New order_November (1).doc | |
Rich Text Format data, version 1, unknown characte ... | 259133 |
2019-11-18 08:25:51 | |
9db5d36fcf62686cd3defc78e6842e7e | |
5f74ca3e427348b66db86ec5be350654f49f499a | |
e26b634bcf5fb088b4f412fbc2dc7193eba3cb19e1eea094d51cc11722fa3cde | |
N/A | |
N/A | |
N/A | |
N/A | |
Ad-Aware | Exploit.RTF-ObfsStrm.Gen |
Arcabit | Exploit.RTF-ObfsStrm.Gen |
Avira | EXP/CVE-2017-11882.Gen |
BitDefender | Exploit.RTF-ObfsStrm.Gen |
CAT-QuickHeal | Exp.RTF.Obfus.Gen |
Cyren | CVE-2017-11882!Camelot |
DrWeb | Exploit.Rtf.CVE2012-0158 |
ESET-NOD32 | probably a variant of Win32/Exploit.CVE-2017-11882.A |
Emsisoft | Exploit.RTF-ObfsStrm.Gen (B) |
F-Secure | Exploit.EXP/CVE-2017-11882.Gen |
FireEye | Exploit.RTF-ObfsStrm.Gen |
GData | Exploit.RTF-ObfsStrm.Gen |
Ikarus | Trojan-Downloader.DOC.Agent |
Kaspersky | HEUR:Exploit.MSOffice.Generic |
MAX | malware (ai score=87) |
McAfee | Exploit-CVE2017-11882.ca |
McAfee-GW-Edition | Exploit-CVE2017-11882.ca |
MicroWorld-eScan | Exploit.RTF-ObfsStrm.Gen |
Qihoo-360 | heur.rtf.obfuscated.1 |
Rising | Exploit.CVE-2017-11882/SLT!1.AEE3 (CLASSIC) |
Symantec | Bloodhound.RTF.12 |
TACHYON | Trojan-Exploit/RTF.CVE-2017-11882 |
TrendMicro | Trojan.W97M.CVE201711882.SMAL02 |
TrendMicro-HouseCall | Trojan.W97M.CVE201711882.SMAL02 |
ZoneAlarm | HEUR:Exploit.Win32.CVE-2017-11882.a |
Zoner | Probably RTFObfuscationD |