[QuickSand.io Home][Report Permalink]

QuickSand.io Malware Analysis Results

Date2020-01-14 16:21:24
FilenameSumitomo Confirm Draft - ANA.docm
Size35257 bytes
MD5c0a7fce08f081faee79d35891624ca6d
SHA136f384ff1c1d2ef2b800498d3be1227060e02552
SHA256ef118500499d7c5e07ec640037ca9d492ac765493821439f4fa480815d9c0e61
SHA512bb656e722681ba31f741952d84fe019002b99a7f94b53a7e26fb01ff12d285645bbe8526f37294abb87505ff84bc8956528cdd5da53c716465bb32759a963019
is_malware2 [file is high risk]
Score32 [high]
Runtime3.52 sec
Exploitswarning_vb_macro
exploit_cve_2012_0158
warning_activex_exec
Yaraopenxml_remote_content
Streams

root:

zip:[Content_Types].xml:

zip:_rels/.rels:

zip:word/document.xml:

zip:word/_rels/document.xml.rels:

zip:word/footnotes.xml:

zip:word/endnotes.xml:

zip:word/header1.xml:

zip:word/vbaProject.bin:

ezip@10656:

zip:word/media/image1.wmf:

zip:word/media/image2.wmf:

zip:word/theme/theme1.xml:

zip:word/media/image3.wmf:

zip:word/settings.xml:

zip:customXml/item1.xml:

zip:customXml/itemProps1.xml:

zip:word/numbering.xml:

zip:word/styles.xml:

zip:word/webSettings.xml:

zip:word/activeX/activeX1.xml:

zip:word/activeX/activeX1.bin:

zip:word/activeX/activeX2.xml:

zip:word/activeX/activeX3.bin:

zip:word/activeX/activeX4.bin:

zip:word/fontTable.xml:

zip:docProps/core.xml:

zip:docProps/app.xml:

zip:word/activeX/activeX2.bin:

zip:customXml/_rels/item1.xml.rels:

zip:word/activeX/_rels/activeX1.xml.rels:

zip:word/activeX/_rels/activeX2.xml.rels:

zip:word/activeX/_rels/activeX3.xml.rels:

zip:word/activeX/_rels/activeX4.xml.rels:




[View report JSON] [View submissions JSON]