Malware Hash Query

This utility queries our own database,,, and Team-CYMRU for known malware hashes and links to analysis reports.


File: chaqiriq.doc
File size: 438076 bytes
File type: data
MD5: 4630d5747f013782e995b4ef4f9ee0f4
SHA1: e4789a3ea7155035311749f8d6200b45b70ec822
SHA256: 7b3cc362c1442358b8ca2b20aab54335b549e95a428bfe0700237994447ae53c
SSDEEP: 12288:+wcALhdG8CS4QJBx3VgIcttZU9svt4UfvSpGfppq4A:+wcALLJlXctta9MtNfvql
Reported: 2015-07-14 10:45:11
Detection engine: 213
Result: Suspicious file - Embedded Executable
Confidence: 50
Scan hits: 1

Embedded Executable:

XOR encryption: Yes
Bitwise ROL cipher: No
Replacement cipher: No
Mathematical substitution cipher: No

Search type: xordb
Matching: full
Key Length: 256 bytes
Key Unique Sum: 32640 More
Key Location: @14561 bytes
Key Accuracy: 100.00%
Fuzzy Errors: 0
File XOR Offset: @225 bytes
XOR Key normalized hash: 9b7e14df2ffe3c32566f3fff8481c6f2 More
XOR Key:

Detected entities:

Embedded Executable: This program cannot be run in DOS mode [14639] show hexdump

RepositoryStatusMore Info

Embedded Executable
Confidence: 50
Scan hits: 1

New/Nothing Found


New/Nothing Found


New/Nothing Found


Shellcode Scan:

Shellcode not found.

Exploit Scan:

Exploit: not found.

Sandbox report:

Processing...this can take from 20 minutes to several hours depending on the load.

Comments (0): show/hide