× Obsługa plików cookie w przeglądarce jest wyłączona! Ta strona wymaga włączonej obsługi plików cookie, aby działać poprawnie
SHA256: aeefa97e24f7c01b027830ad39bef138022cd6ebf68420dbb4dd7fa92e2d2e5e
Nazwa pliku: Play Mobile - Wezwanie do uregulowania naleznosci.pdf
Współczynnik wykrycia: 25 / 59
Data analizy: 2017-07-22 12:50:41 UTC ( 4 miesiące temu )
Antywirus Wynik Uaktualnij
Ad-Aware Trojan.Script.DQJ 20170722
AegisLab Troj.Script.Dqj!c 20170722
ALYac Trojan.Script.DQJ 20170722
Arcabit Trojan.Script.DQJ 20170722
Avast Other:Malware-gen [Trj] 20170722
AVG Other:Malware-gen [Trj] 20170722
BitDefender Trojan.Script.DQJ 20170722
ClamAV Pdf.Dropper.Agent-6308217-0 20170722
Cyren PDF/Agent.C 20170722
Emsisoft Trojan.Script.DQJ (B) 20170722
ESET-NOD32 PDF/Phishing.Agent.BAZ 20170722
F-Prot PDF/Agent.C 20170722
F-Secure Trojan.Script.DQJ 20170722
Fortinet PDF/Agent.BAZ!tr 20170722
GData Trojan.Script.DQJ 20170722
Ikarus Trojan.PDF.Phishing 20170722
MAX malware (ai score=83) 20170722
McAfee RDN/Generic.dx 20170722
McAfee-GW-Edition RDN/Generic.dx 20170722
eScan Trojan.Script.DQJ 20170722
Rising Trojan.Phishing/PDF!8.E4C0 (cloud:LJPesdsk6YV) 20170722
Symantec Downloader 20170721
TrendMicro PDF_DLOADR.YJT 20170722
TrendMicro-HouseCall PDF_DLOADR.YJT 20170722
ViRobot PDF.S.Phishing.18408 20170722
AhnLab-V3 20170722
Alibaba 20170721
Antiy-AVL 20170722
Avira (no cloud) 20170722
AVware 20170721
Baidu 20170721
Bkav 20170722
CAT-QuickHeal 20170722
CMC 20170721
Comodo 20170722
CrowdStrike Falcon (ML) 20170710
Cylance 20170722
DrWeb 20170722
Endgame 20170721
Sophos ML 20170607
Jiangmin 20170722
K7AntiVirus 20170722
K7GW 20170722
Kaspersky 20170722
Kingsoft 20170722
Malwarebytes 20170722
Microsoft 20170722
NANO-Antivirus 20170722
nProtect 20170722
Palo Alto Networks (Known Signatures) 20170722
Panda 20170722
Qihoo-360 20170722
SentinelOne (Static ML) 20170718
Sophos AV 20170722
SUPERAntiSpyware 20170722
Symantec Mobile Insight 20170720
Tencent 20170722
TheHacker 20170719
TotalDefense 20170722
Trustlook 20170722
VBA32 20170721
VIPRE 20170722
Webroot 20170722
WhiteArmor 20170721
Yandex 20170721
Zillya 20170721
ZoneAlarm by Check Point 20170722
Zoner 20170722
The file being studied is a PDF document! The document's header reveals it is using the following file format specification: %PDF-1.4.
PDFiD information
This PDF file contains 2 JavaScript blocks. Malicious PDF documents often contain JavaScript to exploit JavaScript vulnerabilities and/or to execute heap sprays. Please note you can also find JavaScript in PDFs without malicious intent.
This PDF file contains an open action to be performed when the document is viewed. Malicious PDF documents with JavaScript very often use open actions to launch the JavaScript without user interaction.
The combination of automatic actions and JavaScript makes this PDF document suspicious.
This PDF document has an invalid cross reference table.
This PDF document has 1 page, please note that most malicious PDFs have only one page.
This PDF document has 15 object start declarations and 15 object end declarations.
This PDF document has 8 stream object start declarations and 7 stream object end declarations.
This PDF document has a cross reference table (xref).
This PDF document has a pointer to the cross reference table (startxref).
This PDF document has a trailer dictionary containing entries allowing the cross reference table, and thus the file objects, to be read.
ExifTool file metadata
MIMEType
application/pdf

FileType
PDF

Linearized
No

Warning
Invalid xref table

FileTypeExtension
pdf

PDFVersion
1.4

File identification
MD5 8b90b24f74ada2dab9f869cd47361f3c
SHA1 d20b0996e56100e037a10be35f28d373a8643f1b
SHA256 aeefa97e24f7c01b027830ad39bef138022cd6ebf68420dbb4dd7fa92e2d2e5e
ssdeep
384:jb6eHgsAmRf2EYOoTTk+9T9ffHRQz4ugwHL3buTGfx9ZMq:qeHgsAmRvYOodNJKz4Rwr3KTu9ZMq

File size 18.0 KB ( 18408 bytes )
File type PDF
Magic literal
PDF document, version 1.4

TrID Adobe Portable Document Format (100.0%)
Tags
invalid-xref autoaction js-embedded attachment pdf

VirusTotal metadata
First submission 2017-05-04 00:00:47 UTC ( 6 miesięcy, 3 tygodnie temu )
Last submission 2017-07-21 08:08:06 UTC ( 4 miesiące temu )
Nazwy plików Play Mobile - Wezwanie do uregulowania naleznosci.pdf
Virus - Play Mobile - Wezwanie do uregulowania naleznosci.pdf
WIRUS.pdf
Play_Mobile_-_Wezwanie_do_uregulowania_naleznosci.pdf
IP_VLAN_addresses.xlsx — skrót.lnk.pdf
SYQ5e1cc1046_Play Mobile - Wezwanie do uregulowania naleznosci.pdf
MALWARE PHISHING AGENT
localfile~
__substg1.0_37010102
Play Mobile - Wezwanie do uregulowania%09naleznosci.pdf
ExifTool file metadata
MIMEType
application/pdf

FileType
PDF

Linearized
No

Warning
Invalid xref table

FileTypeExtension
pdf

PDFVersion
1.4

Brak komentarzy. Żaden z członków społeczności VirusTotal nie skomentował tego. Bądź pierwszy, by to zrobić!

Skomentuj

?
Dodaj komentarz

Nie jesteś zalogowany. Tylko zarejestrowani użytkownicy mogą dodawać komentarze, zalogować się i mieć swój głos!

Brak ocen. Nikt jeszcze nie oddał swojego głosu, bądź pierwszy!