× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c3450f94972ed4d0f40cbbebd99a60c4708e1c7e0966b83e3277d0782c7334d8
File name: emotet_e1_c3450f94972ed4d0f40cbbebd99a60c4708e1c7e0966b83e3277d07...
Detection ratio: 10 / 58
Analysis date: 2019-02-19 22:45:17 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Cyren W97M/Downldr.BN.gen!Eldorado 20190219
Endgame malicious (high confidence) 20190215
Ikarus Trojan-Downloader.VBA.Agent 20190219
K7AntiVirus Trojan ( 00536d111 ) 20190219
K7GW Trojan ( 00536d111 ) 20190219
McAfee Artemis!DEA9CC944C3C 20190219
McAfee-GW-Edition BehavesLike.Downloader.fg 20190219
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ISB.Downloader!gen80 20190219
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190219
Acronis 20190219
Ad-Aware 20190219
AegisLab 20190219
AhnLab-V3 20190219
Alibaba 20180921
ALYac 20190219
Antiy-AVL 20190219
Arcabit 20190219
Avast 20190219
Avast-Mobile 20190219
AVG 20190219
Avira (no cloud) 20190219
Babable 20180917
Baidu 20190214
BitDefender 20190219
Bkav 20190219
CAT-QuickHeal 20190219
ClamAV 20190219
CMC 20190219
Comodo 20190219
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190219
DrWeb 20190219
eGambit 20190219
Emsisoft 20190219
ESET-NOD32 20190219
F-Prot 20190219
F-Secure 20190219
Fortinet 20190219
GData 20190219
Sophos ML 20181128
Jiangmin 20190219
Kaspersky 20190219
Kingsoft 20190219
Malwarebytes 20190219
MAX 20190219
Microsoft 20190219
eScan 20190219
NANO-Antivirus 20190219
Palo Alto Networks (Known Signatures) 20190219
Panda 20190219
Qihoo-360 20190219
Rising 20190219
Sophos AV 20190219
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190206
TACHYON 20190218
Tencent 20190219
TheHacker 20190217
TotalDefense 20190219
Trapmine 20190123
TrendMicro 20190219
TrendMicro-HouseCall 20190219
Trustlook 20190219
VBA32 20190219
ViRobot 20190219
Webroot 20190219
Yandex 20190218
Zillya 20190219
Zoner 20190219
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to hide the viewer or other applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2019-02-19 21:29:00
revision_number
1
page_count
1
last_saved
2019-02-19 21:29:00
template
Normal.dotm
application_name
Microsoft Office Word
character_count
3
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
3
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
4160
type_literal
stream
sid
18
name
\x01CompObj
size
114
type_literal
stream
sid
5
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
4
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
2
name
1Table
size
7514
type_literal
stream
sid
1
name
Data
size
129889
type_literal
stream
sid
17
name
Macros/PROJECT
size
420
type_literal
stream
sid
16
name
Macros/PROJECTwm
size
47
type_literal
stream
sid
11
type
macro
name
Macros/VBA/D_03_5
size
113116
type_literal
stream
sid
8
type
macro (only attributes)
name
Macros/VBA/X85417_
size
1105
type_literal
stream
sid
12
name
Macros/VBA/_VBA_PROJECT
size
32735
type_literal
stream
sid
14
name
Macros/VBA/__SRP_0
size
1221
type_literal
stream
sid
15
name
Macros/VBA/__SRP_1
size
106
type_literal
stream
sid
9
name
Macros/VBA/__SRP_2
size
220
type_literal
stream
sid
10
name
Macros/VBA/__SRP_3
size
66
type_literal
stream
sid
13
name
Macros/VBA/dir
size
548
type_literal
stream
sid
3
name
WordDocument
size
4096
Macros and VBA code streams
[+] D_03_5.bas Macros/VBA/D_03_5 54407 bytes
hide-app obfuscated
ExifTool file metadata
SharedDoc
No

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
3

CreateDate
2019:02:19 20:29:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2019:02:19 20:29:00

Characters
3

CodePage
Windows Latin 1 (Western European)

RevisionNumber
1

MIMEType
application/msword

Words
0

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 dea9cc944c3ccf65459fa1834fec228d
SHA1 087bf87e9c6acecbbc7a08cc904ffbd6e72560e6
SHA256 c3450f94972ed4d0f40cbbebd99a60c4708e1c7e0966b83e3277d0782c7334d8
ssdeep
6144:sG5/BnVfRFJ7KK9aHScdX9znGUlOV7QthK4lgAM:s2n9R/lA5dX9znGUlPthpgAM

File size 309.0 KB ( 316416 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 18 20:29:00 2019, Last Saved Time/Date: Mon Feb 18 20:29:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 3, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros hide-app doc

VirusTotal metadata
First submission 2019-02-19 21:14:18 UTC ( 1 month, 4 weeks ago )
Last submission 2019-02-19 22:45:17 UTC ( 1 month, 4 weeks ago )
File names 022019-eInvoice_recept_3806959280.doc
emotet_e1_c3450f94972ed4d0f40cbbebd99a60c4708e1c7e0966b83e3277d0782c7334d8_2019-02-19__211501.doc
190220_transaction_receipt-458039.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!