[QuickSand.io Home][Report Permalink]

QuickSand.io Malware Analysis Results

Date2018-11-08 09:56:08
Filenamecea3df962bc9f5696302cc3dc32125df0c43b946c3a3e99a9d31587cff5132a2
Size1221969 bytes
MD5775c49d09e24afc28bad3316b0ba7ac1
SHA1d66e7bdd2196b007d064847051fd28f566ec0a4f
SHA256cea3df962bc9f5696302cc3dc32125df0c43b946c3a3e99a9d31587cff5132a2
SHA5124fe5e7e305c6fad5ea84839dcc2d0aa8971d9e22f94618c8a189689659ca70f1bfa80972ab9d1fec557b486dface9eb87ff47057ff2d45c147b2b11c14f48154
is_malware2 [file is high risk]
Score16 [high]
Runtime67.04 sec
Exploitswarning_vb_macro
exploit_activex_execute_shell
warning_vb_autoopen
warning_vb_fileio
Yaraopenxml_remote_content
Streams

root:

zip:[Content_Types].xml:

zip:_rels/.rels:

zip:word/_rels/document.xml.rels:

zip:word/document.xml:

zip:word/_rels/header3.xml.rels:

zip:word/header1.xml:

zip:word/header3.xml:

zip:word/header2.xml:

zip:word/footer1.xml:

zip:word/endnotes.xml:

zip:word/footnotes.xml:

zip:word/theme/theme1.xml:

zip:word/_rels/vbaProject.bin.rels:

zip:word/vbaProject.bin:

zip:word/media/image1.png:

zip:word/media/image2.png:

zip:word/vbaData.xml:

zip:word/settings.xml:

zip:word/webSettings.xml:

zip:word/styles.xml:

zip:customXml/itemProps1.xml:

zip:word/stylesWithEffects.xml:

zip:word/fontTable.xml:

zip:customXml/item1.xml:

zip:docProps/app.xml:

zip:docProps/core.xml:

zip:customXml/_rels/item1.xml.rels:




[View report JSON] [View submissions JSON]