Malware Hash Query

This utility queries our own database,,, and Team-CYMRU for known malware hashes and links to analysis reports.


File: chaqiriq.doc
File size: 441148 bytes
File type: data
MD5: 38f83048103e139a8852a447109681d3
SHA1: 3f0f0ce0b7c92f9922838770119c220f1f29d7de
SHA256: 8977d11e64e4bbd775cd9c4cfedd4c420bb6af2da0471589005c075857b66f65
SSDEEP: 12288:+7cALhdG8CS4QJBx3VgIcttZU9svt4UfvSpGfppq4A:+7cALLJlXctta9MtNfvql
Reported: 2015-07-10 12:38:00
Detection engine: 213
Result: Suspicious file - Embedded Executable
Confidence: 50
Scan hits: 1

Embedded Executable:

XOR encryption: Yes
Bitwise ROL cipher: No
Replacement cipher: No
Mathematical substitution cipher: No

Search type: xordb
Matching: full
Key Length: 256 bytes
Key Unique Sum: 32640 More
Key Location: @14561 bytes
Key Accuracy: 100.00%
Fuzzy Errors: 0
File XOR Offset: @225 bytes
XOR Key normalized hash: 9b7e14df2ffe3c32566f3fff8481c6f2 More
XOR Key:

Detected entities:

Embedded Executable: This program cannot be run in DOS mode [14639] show hexdump

RepositoryStatusMore Info

Embedded Executable
Confidence: 50
Scan hits: 1

New/Nothing Found


New/Nothing Found


New/Nothing Found


Shellcode Scan:

Shellcode not found.

Exploit Scan:

Exploit: not found.

Sandbox report:

Processing...this can take from 20 minutes to several hours depending on the load.

Comments (0): show/hide