× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c27e543f5c4539bce550feae05913e903ceef0deb0a35773b19bc4658ff8e9d4
File name: Rechnung042012.pdf
Detection ratio: 8 / 42
Analysis date: 2012-04-23 13:24:08 UTC ( 6 years, 10 months ago ) View latest
Antivirus Result Update
Avast JS:Pdfka-gen [Expl] 20120423
BitDefender Exploit.TIFF.Gen 20120423
DrWeb Exploit.PDF.2820 20120423
F-Secure Exploit.TIFF.Gen 20120423
GData Exploit.TIFF.Gen 20120423
Jiangmin Trojan/Script.Gen 20120423
McAfee Exploit-PDF!Blacole 20120423
NOD32 JS/Exploit.Pdfka.PKA.Gen 20120423
AhnLab-V3 20120422
AntiVir 20120423
Antiy-AVL 20120423
AVG 20120423
ByteHero 20120417
CAT-QuickHeal 20120423
ClamAV 20120423
Commtouch 20120423
Comodo 20120423
Emsisoft 20120423
eSafe 20120419
eTrust-Vet 20120423
F-Prot 20120422
Fortinet 20120423
Ikarus 20120423
K7AntiVirus 20120420
Kaspersky 20120423
McAfee-GW-Edition 20120423
Microsoft 20120423
Norman 20120423
nProtect 20120423
Panda 20120423
PCTools 20120423
Rising 20120423
Sophos AV 20120423
SUPERAntiSpyware 20120402
Symantec 20120423
TheHacker 20120422
TrendMicro 20120423
TrendMicro-HouseCall 20120423
VBA32 20120422
VIPRE 20120423
ViRobot 20120423
VirusBuster 20120423
The file being studied is a PDF document! The document's header reveals it is using the following file format specification: %PDF-1.6.
PDFiD information
This PDF document has an invalid cross reference table.
This PDF document contains AcroForm objects. AcroForm Objects can specify and launch scripts or actions, that is why they are often abused by attackers.
This PDF document has 9 object start declarations and 9 object end declarations.
This PDF document has 2 stream object start declarations and 3 stream object end declarations.
This PDF document has a cross reference table (xref).
This PDF document has a pointer to the cross reference table (startxref).
This PDF document has a trailer dictionary containing entries allowing the cross reference table, and thus the file objects, to be read.
ExifTool file metadata
MIMEType
application/pdf

FileType
PDF

Linearized
No

Warning
Invalid xref table

FileTypeExtension
pdf

PDFVersion
1.6

File identification
MD5 db020f3026874c961d38a8465bb152fb
SHA1 aa9840487e4950095f6ad37f8df82a26b43cde9c
SHA256 c27e543f5c4539bce550feae05913e903ceef0deb0a35773b19bc4658ff8e9d4
ssdeep
384:WysNr7vMlGMlN3YrVSHnYmni0cze+S1AMz4E+:o7vMlGMlN3YrVSHnYmni0czePw

File size 19.3 KB ( 19779 bytes )
File type PDF
Magic literal
PDF document, version 1.6

TrID Adobe Portable Document Format (100.0%)
Tags
invalid-xref exploit acroform cve-2010-0188 pdf

VirusTotal metadata
First submission 2012-04-23 12:50:30 UTC ( 6 years, 10 months ago )
Last submission 2013-02-08 13:06:05 UTC ( 6 years ago )
File names c27e543f5c4539bce550feae05913e903ceef0deb0a35773b19bc4658ff8e9d4
Rechnung042012.pdf
Rechnung042012-Trojaner Datei.pdf
Rechnung042012.pdf
sR0e.vcf
db020f3026874c961d38a8465bb152fb
telekom-FAKE-Rechnung042012.pdf
fraglich.pdf
DB020F3026874C961D38A8465BB152FB
Virus-Rechnung042012.pdf.old
rechnung042012.pdf
Rechnung042012.xxx
Rechnung042012.pdf_
file-3841930_pdf
DFGr.msi
ExifTool file metadata
MIMEType
application/pdf

FileType
PDF

Linearized
No

Warning
Invalid xref table

FileTypeExtension
pdf

PDFVersion
1.6

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!