× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: de8ed6e4f1cafd5fbe0dc529a0fcddec17ddbc4f61598672d1c304f0bc19fe88
File name: 02_19
Detection ratio: 12 / 60
Analysis date: 2019-02-06 01:55:56 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Endgame malicious (high confidence) 20181108
McAfee W97M/Downloader.ha 20190205
McAfee-GW-Edition BehavesLike.Downloader.dl 20190205
Microsoft Trojan:Script/Foretype.A!ml 20190206
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190205
Qihoo-360 virus.office.obfuscated.4 20190206
SentinelOne (Static ML) static engine - malicious 20190203
TACHYON Suspicious/W97M.Obfus.Gen.1 20190206
Tencent Heur.Macro.Generic.Gen.e 20190206
TrendMicro HEUR_VBA.O.ELBP 20190206
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190206
Zoner Probably W97Obfuscated 20190206
Acronis 20190130
Ad-Aware 20190205
AegisLab 20190206
AhnLab-V3 20190205
Alibaba 20180921
ALYac 20190205
Antiy-AVL 20190206
Arcabit 20190205
Avast 20190205
Avast-Mobile 20190205
AVG 20190205
Avira (no cloud) 20190205
Babable 20180918
Baidu 20190202
BitDefender 20190205
Bkav 20190201
CAT-QuickHeal 20190205
ClamAV 20190205
CMC 20190205
Comodo 20190206
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190206
Cyren 20190205
DrWeb 20190206
eGambit 20190206
Emsisoft 20190206
ESET-NOD32 20190206
F-Prot 20190205
F-Secure 20190205
Fortinet 20190206
GData 20190206
Ikarus 20190205
Sophos ML 20181128
Jiangmin 20190206
K7AntiVirus 20190205
K7GW 20190205
Kaspersky 20190206
Kingsoft 20190206
Malwarebytes 20190206
MAX 20190206
eScan 20190205
Palo Alto Networks (Known Signatures) 20190206
Panda 20190205
Rising 20190205
Sophos AV 20190205
SUPERAntiSpyware 20190130
Symantec 20190205
TheHacker 20190203
TotalDefense 20190205
Trapmine 20190123
TrendMicro-HouseCall 20190206
Trustlook 20190206
VBA32 20190205
VIPRE 20190205
ViRobot 20190205
Webroot 20190206
Yandex 20190204
Zillya 20190204
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-05 22:18:00
template
Normal.dotm
author
dood
page_count
2
last_saved
2019-02-05 22:20:00
edit_time
60
word_count
5
revision_number
8
application_name
Microsoft Office Word
character_count
31
code_page
Cyrillic
Document summary
line_count
1
company
home
characters_with_spaces
35
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
21376
type_literal
stream
size
114
name
\x01CompObj
sid
26
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
7004
name
1Table
sid
2
type_literal
stream
size
224579
name
Data
sid
1
type_literal
stream
size
572
name
Macros/PROJECT
sid
24
type_literal
stream
size
113
name
Macros/PROJECTwm
sid
25
type_literal
stream
size
2679
type
macro
name
Macros/VBA/GXbkFnp
sid
16
type_literal
stream
size
1861
type
macro
name
Macros/VBA/Hx2KATO
sid
17
type_literal
stream
size
1141
type
macro
name
Macros/VBA/PFUGY
sid
15
type_literal
stream
size
1906
type
macro
name
Macros/VBA/ThisDocument
sid
22
type_literal
stream
size
4017
name
Macros/VBA/_VBA_PROJECT
sid
23
type_literal
stream
size
2225
name
Macros/VBA/__SRP_0
sid
18
type_literal
stream
size
206
name
Macros/VBA/__SRP_1
sid
19
type_literal
stream
size
532
name
Macros/VBA/__SRP_2
sid
20
type_literal
stream
size
156
name
Macros/VBA/__SRP_3
sid
21
type_literal
stream
size
926
name
Macros/VBA/dir
sid
14
type_literal
stream
size
1171
type
macro (only attributes)
name
Macros/VBA/f
sid
13
type_literal
stream
size
97
name
Macros/f/\x01CompObj
sid
10
type_literal
stream
size
284
name
Macros/f/\x03VBFrame
sid
11
type_literal
stream
size
126
name
Macros/f/f
sid
8
type_literal
stream
size
2772
name
Macros/f/o
sid
9
type_literal
stream
size
4148
name
WordDocument
sid
3
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 251 bytes
[+] GXbkFnp.bas Macros/VBA/GXbkFnp 632 bytes
[+] PFUGY.bas Macros/VBA/PFUGY 151 bytes
run-file
[+] Hx2KATO.bas Macros/VBA/Hx2KATO 399 bytes
ExifTool file metadata
SharedDoc
No

Author
dood

CodePage
Windows Cyrillic

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
35

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:05 21:20:00

ScaleCrop
No

Company
home

Characters
31

HyperlinksChanged
No

RevisionNumber
8

MIMEType
application/msword

Words
5

CreateDate
2019:02:05 21:18:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
1 minute

Pages
2

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 f40c5a7df3bef2851ddf16e6cd32a645
SHA1 4f2e3df9119747553cac4455c6afca923f1966e3
SHA256 de8ed6e4f1cafd5fbe0dc529a0fcddec17ddbc4f61598672d1c304f0bc19fe88
ssdeep
6144:cCwQK3RpVS7G4SVuz1QzLhxztsZGPwtM:eQQLGSVuz1QHhxztCtM

File size 268.0 KB ( 274432 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: dood, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 8, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Mon Feb 04 21:18:00 2019, Last Saved Time/Date: Mon Feb 04 21:20:00 2019, Number of Pages: 2, Number of Words: 5, Number of Characters: 31, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2019-02-06 01:55:56 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-06 04:36:41 UTC ( 1 month, 2 weeks ago )
File names PAY_2019-02-06.doc
02_19
receipt_20190206.doc
emotet_e1_de8ed6e4f1cafd5fbe0dc529a0fcddec17ddbc4f61598672d1c304f0bc19fe88_2019-02-06__015502.doc
ebill_file_02-06-2019.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!