FireEye |
Exploit.RTF-ObfsObjDat.Gen |
CAT-QuickHeal |
Exp.RTF.Obfus.Gen |
ALYac |
Exploit.RTF-ObfsObjDat.Gen |
Sangfor |
Malware.Generic-RTF.Save.4aa2c45b |
Arcabit |
Exploit.RTF-ObfsObjDat.Gen |
Symantec |
Bloodhound.RTF.20 |
ESET-NOD32 |
multiple detections |
Cynet |
Malicious (score: 99) |
Kaspersky |
HEUR:Exploit.MSOffice.CVE-2018-0802.gen |
BitDefender |
Exploit.RTF-ObfsObjDat.Gen |
NANO-Antivirus |
Exploit.Rtf.Heuristic-rtf.dinbqn |
MicroWorld-eScan |
Exploit.RTF-ObfsObjDat.Gen |
F-Secure |
Heuristic.HEUR/Rtf.Malformed |
DrWeb |
Exploit.CVE-2018-0798.4 |
VIPRE |
Exploit.RTF-ObfsObjDat.Gen |
TrendMicro |
HEUR_RTFMALFORM |
Emsisoft |
Exploit.RTF-ObfsObjDat.Gen (B) |
Avira |
HEUR/Rtf.Malformed |
MAX |
malware (ai score=84) |
Microsoft |
Exploit:Win32/CVE-2017-11882!ml |
ZoneAlarm |
HEUR:Exploit.MSOffice.CVE-2018-0802.gen |
GData |
Exploit.RTF-ObfsObjDat.Gen |
Google |
Detected |
AhnLab-V3 |
RTF/Malform-A.Gen |
McAfee |
RTFObfustream.c!B39F481790C3 |
Zoner |
Probably Heur.RTFBadHeader |
Rising |
Exploit.CVE-2017-11882!1.E8F8 (CLASSIC) |
Ikarus |
Exploit.CVE-2017-11882 |
Fortinet |
MSOffice/CVE_2018_0798.BOR!exploit |