× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d80f42dbbe077cf814c2151477e46b22c5e1b76f7c23a4138cf0fa8eead5bd4e
File name: CVE_2017_0199.doc
Detection ratio: 16 / 60
Analysis date: 2017-11-14 09:23:19 UTC ( 1 year, 3 months ago ) View latest
Antivirus Result Update
Antiy-AVL Trojan[Exploit]/RTF.CVE-2017-0199 20171114
Arcabit Exploit.CVE-2017-0199.Gen 20171114
BitDefender Exploit.CVE-2017-0199.Gen 20171114
ClamAV Rtf.Exploit.CVE_2017_0199-6336824-0 20171114
Cyren CVE-2017-0199.A!Camelot 20171114
Emsisoft Exploit.CVE-2017-0199.Gen (B) 20171114
F-Secure Exploit.CVE-2017-0199.Gen 20171114
Fortinet Malicious_Behavior.SB 20171114
GData Exploit.CVE-2017-0199.Gen 20171114
Kaspersky HEUR:Exploit.MSOffice.Generic 20171114
MAX malware (ai score=86) 20171114
NANO-Antivirus Exploit.Rtf.Heuristic-rtf.dinbqn 20171114
nProtect Downloader/RTF.CVE-2017-0199 20171114
Qihoo-360 virus.exp.20170199 20171114
TrendMicro HEUR_RTFMALFORM 20171114
ZoneAlarm by Check Point HEUR:Exploit.MSOffice.Generic 20171114
Ad-Aware 20171114
AegisLab 20171114
AhnLab-V3 20171114
Alibaba 20170911
ALYac 20171114
Avast 20171114
Avast-Mobile 20171114
AVG 20171114
Avira (no cloud) 20171114
AVware 20171114
Baidu 20171114
Bkav 20171114
CAT-QuickHeal 20171114
CMC 20171109
Comodo 20171114
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171114
DrWeb 20171114
eGambit 20171114
Endgame 20171024
ESET-NOD32 20171114
F-Prot 20171114
Ikarus 20171114
Sophos ML 20170914
Jiangmin 20171114
K7AntiVirus 20171114
K7GW 20171114
Kingsoft 20171114
Malwarebytes 20171114
McAfee 20171114
McAfee-GW-Edition 20171114
Microsoft 20171114
eScan 20171114
Palo Alto Networks (Known Signatures) 20171114
Panda 20171113
Rising 20171114
SentinelOne (Static ML) 20171113
Sophos AV 20171114
SUPERAntiSpyware 20171114
Symantec 20171114
Symantec Mobile Insight 20171114
Tencent 20171114
TheHacker 20171112
TotalDefense 20171114
TrendMicro-HouseCall 20171114
Trustlook 20171114
VBA32 20171113
VIPRE 20171114
ViRobot 20171114
Webroot 20171114
WhiteArmor 20171104
Yandex 20171113
Zillya 20171110
Zoner 20171114
The file being studied is a Rich Text Format file! RTF is a proprietary document file format with published specification developed by Microsoft Corporation since 1987 for Microsoft products and for cross-platform document interchange.
Document properties
Non ascii characters
0
Embedded drawings
0
Rtf header
rtfXED0A0F
Read only protection
False
User protection
False
Default character set
ANSI (default)
Custom xml data properties
0
Dos stubs
0
Objects
OLE autolink
Embedded pictures
0
Longest hex string
6266
File identification
MD5 ba74b433b7eb913e54ab61f43369ac5e
SHA1 bdb03254cf98fec7b835ae7b07ade012211dd028
SHA256 d80f42dbbe077cf814c2151477e46b22c5e1b76f7c23a4138cf0fa8eead5bd4e
ssdeep
96:w4Gpwvy/9RRRRRRRRRRR3Tc4MeoGmf96BGJI:w4KguRRRRRRRRRRR344poPC

File size 6.2 KB ( 6343 bytes )
File type Rich Text Format
Magic literal
Rich Text Format data, unknown version

TrID Rich Text Format (100.0%)
Tags
exploit rtf attachment cve-2017-0199 ole-autolink

VirusTotal metadata
First submission 2017-11-14 09:23:19 UTC ( 1 year, 3 months ago )
Last submission 2017-11-27 11:55:31 UTC ( 1 year, 2 months ago )
File names POP3-40c89c9b_15fbd4c41c1_-7e90.doc
CVE_2017_0199.doc
CVE_2017_0199.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!