× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 381f6a62b62fe7c2d299ec287568d0bda1356095ea0f9fff05f3ac4c1354897f
File name: fil3DBE117AEC85912C885DBD57EA078926
Detection ratio: 31 / 59
Analysis date: 2017-10-18 05:17:35 UTC ( 22 hours, 33 minutes ago )
Antivirus Result Update
Ad-Aware Java.Trojan.GenericGB.705 20171018
AegisLab Exploit.Java.CVE-2010-0094.q!c 20171018
AhnLab-V3 JAVA/Cve-2010-0094 20171017
ALYac Java.Trojan.GenericGB.705 20171017
Arcabit Java.Trojan.GenericGB.705 20171017
Avast Java:Agent-HH [Expl] 20171018
AVG Java:Agent-HH [Expl] 20171018
Avira (no cloud) TR/Offend.2.17010 20171018
BitDefender Java.Trojan.GenericGB.705 20171018
CAT-QuickHeal JAVA.Suspicious.Gen 20171017
ClamAV Java.Exploit.98-1 20171017
Emsisoft Java.Trojan.GenericGB.705 (B) 20171018
ESET-NOD32 Java/Exploit.CVE-2010-0094.O 20171018
F-Secure Java.Trojan.GenericGB.705 20171018
GData Java.Trojan.GenericGB.705 20171018
Ikarus Trojan.Java.Exploit 20171017
Jiangmin Exploit.CVE-2010-0094.a 20171018
Kaspersky Exploit.Java.CVE-2010-0094.q 20171017
McAfee Exploit-CVE2010-0094 20171018
McAfee-GW-Edition BehavesLike.Java.Suspicious.zv 20171018
eScan Java.Trojan.GenericGB.705 20171018
NANO-Antivirus Trojan.Java.JavaImrC.tjics 20171018
Qihoo-360 Win32/Trojan.Exploit.1d2 20171018
Sophos AV Mal/JavaImr-C 20171018
Symantec Trojan.Gen.2 20171018
Tencent Java.Exploit.Cve-2010-0094.Palw 20171018
TrendMicro JAVA_CVE20100094.A 20171018
TrendMicro-HouseCall JAVA_CVE20100094.A 20171018
VBA32 Exploit.Java.Agent.ep 20171017
Zillya Exploit.CVE.JS.723 20171017
ZoneAlarm by Check Point Exploit.Java.CVE-2010-0094.q 20171018
Alibaba 20170911
Antiy-AVL 20171018
Avast-Mobile 20171017
AVware 20171018
Baidu 20171017
Bkav 20171017
CMC 20171017
Comodo 20171017
CrowdStrike Falcon (ML) 20170804
Cylance 20171018
Cyren 20171018
eGambit 20171018
Endgame 20171016
F-Prot 20171018
Fortinet 20171018
Sophos ML 20170914
K7AntiVirus 20171017
K7GW 20171016
Kingsoft 20171018
Malwarebytes 20171018
MAX 20171017
Microsoft 20171018
nProtect 20171018
Palo Alto Networks (Known Signatures) 20171018
Panda 20171017
Rising 20171018
SentinelOne (Static ML) 20171001
SUPERAntiSpyware 20171018
Symantec Mobile Insight 20171011
TheHacker 20171017
TotalDefense 20171017
Trustlook 20171018
VIPRE 20171018
ViRobot 20171018
Webroot 20171018
WhiteArmor 20171016
Yandex 20171017
Zoner 20171018
The file being studied is a Java class file! These are files containing a java bytecode which can be executed on the Java Virtual Machine (JVM).
File metadata
Class name Exploit$2
Target Java platform 1.6
Extends javax.management.remote.rmi.RMIServerImpl
Requires
Provides
Methods
Constants
Compressed bundles
File identification
MD5 452cd049ce83e72f5c642f7457f4aa93
SHA1 198b3a566e9f3e6e776ecc4b789865dd54853e71
SHA256 381f6a62b62fe7c2d299ec287568d0bda1356095ea0f9fff05f3ac4c1354897f
ssdeep
24:k2FjV1GO6ljgmYUtD+MGOqRwZGJGcJqIVp8IuO/5sWjlla1Q1vgvwmeG9v3:kGSlE3MGOqRwZGJGco0yZW5s0Gmev9v3

File size 1.5 KB ( 1501 bytes )
File type Java Bytecode
Magic literal
compiled Java class data, version 50.0 (Java 1.6)

TrID Java bytecode (60.0%)
Mac OS X Universal Binary executable (40.0%)
Tags
java-bytecode exploit cve-2010-0094

VirusTotal metadata
First submission 2010-11-09 06:35:15 UTC ( 6 years, 11 months ago )
Last submission 2016-06-26 17:42:58 UTC ( 1 year, 3 months ago )
File names 452cd049ce83e72f5c642f7457f4aa93
fil3DBE117AEC85912C885DBD57EA078926
Exploit$2.class
GOez0KY.7z
381f6a62b62fe7c2d299ec287568d0bda1356095ea0f9fff05f3ac4c1354897f
cklNqEGA83.wbs
test.txt
aa
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!