× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c166aff46cadce2db642047cdca65234c32c6634d9ed822eeeb2a911178d6cc3
File name: doc_98E350A8A6C443C72FA6DB1FBC0B79AD
Detection ratio: 36 / 60
Analysis date: 2017-11-17 02:25:30 UTC ( 1 day, 4 hours ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.6202551 20171117
AegisLab Exploit.SWF.CVE-2012-4167.a!c 20171117
AhnLab-V3 SWF/Cve-2012-5054 20171117
ALYac Exploit.DOC.CVE-2013-0633 20171117
Arcabit Trojan.Generic.D5EA4B7 20171117
Avast SWF:Small-U 20171117
AVG SWF:Small-U 20171117
Avira (no cloud) EXP/SWF.CZ.2 20171117
AVware LooksLike.SWF.Malware.b (v) 20171117
BitDefender Trojan.GenericKD.6202551 20171117
CAT-QuickHeal Exp.SWF.CVE-2013-0633.A 20171116
ClamAV Doc.Dropper.Agent-6371775-0 20171115
Comodo UnclassifiedMalware 20171117
Cyren MSWord/SWFDropper.A!Camelot 20171117
DrWeb Exploit.SWF.232 20171117
Emsisoft Trojan.GenericKD.6202551 (B) 20171117
ESET-NOD32 SWF/Exploit.CVE-2012-5054.B 20171117
F-Prot CVE135331 20171117
F-Secure Exploit:SWF/CVE-2012-5054.A 20171117
Fortinet SWF/CVE_2012_4167.A!exploit 20171117
GData Generic.Trojan.Agent.0QV9B0 20171117
Ikarus Exploit.SWF 20171116
Kaspersky HEUR:Exploit.SWF.Agent.gen 20171117
MAX malware (ai score=82) 20171117
McAfee Generic Exploit.f 20171117
McAfee-GW-Edition Generic Exploit.f 20171117
eScan Trojan.GenericKD.6202551 20171117
NANO-Antivirus Exploit.Swf.CVE-2012-5054.cgyubt 20171117
Qihoo-360 Win32/Trojan.Exploit.c81 20171117
Sophos AV Troj/SWFExp-CI 20171117
Symantec Trojan.Mdropper 20171116
Tencent Win32.Exploit.Agent.Hwwh 20171117
TrendMicro TROJ_MDROP.USR 20171117
TrendMicro-HouseCall TROJ_MDROP.USR 20171117
VIPRE LooksLike.SWF.Malware.b (v) 20171117
ZoneAlarm by Check Point HEUR:Exploit.SWF.Agent.gen 20171117
Alibaba 20170911
Antiy-AVL 20171117
Avast-Mobile 20171116
Baidu 20171117
Bkav 20171116
CMC 20171109
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171117
eGambit 20171117
Endgame 20171024
Sophos ML 20170914
Jiangmin 20171117
K7AntiVirus 20171117
K7GW 20171117
Kingsoft 20171117
Malwarebytes 20171117
Microsoft 20171117
nProtect 20171117
Palo Alto Networks (Known Signatures) 20171117
Panda 20171116
Rising 20171117
SentinelOne (Static ML) 20171113
SUPERAntiSpyware 20171117
Symantec Mobile Insight 20171117
TheHacker 20171112
TotalDefense 20171116
Trustlook 20171117
VBA32 20171116
ViRobot 20171117
Webroot 20171117
WhiteArmor 20171104
Yandex 20171116
Zillya 20171116
Zoner 20171117
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Summary
last_author
1785429
creation_datetime
2012-05-15 11:39:00
author
.......
title
page_count
1
last_saved
2012-05-15 11:39:00
word_count
7
revision_number
2
application_name
Microsoft Office Word
character_count
41
code_page
Latin I
template
Normal.dot
Document summary
line_count
1
company
Leibniz
characters_with_spaces
47
version
730895
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
3840
type_literal
stream
size
113
name
\x01CompObj
sid
14
type_literal
stream
size
284
name
\x05DocumentSummaryInformation
sid
13
type_literal
stream
size
412
name
\x05SummaryInformation
sid
12
type_literal
stream
size
2336
name
1Table
sid
11
type_literal
stream
size
4096
name
Data
sid
1
type_literal
stream
size
145
name
ObjectPool/_1398590705/\x01CompObj
sid
6
type_literal
stream
size
20
name
ObjectPool/_1398590705/\x01Ole
sid
5
type_literal
stream
size
184
name
ObjectPool/_1398590705/\x02OlePres000
sid
10
type_literal
stream
size
34
name
ObjectPool/_1398590705/\x03OCXNAME
sid
8
type_literal
stream
size
6
name
ObjectPool/_1398590705/\x03ObjInfo
sid
7
type_literal
stream
size
13553
name
ObjectPool/_1398590705/contents
sid
9
type_literal
stream
size
4146
name
WordDocument
sid
2
ExifTool file metadata
SharedDoc
No

Author
.......

CodePage
Windows Latin 1 (Western European)

LinksUpToDate
No

LastModifiedBy
1785429

HeadingPairs
Title, 1

Template
Normal.dot

CharCountWithSpaces
47

CreateDate
2012:05:15 10:39:00

CompObjUserType
Microsoft Office Word Document

ModifyDate
2012:05:15 10:39:00

Company
Leibniz

HyperlinksChanged
No

Characters
41

ScaleCrop
No

RevisionNumber
2

MIMEType
application/msword

Words
7

FileType
DOC

Lines
1

AppVersion
11.9999

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
31

FileTypeExtension
doc

Paragraphs
1

File identification
MD5 98e350a8a6c443c72fa6db1fbc0b79ad
SHA1 07f5d6032c3fb1b834f10689efdf3327f0909c3f
SHA256 c166aff46cadce2db642047cdca65234c32c6634d9ed822eeeb2a911178d6cc3
ssdeep
192:Zvy2FjEyitZwosXGGluLqCU2w5ZuiMCMhOrDPjTF7L90txhLip:lHytZhmGGluLc2q5Djh7CtXL

File size 32.0 KB ( 32768 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Title: , Author: ......., Template: Normal.dot, Last Saved By: 1785429, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon May 14 10:39:00 2012, Last Saved Time/Date: Mon May 14 10:39:00 2012, Number of Pages: 1, Number of Words: 7, Number of Characters: 41, Security: 0

TrID Microsoft Word document (80.0%)
Generic OLE2 / Multistream Compound File (20.0%)
Tags
doc exploit cve-2013-0633 cve-2012-5054 cve-2012-4167

VirusTotal metadata
First submission 2012-09-10 07:44:43 UTC ( 5 years, 2 months ago )
Last submission 2017-11-08 22:55:51 UTC ( 1 week, 2 days ago )
File names 98E350A8A6C443C72FA6DB1FBC0B79AD.doc
aa
sFqJ.xlsx
98E350A8A6C443C72FA6DB1FBC0B79AD.doc.malware
3Ihsgy.xlsb
رسالة الكوفحي.doc
vti-rescan
file-4486633_doc
doc_98E350A8A6C443C72FA6DB1FBC0B79AD
EgJI7pn.drv
5Nl1WWm.png
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!