× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: df1f04c271e5f1dcd9a71a56710deb71ebb1c99009ad7190bf5de0c810060948
File name: bill_02052019.doc
Detection ratio: 11 / 59
Analysis date: 2019-02-05 16:29:51 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Arcabit HEUR.VBA.Trojan.e 20190205
Endgame malicious (high confidence) 20181108
McAfee-GW-Edition BehavesLike.Downloader.dl 20190205
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190205
Qihoo-360 virus.office.qexvmc.1085 20190205
SentinelOne (Static ML) static engine - malicious 20190203
TACHYON Suspicious/W97M.Obfus.Gen.1 20190205
Tencent Heur.Macro.Generic.Gen.f 20190205
TrendMicro HEUR_VBA.O.ELBP 20190205
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190205
Zoner Probably W97Obfuscated 20190205
Acronis 20190130
Ad-Aware 20190205
AegisLab 20190205
AhnLab-V3 20190205
Alibaba 20180921
ALYac 20190205
Antiy-AVL 20190205
Avast 20190205
Avast-Mobile 20190205
AVG 20190205
Avira (no cloud) 20190205
Babable 20180918
Baidu 20190202
BitDefender 20190205
Bkav 20190201
CAT-QuickHeal 20190205
ClamAV 20190205
CMC 20190205
Comodo 20190205
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190205
Cyren 20190205
DrWeb 20190205
eGambit 20190205
Emsisoft 20190205
ESET-NOD32 20190205
F-Prot 20190205
F-Secure 20190205
Fortinet 20190205
GData 20190205
Ikarus 20190205
Sophos ML 20181128
Jiangmin 20190205
K7AntiVirus 20190205
K7GW 20190205
Kaspersky 20190205
Kingsoft 20190205
Malwarebytes 20190205
MAX 20190205
McAfee 20190205
Microsoft 20190205
eScan 20190205
Palo Alto Networks (Known Signatures) 20190205
Panda 20190205
Rising 20190205
Sophos AV 20190205
SUPERAntiSpyware 20190130
Symantec 20190205
TheHacker 20190203
Trapmine 20190123
TrendMicro-HouseCall 20190205
Trustlook 20190205
VBA32 20190205
VIPRE 20190204
ViRobot 20190205
Webroot 20190205
Yandex 20190204
Zillya 20190204
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-05 13:06:00
revision_number
6
author
admin
page_count
1
last_saved
2019-02-05 13:09:00
edit_time
60
word_count
2
template
Normal.dotm
application_name
Microsoft Office Word
character_count
15
code_page
Cyrillic
Document summary
line_count
1
company
Salve
characters_with_spaces
16
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
19648
type_literal
stream
sid
25
name
\x01CompObj
size
114
type_literal
stream
sid
4
name
\x05DocumentSummaryInformation
size
4096
type_literal
stream
sid
3
name
\x05SummaryInformation
size
4096
type_literal
stream
sid
1
name
1Table
size
7238
type_literal
stream
sid
23
name
Macros/PROJECT
size
582
type_literal
stream
sid
24
name
Macros/PROJECTwm
size
122
type_literal
stream
sid
14
type
macro
name
Macros/VBA/OAwga
size
1464
type_literal
stream
sid
21
type
macro
name
Macros/VBA/ThisDocument
size
1669
type_literal
stream
sid
22
name
Macros/VBA/_VBA_PROJECT
size
3780
type_literal
stream
sid
15
name
Macros/VBA/__SRP_0
size
2236
type_literal
stream
sid
16
name
Macros/VBA/__SRP_1
size
206
type_literal
stream
sid
17
name
Macros/VBA/__SRP_2
size
532
type_literal
stream
sid
18
name
Macros/VBA/__SRP_3
size
156
type_literal
stream
sid
20
type
macro
name
Macros/VBA/bsY9RhaJO
size
1130
type_literal
stream
sid
13
name
Macros/VBA/dir
size
946
type_literal
stream
sid
12
type
macro (only attributes)
name
Macros/VBA/f
size
1173
type_literal
stream
sid
19
type
macro
name
Macros/VBA/mXBLJCKz
size
1394
type_literal
stream
sid
9
name
Macros/f/\x01CompObj
size
97
type_literal
stream
sid
10
name
Macros/f/\x03VBFrame
size
284
type_literal
stream
sid
7
name
Macros/f/f
size
126
type_literal
stream
sid
8
name
Macros/f/o
size
3116
type_literal
stream
sid
2
name
WordDocument
size
228027
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 154 bytes
[+] OAwga.bas Macros/VBA/OAwga 272 bytes
[+] bsY9RhaJO.bas Macros/VBA/bsY9RhaJO 133 bytes
run-file
[+] mXBLJCKz.bas Macros/VBA/mXBLJCKz 244 bytes
ExifTool file metadata
SharedDoc
No

Author
admin

HyperlinksChanged
No

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
16

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:05 12:09:00

Company
Salve

Characters
15

CodePage
Windows Cyrillic

RevisionNumber
6

MIMEType
application/msword

Words
2

CreateDate
2019:02:05 12:06:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
1 minute

Pages
1

ScaleCrop
No

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
1Table, ExtChar

File identification
MD5 943b369c8cf261aa0932814c399f5026
SHA1 1dc6d8b984317673320269c993d803de07af1324
SHA256 df1f04c271e5f1dcd9a71a56710deb71ebb1c99009ad7190bf5de0c810060948
ssdeep
3072:SkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPw45xUB5BECCc:SCwQK3RpVS7G4SVuz1QzLhxztsZGPwT

File size 266.0 KB ( 272384 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: admin, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 6, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Mon Feb 04 12:06:00 2019, Last Saved Time/Date: Mon Feb 04 12:09:00 2019, Number of Pages: 1, Number of Words: 2, Number of Characters: 15, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file doc

VirusTotal metadata
First submission 2019-02-05 16:28:45 UTC ( 1 month, 1 week ago )
Last submission 2019-02-05 17:26:10 UTC ( 1 month, 1 week ago )
File names emotet_e1_df1f04c271e5f1dcd9a71a56710deb71ebb1c99009ad7190bf5de0c810060948_2019-02-05__163002.doc
receipt_02052019.doc
ebill_file_20190205.doc
bill_02052019.doc
ebill_file_02052019.doc
invoice_20190205.doc
receipt_2019_02_05.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!