× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: cfe7a4548e57df9d4e8904fd105ad31641721a2760c4f23ad413a44442f5f9d2
Nombre: our order.xlsx
Detecciones: 10 / 55
Fecha de análisis: 2019-03-14 14:39:27 UTC ( hace 1 mes, 1 semana ) Ver el más reciente
Antivirus Resultado Actualización
ESET-NOD32 probably a variant of Win32/Exploit.CVE-2017-11882.C 20190314
Ikarus Trojan.Office.Doc 20190314
Kaspersky HEUR:Exploit.MSOffice.Generic 20190314
McAfee-GW-Edition Artemis 20190314
Microsoft Trojan:Win32/Sonbokli.A!cl 20190314
Qihoo-360 Win32/Trojan.Exploit.ed7 20190314
Sophos AV Exp/20180802-B 20190314
TACHYON Suspicious/W97.CVE-2017-11882 20190314
Tencent Office.Exploit.Generic.Efas 20190314
ZoneAlarm by Check Point HEUR:Exploit.MSOffice.Generic 20190314
Acronis 20190313
Ad-Aware 20190314
AegisLab 20190314
AhnLab-V3 20190314
Alibaba 20190306
ALYac 20190314
Antiy-AVL 20190314
Arcabit 20190314
Avast 20190314
Avast-Mobile 20190314
AVG 20190314
Avira (no cloud) 20190314
Babable 20180918
Baidu 20190306
BitDefender 20190314
Bkav 20190314
CAT-QuickHeal 20190314
ClamAV 20190314
CMC 20190314
Comodo 20190314
CrowdStrike Falcon (ML) 20190212
Cybereason 20190109
Cyren 20190314
DrWeb 20190314
eGambit 20190314
Emsisoft 20190314
Endgame 20190215
F-Secure 20190314
Fortinet 20190314
GData 20190314
Sophos ML 20190313
Jiangmin 20190314
K7AntiVirus 20190314
K7GW 20190314
Kingsoft 20190314
Malwarebytes 20190314
MAX 20190314
McAfee 20190314
eScan 20190314
NANO-Antivirus 20190314
Palo Alto Networks (Known Signatures) 20190314
Panda 20190314
Rising 20190314
SentinelOne (Static ML) 20190311
SUPERAntiSpyware 20190314
Symantec Mobile Insight 20190220
TheHacker 20190308
TotalDefense 20190314
Trapmine 20190301
TrendMicro-HouseCall 20190314
Trustlook 20190314
VBA32 20190314
ViRobot 20190314
Yandex 20190314
Zillya 20190313
Zoner 20190314
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
OLE Streams
name
Root Entry
clsid
type_literal
root
clsid_literal
on
sid
0
size
832
type_literal
stream
size
64
name
\x06DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
sid
7
type_literal
stream
size
112
name
\x06DataSpaces/DataSpaceMap
sid
5
type_literal
stream
size
208
name
\x06DataSpaces/TransformInfo/StrongEncryptionTransform/\x06Primary
sid
10
type_literal
stream
size
76
name
\x06DataSpaces/Version
sid
4
type_literal
stream
size
61064
name
EncryptedPackage
sid
2
type_literal
stream
size
224
name
EncryptionInfo
sid
1
ExifTool file metadata
MIMEType
image/vnd.fpx

FileType
FPX

FileTypeExtension
fpx

File identification
MD5 fc66d6a09379e38f0e50fd7b3755dc87
SHA1 55dd89bbee7dc2f3516f311243e09758853efa9c
SHA256 cfe7a4548e57df9d4e8904fd105ad31641721a2760c4f23ad413a44442f5f9d2
ssdeep
1536:8IXyuUAGMxcjY+qKx9R92gRbq6u629jHTkZxOaVv:bXNUftjAiFrRu629jw3Oe

Tamaño del fichero 63.6 KB ( 65160 bytes )
Tipo MS Word Document
Magic literal
CDF V2 Document, corrupt: Cannot read summary info

TrID Generic OLE2 / Multistream Compound File (100.0%)
Tags
doc exploit cve-2017-11882

VirusTotal metadata
First submission 2019-03-14 12:14:52 UTC ( hace 1 mes, 1 semana )
Last submission 2019-03-14 20:52:07 UTC ( hace 1 mes, 1 semana )
Nombres our order.xlsx
our order.xlsx
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!