Malware Hash Query

This utility queries our own database,,, and Team-CYMRU for known malware hashes and links to analysis reports.


File: Exile Group.doc
File size: 437564 bytes
File type: data
MD5: e3879faa75932f33604e8cd398d7ead4
SHA1: ed9316c8146c763235dd5e912c627cacbf7f5832
SHA256: 17dec099c0eff198b039028472219da73c6e7c22d0c74268303e3057b710a5f1
SSDEEP: 12288:+6cALhdG8CS4QJBx3VgIcttZU9svt4UfvSpGfppq4A:+6cALLJlXctta9MtNfvql
Reported: 2015-07-09 11:01:54
Detection engine: 213
Result: Suspicious file - Embedded Executable
Confidence: 50
Scan hits: 1

Embedded Executable:

XOR encryption: Yes
Bitwise ROL cipher: No
Replacement cipher: No
Mathematical substitution cipher: No

Search type: xordb
Matching: full
Key Length: 256 bytes
Key Unique Sum: 32640 More
Key Location: @14561 bytes
Key Accuracy: 100.00%
Fuzzy Errors: 0
File XOR Offset: @225 bytes
XOR Key normalized hash: 9b7e14df2ffe3c32566f3fff8481c6f2 More
XOR Key:

Detected entities:

Embedded Executable: This program cannot be run in DOS mode [14639] show hexdump

RepositoryStatusMore Info

Embedded Executable
Confidence: 50
Scan hits: 1

New/Nothing Found


New/Nothing Found


New/Nothing Found


Shellcode Scan:

Shellcode not found.

Exploit Scan:

Exploit: not found.

Sandbox report:

Processing...this can take from 20 minutes to several hours depending on the load.

Comments (0): show/hide