× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fed25e795987f62d3e62863546009b7050c665812ff7944c5e176dc4d6c8b314
File name: zbetcheckin_tracker_9ffe7c42fbd189db682d557cd51e3872
Detection ratio: 10 / 59
Analysis date: 2019-02-05 00:04:32 UTC ( 3 months, 2 weeks ago ) View latest
Antivirus Result Update
Endgame malicious (high confidence) 20181108
K7AntiVirus Trojan ( 00536d111 ) 20190204
K7GW Trojan ( 00536d111 ) 20190204
Microsoft Trojan:Script/Foretype.A!ml 20190204
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi 20190204
SentinelOne (Static ML) static engine - malicious 20190203
TACHYON Suspicious/W97M.Obfus.Gen.1 20190203
Tencent Heur.Macro.Generic.Gen.e 20190204
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Script.Generic 20190204
Zoner Probably W97Shell 20190204
Acronis 20190130
Ad-Aware 20190204
AegisLab 20190204
AhnLab-V3 20190204
Alibaba 20180921
ALYac 20190204
Antiy-AVL 20190204
Arcabit 20190204
Avast 20190204
Avast-Mobile 20190203
AVG 20190204
Avira (no cloud) 20190204
Babable 20180917
Baidu 20190201
BitDefender 20190204
Bkav 20190201
CAT-QuickHeal 20190204
ClamAV 20190204
CMC 20190204
Comodo 20190204
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190204
Cyren 20190204
DrWeb 20190204
eGambit 20190204
Emsisoft 20190204
ESET-NOD32 20190204
F-Prot 20190204
F-Secure 20190204
Fortinet 20190204
GData 20190204
Ikarus 20190204
Sophos ML 20181128
Jiangmin 20190204
Kaspersky 20190204
Kingsoft 20190204
Malwarebytes 20190204
MAX 20190204
McAfee 20190204
McAfee-GW-Edition 20190204
eScan 20190204
Palo Alto Networks (Known Signatures) 20190204
Panda 20190204
Qihoo-360 20190204
Rising 20190204
Sophos AV 20190204
SUPERAntiSpyware 20190130
Symantec 20190204
TheHacker 20190203
TotalDefense 20190204
Trapmine 20190123
TrendMicro 20190205
TrendMicro-HouseCall 20190204
Trustlook 20190204
VBA32 20190204
ViRobot 20190203
Webroot 20190204
Yandex 20190204
Zillya 20190204
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Commonly abused properties
The studied file makes use of macros, a macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. Macros are often abused to perform malicious tasks when working with a document.
May try to run other files, shell commands or applications.
Summary
last_author
Admin
creation_datetime
2019-02-04 14:59:00
template
Normal.dotm
author
admin
page_count
1
last_saved
2019-02-04 14:59:00
revision_number
2
application_name
Microsoft Office Word
character_count
1
code_page
Cyrillic
Document summary
line_count
1
company
Salve
characters_with_spaces
1
version
1048576
paragraph_count
1
code_page
Cyrillic
OLE Streams
name
Root Entry
clsid
00020906-0000-0000-c000-000000000046
type_literal
root
clsid_literal
MS Word
sid
0
size
18816
type_literal
stream
size
114
name
\x01CompObj
sid
26
type_literal
stream
size
4096
name
\x05DocumentSummaryInformation
sid
5
type_literal
stream
size
4096
name
\x05SummaryInformation
sid
4
type_literal
stream
size
7066
name
1Table
sid
2
type_literal
stream
size
224579
name
Data
sid
1
type_literal
stream
size
590
name
Macros/PROJECT
sid
25
type_literal
stream
size
137
name
Macros/PROJECTwm
sid
24
type_literal
stream
size
1137
type
macro
name
Macros/VBA/NrshV7NUp
sid
13
type_literal
stream
size
1366
type
macro
name
Macros/VBA/OJ75BFVLN
sid
11
type_literal
stream
size
2186
type
macro
name
Macros/VBA/ThisDocument
sid
8
type_literal
stream
size
3767
name
Macros/VBA/_VBA_PROJECT
sid
15
type_literal
stream
size
2233
name
Macros/VBA/__SRP_0
sid
17
type_literal
stream
size
206
name
Macros/VBA/__SRP_1
sid
18
type_literal
stream
size
532
name
Macros/VBA/__SRP_2
sid
9
type_literal
stream
size
156
name
Macros/VBA/__SRP_3
sid
10
type_literal
stream
size
943
name
Macros/VBA/dir
sid
16
type_literal
stream
size
900
type
macro
name
Macros/VBA/eI5Y1vzA3
sid
12
type_literal
stream
size
1172
type
macro (only attributes)
name
Macros/VBA/f
sid
14
type_literal
stream
size
97
name
Macros/f/\x01CompObj
sid
22
type_literal
stream
size
284
name
Macros/f/\x03VBFrame
sid
23
type_literal
stream
size
126
name
Macros/f/f
sid
20
type_literal
stream
size
2304
name
Macros/f/o
sid
21
type_literal
stream
size
4096
name
WordDocument
sid
3
Macros and VBA code streams
[+] ThisDocument.cls Macros/VBA/ThisDocument 304 bytes
[+] OJ75BFVLN.bas Macros/VBA/OJ75BFVLN 211 bytes
exe-pattern run-file
[+] eI5Y1vzA3.bas Macros/VBA/eI5Y1vzA3 68 bytes
[+] NrshV7NUp.bas Macros/VBA/NrshV7NUp 143 bytes
ExifTool file metadata
SharedDoc
No

Author
admin

CodePage
Windows Cyrillic

System
Windows

LinksUpToDate
No

LastModifiedBy
Admin

HeadingPairs
, 1

Identification
Word 8.0

Template
Normal.dotm

CharCountWithSpaces
1

Word97
No

LanguageCode
Russian

CompObjUserType
???????? Microsoft Word 97-2003

ModifyDate
2019:02:04 22:59:00

ScaleCrop
No

Company
Salve

Characters
1

HyperlinksChanged
No

RevisionNumber
2

MIMEType
application/msword

Words
0

CreateDate
2019:02:04 22:59:00

Lines
1

AppVersion
16.0

Security
None

Software
Microsoft Office Word

FileType
DOC

TotalEditTime
0

Pages
1

CompObjUserTypeLen
32

FileTypeExtension
doc

Paragraphs
1

LastPrinted
0000:00:00 00:00:00

DocFlags
Has picture, 1Table, ExtChar

File identification
MD5 9ffe7c42fbd189db682d557cd51e3872
SHA1 fe8f92d7d8708589a57b50ab97f66d2f71295ba2
SHA256 fed25e795987f62d3e62863546009b7050c665812ff7944c5e176dc4d6c8b314
ssdeep
6144:SCwQK3RpVS7G4SVuz1QzLhxztsZGPwi0:cQQLGSVuz1QHhxztCi0

File size 265.0 KB ( 271360 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: admin, Template: Normal.dotm, Last Saved By: Admin, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Feb 03 22:59:00 2019, Last Saved Time/Date: Sun Feb 03 22:59:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0

TrID Microsoft Word document (54.2%)
Microsoft Word document (old ver.) (32.2%)
Generic OLE2 / Multistream Compound File (13.5%)
Tags
macros run-file exe-pattern doc

VirusTotal metadata
First submission 2019-02-05 00:04:32 UTC ( 3 months, 2 weeks ago )
Last submission 2019-02-05 01:14:45 UTC ( 3 months, 2 weeks ago )
File names PAY54336996446824025715.doc
PAY91787727153241261.doc
17220348974646931.doc
zbetcheckin_tracker_9ffe7c42fbd189db682d557cd51e3872
US2563463117179.doc
emotet_e2_fed25e795987f62d3e62863546009b7050c665812ff7944c5e176dc4d6c8b314_2019-02-05__000502.doc
4724130038.doc
VX469257465577774.doc
PAY898353674441635697.doc
126582497609627280.doc
97360729168.doc
PAY690945374569279457.doc
US571438601620887642.doc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!