× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0a99152fd0788f0bb9ddbda27fc30aa2f924e96aeeb82dc8f8a0d9e4a1eafa34
File name: jurylamp.jar
Detection ratio: 7 / 46
Analysis date: 2013-03-06 21:27:02 UTC ( 4 years, 6 months ago ) View latest
Antivirus Result Update
AntiVir EXP/CVE-2013-0431.K 20130306
AVG Java/Exploit.BJP 20130306
Comodo UnclassifiedMalware 20130306
ESET-NOD32 a variant of Java/Exploit.Agent.NIB 20130306
Ikarus Exploit.Java.CVE-2013 20130306
Microsoft Exploit:Java/CVE-2013-0431 20130306
TrendMicro-HouseCall TROJ_GEN.RCBH1C2 20130306
Yandex 20130306
AhnLab-V3 20130306
Antiy-AVL 20130306
Avast 20130306
BitDefender 20130306
ByteHero 20130304
CAT-QuickHeal 20130306
ClamAV 20130306
Commtouch 20130306
DrWeb 20130306
Emsisoft 20130306
eSafe 20130211
F-Prot 20130306
F-Secure 20130306
Fortinet 20130306
GData 20130306
Jiangmin 20130304
K7AntiVirus 20130306
Kaspersky 20130306
Kingsoft 20130304
Malwarebytes 20130306
McAfee 20130306
McAfee-GW-Edition 20130306
eScan 20130306
NANO-Antivirus 20130306
Norman 20130306
nProtect 20130306
Panda 20130306
PCTools 20130306
Rising 20130306
Sophos AV 20130306
SUPERAntiSpyware 20130306
Symantec 20130306
TheHacker 20130305
TotalDefense 20130306
TrendMicro 20130306
VBA32 20130305
VIPRE 20130306
ViRobot 20130306
The file being studied is a Java Archive! Typically a JAR file contains the class files and auxiliary resources associated with applets and applications.
Archive metadata
Total directories 1
Maximum directory depth 1
Total files 4
Maximum member date 2013-02-26 17:57:12
Minimum member date 2013-02-26 17:57:12
Manifest
Java packages
Interesting strings
Embedded files by type
binary 1
ascii 1
class 2
Embedded files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
5
Uncompressed size
11969
Highest datetime
2013-02-26 17:57:12
Lowest datetime
2013-02-26 17:57:12
Contained files by extension
MF
1
ser
1
Contained files by type
unknown
2
Java Bytecode
2
directory
1
PCAP parents
File identification
MD5 dcba86395938737b058299b8e22b6d65
SHA1 802407c587b7262994d4b4f40b6a2961ccb7fa70
SHA256 0a99152fd0788f0bb9ddbda27fc30aa2f924e96aeeb82dc8f8a0d9e4a1eafa34
ssdeep
96:a64H8/NKT25iTz+N7ri82lLzCufGwUlf+xaFYgXkH92s1FZH4ghiVazvjE14YT5g:F4cEy5YzuKnV9fGwU5aaOgcF54giaTjh

File size 5.8 KB ( 5891 bytes )
File type JAR
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
cve-2013-0431 exploit jar

VirusTotal metadata
First submission 2013-02-26 22:42:48 UTC ( 4 years, 6 months ago )
Last submission 2014-03-19 17:10:45 UTC ( 3 years, 6 months ago )
File names jurylamp.jar
aa
16b96d1d0d1cc27f7c3e8b9736c2ce97f9ec6cdf
9632715
output.9632715.txt
0a99152fd0788f0bb9ddbda27fc30aa2f924e96aeeb82dc8f8a0d9e4a1eafa34
jurylamp.jar
I2ycpqOIdf.reg
file-5218565_ViR
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!