590705/\x02OlePres000
sid
10
type_literal
stream
size
34
name
ObjectPool/_1398590705/\x03OCXNAME
sid
8
type_literal
stream
size
6
name
ObjectPool/_1398590705/\x03ObjInfo
sid
7
type_literal
stream
size
13553
name
ObjectPool/_1398590705/contents
sid
9
type_literal
stream
size
4146
name
WordDocument
sid
2
ExifTool file metadata
SharedDoc
No

Author
.......

CodePage
Windows Latin 1 (Western European)

LinksUpToDate
No

LastModifiedBy
1785429

HeadingPairs
Title, 1

Template
Normal.dot

CharCountWithSpaces
47

CreateDate
2012:05:15 10:39:00

CompObjUserType
Microsoft Office Word Document

ModifyDate
2012:05:15 10:39:00

Company
Leibniz

HyperlinksChanged
No

Characters
41

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
7

FileType
DOC

Lines
1

AppVersion
11.9999

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
31

FileTypeExtension
doc

Paragraphs
1

File identification
MD5 98e350a8a6c443c72fa6db1fbc0b79ad
SHA1 07f5d6032c3fb1b834f10689efdf3327f0909c3f
SHA256 c166aff46cadce2db642047cdca65234c32c6634d9ed822eeeb2a911178d6cc3
ssdeep
192:Zvy2FjEyitZwosXGGluLqCU2w5ZuiMCMhOrDPjTF7L90txhLip:lHytZhmGGluLc2q5Djh7CtXL

File size 32.0 KB ( 32768 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Title: , Author: ......., Template: Normal.dot, Last Saved By: 1785429, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon May 14 10:39:00 2012, Last Saved Time/Date: Mon May 14 10:39:00 2012, Number of Pages: 1, Number of Words: 7, Number of Characters: 41, Security: 0

TrID Microsoft Word document (80.0%)
Generic OLE2 / Multistream Compound File (20.0%)
Tags
doc exploit cve-2013-0633 cve-2012-5054 cve-2012-4167

VirusTotal metadata
First submission 2012-09-10 07:44:43 UTC ( 4 years, 8 months ago )
Last submission 2016-03-14 17:05:31 UTC ( 1 year, 2 months ago )
File names 98E350A8A6C443C72FA6DB1FBC0B79AD.doc
98E350A8A6C443C72FA6DB1FBC0B79AD.doc.malware
رسالة الكوفحي.doc
vti-rescan
file-4486633_doc
doc_98E350A8A6C443C72FA6DB1FBC0B79AD
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!