× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 01d7e8c5129b35544767911e148fe7b19a902998f0e4b5792662c69ac6a098ca
File name: 8563342add46f7eadc8745bb10267b2a
Detection ratio: 33 / 56
Analysis date: 2017-02-26 07:50:30 UTC ( 4 hours, 49 minutes ago )
Antivirus Result Update
ALYac Java.Exploit.CVE-2010-0094.A 20170225
AVG Java/Exploit.KV 20170226
Ad-Aware Java.Exploit.CVE-2010-0094.A 20170226
AegisLab Exploit.Java.CVE-2010-0094.q!c 20170226
AhnLab-V3 JAVA/Cve-2008-5353 20170225
Antiy-AVL Trojan[Exploit]/Java.CVE-2010-0094.q 20170226
Arcabit Java.Exploit.CVE-2010-0094.A 20170226
Avast Java:Jade-C [Heur] 20170226
Avira (no cloud) EXP/CVE-2012-1723.A.Gen 20170225
BitDefender Java.Exploit.CVE-2010-0094.A 20170226
CAT-QuickHeal JAVA.Suspicious.Gen 20170225
ClamAV Java.Exploit.96-1 20170226
Comodo UnclassifiedMalware 20170226
DrWeb Exploit.Java.144 20170226
ESET-NOD32 a variant of Java/TrojanDownloader.Agent.NAI 20170226
F-Secure Java.Exploit.CVE-2010-0094.A 20170226
Fortinet Java/CVE20100094.Q!exploit 20170226
GData Java.Exploit.CVE-2010-0094.A 20170226
Ikarus Exploit.JAVA.Loader 20170225
Kaspersky Exploit.Java.CVE-2010-0094.q 20170226
McAfee Exploit-CVE2010-0094 20170225
McAfee-GW-Edition BehavesLike.Java.Exploit.xm 20170226
eScan Java.Exploit.CVE-2010-0094.A 20170226
Microsoft Exploit:Java/CVE-2008-5353 20170226
NANO-Antivirus Trojan.Java.JavaKCP.duezq 20170226
Qihoo-360 virus.java.cve-2012-0507.a 20170226
Sophos Mal/JavaCL-C 20170226
Symantec Trojan.Maljava!gen1 20170224
Tencent Java.Exploit.Cve-2010-0094.Dztj 20170226
TrendMicro JAVA_CVE20085353.A 20170226
TrendMicro-HouseCall JAVA_CVE20085353.A 20170226
VBA32 Exploit.Java.CVE-2010-0094.q 20170224
Zillya Downloader.Agent.JS.702 20170224
AVware 20170226
Alibaba 20170224
Baidu 20170224
Bkav 20170225
CMC 20170225
CrowdStrike Falcon (ML) 20170130
Cyren 20170226
Emsisoft 20170226
Endgame 20170222
F-Prot 20170226
Invincea 20170203
Jiangmin 20170226
K7AntiVirus 20170226
K7GW 20170226
Kingsoft 20170226
Malwarebytes 20170226
Panda 20170225
Rising 20170226
SUPERAntiSpyware 20170226
TheHacker 20170223
TotalDefense 20170226
Trustlook 20170226
VIPRE 20170226
ViRobot 20170225
Webroot 20170226
WhiteArmor 20170222
Yandex 20170225
Zoner 20170226
nProtect 20170226
The file being studied is a Java class file! These are files containing a java bytecode which can be executed on the Java Virtual Machine (JVM).
File metadata
Class name PayloadClassLoader
Target Java platform 1.6
Extends java.lang.ClassLoader
Implements java.io.Serializable
Provides
Methods
Constants
File identification
MD5 8563342add46f7eadc8745bb10267b2a
SHA1 f36130d25d34a93899481eec1a974c12a7c5edf8
SHA256 01d7e8c5129b35544767911e148fe7b19a902998f0e4b5792662c69ac6a098ca
ssdeep
48:pXkRG8YvlzFC8ExMRKPDx0Lx5/VC6vAzKtasM3U0lc8glCrVZsFt/CwyM:pKnMlE8Eis2LLtbvJSrc7KkFt/ChM

File size 2.8 KB ( 2836 bytes )
File type Java Bytecode
Magic literal
compiled Java class data, version 50.0 (Java 1.6)

TrID Java bytecode (60.0%)
Mac OS X Universal Binary executable (40.0%)
Tags
java-bytecode cve-2008-5353 cve-2012-1723 cve-2012-0507 exploit cve-2010-0094

VirusTotal metadata
First submission 2010-11-13 03:59:28 UTC ( 6 years, 3 months ago )
Last submission 2016-06-26 17:43:02 UTC ( 8 months ago )
File names output.13724866.txt
8563342add46f7eadc8745bb10267b2a
13724866
8563342add46f7eadc8745bb10267b2a
PayloadClassLoader.class
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!