Possible_EXPLOITEDRTF01
Windows
Threat Type: Others
Destructiveness: No
Encrypted:
In the wild: Yes
TECHNICAL DETAILS
NOTES:
This detection is for weaponized RTF files. It detects possible exploits for the following vulnerabilities:
- CVE-2017-11882
- CVE-2012-0158
- CVE-2015-1641
- CVE-2015-1770
- CVE-2014-1761
- CVE-2017-8570
SOLUTION
For Trend Micro Customers
Scanning your system with your registered Trend Micro security solution removes this malware.
Trend Micro products are powered by the Trend Micro™ Smart Protection Network™, a technology designed to protect you from all kinds of online security threats, regardless of type, attack vector, or behavior.
If you suspect a false positive (i.e. you believe the detected file to be non-malicious), kindly submit a sample of the detected file through the following channels for analysis:
For Non-Trend Micro Customers
You may download, install, and scan your system with HouseCall, our highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
Did this description help? Tell us how we did.