× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f0652a265da0a80ffb80458cd026b42ad7f06bf618959aca3ce380a38cb0d619
File name: emotet_e2_f0652a265da0a80ffb80458cd026b42ad7f06bf618959aca3ce380a...
Detection ratio: 20 / 60
Analysis date: 2018-12-13 04:33:59 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
AegisLab Trojan.MSOffice.SLoad.4!c 20181213
Arcabit HEUR.VBA.Trojan.e 20181212
Cyren W97M/Macro 20181213
Endgame malicious (high confidence) 20181108
ESET-NOD32 VBA/TrojanDownloader.Agent.LTP 20181213
F-Prot New or modified W97M/Macro 20181213
Fortinet VBA/Agent.LTL!tr.dldr 20181213
GData Macro.Trojan-Downloader.Shallow.S 20181213
Ikarus Trojan.VBA.Agent 20181212
Kaspersky HEUR:Trojan-Downloader.MSOffice.SLoad.gen 20181212
Microsoft Trojan:O97M/Sonbokli.A!cl 20181213
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20181213
Qihoo-360 virus.office.qexvmc.1095 20181213
Rising Macro.Agent.dx (CLASSIC) 20181213
SentinelOne (Static ML) static engine - malicious 20181011
TACHYON Suspicious/W97M.Obfus.Gen.6 20181212
Tencent Heur.Macro.Generic.Gen.h 20181213
TrendMicro HEUR_VBA.O.ELBP 20181213
ZoneAlarm by Check Point HEUR:Trojan-Downloader.MSOffice.SLoad.gen 20181213
Zoner Probably W97Obfuscated 20181213
Ad-Aware 20181212
AhnLab-V3 20181212
Alibaba 20180921
ALYac 20181213
Antiy-AVL 20181213
Avast 20181213
Avast-Mobile 20181212
AVG 20181213
Avira (no cloud) 20181213
Babable 20180918
Baidu 20181207
BitDefender 20181212
Bkav 20181212
CAT-QuickHeal 20181212
ClamAV 20181213
CMC 20181212
Comodo 20181213
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181213
DrWeb 20181213
eGambit 20181213
Emsisoft 20181212
F-Secure 20181212
Sophos ML 20181128
Jiangmin 20181212
K7AntiVirus 20181212
K7GW 20181212
Kingsoft 20181213
Malwarebytes 20181212
MAX 20181213
McAfee 20181212
McAfee-GW-Edition 20181212
eScan 20181212
Palo Alto Networks (Known Signatures) 20181213
Panda 20181212
Sophos AV 20181213
SUPERAntiSpyware 20181212
Symantec 20181212
Symantec Mobile Insight 20181212
TheHacker 20181210
TotalDefense 20181212
Trapmine 20181205
TrendMicro-HouseCall 20181213
Trustlook 20181213
VBA32 20181212
VIPRE 20181212
ViRobot 20181213
Webroot 20181213
Yandex 20181212
Zillya 20181212
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Seems to contain deobfuscation code.
Summary
creation_datetime
2018-12-12 20:06:00
template
Normal.dotm
page_count
1
last_saved
2018-12-12 20:06:00
word_count
3
revision_number
1
application_name
Microsoft Office Word
character_count
21
code_page
Latin I
Document summary
line_count
1
characters_with_spaces
23
version
1048576
paragraph_count
1
code_page
Latin I
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
8960
type_literal
stream
size
114
name
\x01CompObj
sid
25
type_literal
stream
size
280
name
\x05DocumentSummaryInformation
sid
12
type_literal
stream
size
404
name
\x05SummaryInformation
sid
11
type_literal
stream
size
7966
name
1Table
sid
10
type_literal
stream
size
29694
name
Data
sid
1
type_literal
stream
size
508
name
Macros/PROJECT
sid
24
type_literal
stream
size
68
name
Macros/PROJECTwm
sid
23
type_literal
stream
size
1479
type
macro
name
Macros/VBA/JSutzbIDItO
sid
15
type_literal
stream
size
11498
type
macro
name
Macros/VBA/TGrdRnCLv
sid
18
type_literal
stream
size
10353
name
Macros/VBA/_VBA_PROJECT
sid
19
type_literal
stream
size
1608
name
Macros/VBA/__SRP_0
sid
21
type_literal
stream
size
186
name
Macros/VBA/__SRP_1
sid
22
type_literal
stream
size
428
name
Macros/VBA/__SRP_2
sid
16
type_literal
stream
size
142
name
Macros/VBA/__SRP_3
sid
17
type_literal
stream
size
833
name
Macros/VBA/dir
sid
20
type_literal
stream
size
116
name
ObjectPool/_1606157530/\x01CompObj
sid
6
type_literal
stream
size
20
name
ObjectPool/_1606157530/\x03OCXNAME
sid
8
type_literal
stream
size
6
name
ObjectPool/_1606157530/\x03ObjInfo
sid
7
type_literal
stream
size
516
name
ObjectPool/_1606157530/\x03PRINT
sid
5
type_literal
stream
size
1632
name
ObjectPool/_1606157530/contents
sid
9
type_literal
stream
size
4096
name
WordDocument
sid
2
Macros and VBA code streams
[+] JSutzbIDItO.cls Macros/VBA/JSutzbIDItO 32 bytes
[+] TGrdRnCLv.bas Macros/VBA/TGrdRnCLv 7507 bytes
obfuscated run-file
ExifTool file metadata
SharedDoc
No

CodePage
Windows Latin 1 (Western European)

System
Windows

LinksUpToDate
No

HeadingPairs
Title, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
23

CreateDate
2018:12:12 19:06:00

Word97
No

LanguageCode
English (US)

CompObjUserType
Microsoft Word 97-2003 Document

ModifyDate
2018:12:12 19:06:00

ScaleCrop
No

Characters
21

HyperlinksChanged
No

RevisionNumber
1

MIMEType
application/msword

Words
3

FileType
DOC

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 f8c0c628bc981955b1dd80c322a459ea
SHA1 3b1e7d046319d4d69a998392af972354672e415e
SHA256 f0652a265da0a80ffb80458cd026b42ad7f06bf618959aca3ce380a38cb0d619
ssdeep
1536:/ocn1kp59gxBK85fBzNVJINQGX/JnsJnSfY+a9:g41k/W48dNnINrPFonE

File size 85.3 KB ( 87296 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Dec 11 19:06:00 2018, Last Saved Time/Date: Tue Dec 11 19:06:00 2018, Number of Pages: 1, Number of Words: 3, Number of Characters: 21, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
obfuscated macros run-file doc

VirusTotal metadata
First submission 2018-12-13 03:03:16 UTC ( 5 months, 1 week ago )
Last submission 2018-12-13 04:33:59 UTC ( 5 months, 1 week ago )
File names EIN_ACH_36967918328.doc
EIN_41839633041993.doc
ACH_7629920970808.doc
EIN_9419852476353276996.doc
ACH_88367396504.doc
emotet_e2_f0652a265da0a80ffb80458cd026b42ad7f06bf618959aca3ce380a38cb0d619_2018-12-13__02:46:23.doc
ACH_33094214974746408015.doc
EIN_ACH_1789220396.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!