× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c166aff46cadce2db642047cdca65234c32c6634d9ed822eeeb2a911178d6cc3
File name: doc_98E350A8A6C443C72FA6DB1FBC0B79AD
Detection ratio: 25 / 57
Analysis date: 2016-04-27 05:53:34 UTC ( 3 months ago )
Antivirus Result Update
ALYac Exploit.DOC.CVE-2013-0633 20160427
AVware LooksLike.SWF.Malware.b (v) 20160427
AhnLab-V3 SWF/Cve-2012-5054 20160427
Avast SWF:CVE-2012-5054-A [Expl] 20160427
Avira (no cloud) EXP/SWF.CZ.2 20160426
CAT-QuickHeal Exp.SWF.CVE-2013-0633.A 20160427
Comodo UnclassifiedMalware 20160427
Cyren MSWord/SWFDropper.A!Camelot 20160427
DrWeb Exploit.SWF.232 20160427
ESET-NOD32 SWF/Exploit.CVE-2012-5054.B 20160427
F-Prot CVE135331 20160427
F-Secure Exploit:SWF/CVE-2012-5054.A 20160427
GData Macro.Trojan.Agent.0QV9B0 20160427
Ikarus Trojan.SWF.Exploit 20160427
Kaspersky HEUR:Exploit.SWF.Agent.gen 20160427
McAfee Generic Exploit.f 20160427
McAfee-GW-Edition Generic Exploit.f 20160427
NANO-Antivirus Exploit.Swf.CVE-2012-5054.cgyubt 20160427
Qihoo-360 Win32/Trojan.Exploit.c81 20160427
Sophos Troj/SWFExp-CI 20160427
Symantec Trojan.Mdropper 20160427
Tencent Win32.Exploit.Agent.Hwwh 20160427
TrendMicro TROJ_MDROP.USR 20160427
TrendMicro-HouseCall TROJ_MDROP.USR 20160427
VIPRE LooksLike.SWF.Malware.b (v) 20160427
AVG 20160427
Ad-Aware 20160427
AegisLab 20160426
Alibaba 20160427
Antiy-AVL 20160427
Arcabit 20160427
Baidu 20160427
Baidu-International 20160426
BitDefender 20160427
Bkav 20160427
CMC 20160425
ClamAV 20160426
Emsisoft 20160427
Fortinet 20160427
Jiangmin 20160427
K7AntiVirus 20160426
K7GW 20160427
Kingsoft 20160427
Malwarebytes 20160427
eScan 20160427
Microsoft 20160427
Panda 20160426
Rising 20160427
SUPERAntiSpyware 20160427
TheHacker 20160426
TotalDefense 20160426
VBA32 20160425
ViRobot 20160427
Yandex 20160426
Zillya 20160426
Zoner 20160427
nProtect 20160426
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Summary
last_author
1785429
creation_datetime
2012-05-15 11:39:00
author
.......
title
page_count
1
last_saved
2012-05-15 11:39:00
word_count
7
revision_number
2
application_name
Microsoft Office Word
character_count
41
code_page
Latin I
template
Normal.dot
Document summary
line_count
1
company
Leibniz
characters_with_spaces
47
version
730895
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
3840
type_literal
stream
size
113
name
\x01CompObj
sid
14
type_literal
stream
size
284
name
\x05DocumentSummaryInformation
sid
13
type_literal
stream
size
412
name
\x05SummaryInformation
sid
12
type_literal
stream
size
2336
name
1Table
sid
11
type_literal
stream
size
4096
name
Data
sid
1
type_literal
stream
size
145
name
ObjectPool/_1398590705/\x01CompObj
sid
6
type_literal
stream
size
20
name
ObjectPool/_1398590705/\x01Ole
sid
5
type_literal
stream
size
184
name
ObjectPool/_1398590705/\x02OlePres000
sid
10
type_literal
stream
size
34
name
ObjectPool/_1398590705/\x03OCXNAME
sid
8
type_literal
stream
size
6
name
ObjectPool/_1398590705/\x03ObjInfo
sid
7
type_literal
stream
size
13553
name
ObjectPool/_1398590705/contents
sid
9
type_literal
stream
size
4146
name
WordDocument
sid
2
ExifTool file metadata
SharedDoc
No

Author
.......

CodePage
Windows Latin 1 (Western European)

LinksUpToDate
No

LastModifiedBy
1785429

HeadingPairs
Title, 1

Template
Normal.dot

CharCountWithSpaces
47

CreateDate
2012:05:15 10:39:00

CompObjUserType
Microsoft Office Word Document

ModifyDate
2012:05:15 10:39:00

Company
Leibniz

HyperlinksChanged
No

Characters
41

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
7

FileType
DOC

Lines
1

AppVersion
11.9999

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
31

FileTypeExtension
doc

Paragraphs
1

File identification
MD5 98e350a8a6c443c72fa6db1fbc0b79ad
SHA1 07f5d6032c3fb1b834f10689efdf3327f0909c3f
SHA256 c166aff46cadce2db642047cdca65234c32c6634d9ed822eeeb2a911178d6cc3
ssdeep
192:Zvy2FjEyitZwosXGGluLqCU2w5ZuiMCMhOrDPjTF7L90txhLip:lHytZhmGGluLc2q5Djh7CtXL

File size 32.0 KB ( 32768 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Title: , Author: ......., Template: Normal.dot, Last Saved By: 1785429, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon May 14 10:39:00 2012, Last Saved Time/Date: Mon May 14 10:39:00 2012, Number of Pages: 1, Number of Words: 7, Number of Characters: 41, Security: 0

TrID Microsoft Word document (80.0%)
Generic OLE2 / Multistream Compound File (20.0%)
Tags
doc exploit cve-2013-0633 cve-2012-5054

VirusTotal metadata
First submission 2012-09-10 07:44:43 UTC ( 3 years, 10 months ago )
Last submission 2016-03-14 17:05:31 UTC ( 4 months, 1 week ago )
File names 98E350A8A6C443C72FA6DB1FBC0B79AD.doc
98E350A8A6C443C72FA6DB1FBC0B79AD.doc.malware
رسالة الكوفحي.doc
vti-rescan
file-4486633_doc
doc_98E350A8A6C443C72FA6DB1FBC0B79AD
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!