× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 07046929cfd6c6ffed93ab5a7b726c085498c1ee076cc476ddaeb2a658075856
File name: 2015-09-20-KaiXin-EK-Java-Exploit.jar
Detection ratio: 15 / 56
Analysis date: 2015-09-21 02:04:16 UTC ( 1 year, 8 months ago ) View latest
Antivirus Result Update
AhnLab-V3 JAVA/Cve-2011-3544 20150920
Avast Java:CVE-2011-3544-MS [Expl] 20150921
AVG Java/Exploit 20150920
ESET-NOD32 a variant of Java/Exploit.Agent.RKO 20150920
Fortinet PossibleThreat.P0 20150921
GData Java.Trojan.Agent.A751YX 20150921
Ikarus Trojan.Java.Exploit 20150921
Jiangmin Exploit.Java.cbw 20150919
Kaspersky HEUR:Exploit.Java.CVE-2011-3544.gen 20150921
McAfee-GW-Edition Artemis 20150920
Qihoo-360 Win32/Trojan.3e5 20150921
Sophos Mal/Generic-S 20150920
Symantec Trojan.Maljava 20150920
TrendMicro JAVA_CVE20113544.F 20150921
TrendMicro-HouseCall JAVA_CVE20113544.F 20150921
Ad-Aware 20150921
AegisLab 20150920
Yandex 20150920
Alibaba 20150921
ALYac 20150921
Antiy-AVL 20150921
Arcabit 20150921
Avira (no cloud) 20150920
AVware 20150920
Baidu-International 20150920
BitDefender 20150921
Bkav 20150919
ByteHero 20150921
CAT-QuickHeal 20150919
ClamAV 20150918
CMC 20150920
Comodo 20150921
Cyren 20150921
DrWeb 20150921
Emsisoft 20150921
F-Prot 20150919
F-Secure 20150919
K7AntiVirus 20150920
K7GW 20150920
Kingsoft 20150921
Malwarebytes 20150920
McAfee 20150921
Microsoft 20150921
eScan 20150921
NANO-Antivirus 20150921
nProtect 20150918
Panda 20150920
Rising 20150920
SUPERAntiSpyware 20150921
Tencent 20150921
TheHacker 20150919
VBA32 20150920
VIPRE 20150920
ViRobot 20150921
Zillya 20150920
Zoner 20150921
The file being studied is a Java Archive! Typically a JAR file contains the class files and auxiliary resources associated with applets and applications.
Archive metadata
Total directories 1
Maximum directory depth 1
Total files 4
Maximum member date 2015-09-09 01:21:10
Minimum member date 2011-12-01 15:31:34
Manifest
Java packages
Interesting strings
Embedded files by type
xml 2
ascii 1
class 1
Embedded files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
5
Uncompressed size
4346
Highest datetime
2015-09-09 01:21:10
Lowest datetime
2011-12-01 15:31:34
Contained files by extension
MF
1
Contained files by type
XML
2
Java Bytecode
1
directory
1
unknown
1
PCAP parents
File identification
MD5 65f128db98cec269f21f891c97b12ce8
SHA1 3916574aa3fb769c02338f592a6871c938139750
SHA256 07046929cfd6c6ffed93ab5a7b726c085498c1ee076cc476ddaeb2a658075856
ssdeep
48:9bwllw9ekJffhOxquvjkyk6nRqa9j4jbBKTabM4Cdv9k5WZe6Xf31xsD9usDst82:JElpkJffco6nRqEU5Of99kCe6XflxsD4

File size 2.9 KB ( 2983 bytes )
File type JAR
Magic literal
Zip archive data, at least v2.0 to extract

TrID ZIP compressed archive (100.0%)
Tags
exploit jar cve-2011-3544

VirusTotal metadata
First submission 2015-09-18 04:22:07 UTC ( 1 year, 8 months ago )
Last submission 2016-06-04 11:52:22 UTC ( 11 months, 3 weeks ago )
File names isheriff_65f128db98cec269f21f891c97b12ce8.bin
YcVoEu.jar
2015-09-20-KaiXin-EK-Java-Exploit.jar
NtEcZl.jar
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!