× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3b18e94ae4226f56f7c6d289402521da604ce76172d19c23bc9b3ac188066893
File name: 2013-12-23-java-exploit.jar
Detection ratio: 3 / 49
Analysis date: 2013-12-26 02:09:30 UTC ( 5 years, 4 months ago ) View latest
Antivirus Result Update
Kaspersky HEUR:Exploit.Java.Generic 20131226
TrendMicro HEUR_JAVA.EXEC 20131226
TrendMicro-HouseCall TROJ_GEN.F47V1223 20131226
Ad-Aware 20131225
Yandex 20131225
AhnLab-V3 20131225
AntiVir 20131226
Antiy-AVL 20131225
Avast 20131226
AVG 20131225
Baidu-International 20131213
BitDefender 20131226
Bkav 20131225
ByteHero 20130613
CAT-QuickHeal 20131222
ClamAV 20131226
CMC 20131224
Commtouch 20131226
Comodo 20131226
DrWeb 20131226
Emsisoft 20131226
ESET-NOD32 20131225
F-Prot 20131226
F-Secure 20131225
Fortinet 20131226
GData 20131226
Ikarus 20131226
Jiangmin 20131225
K7AntiVirus 20131224
K7GW 20131224
Kingsoft 20130829
Malwarebytes 20131226
McAfee 20131226
McAfee-GW-Edition 20131225
Microsoft 20131226
eScan 20131226
NANO-Antivirus 20131224
Norman 20131225
nProtect 20131225
Panda 20131225
Rising 20131223
Sophos AV 20131226
SUPERAntiSpyware 20131224
Symantec 20131226
TheHacker 20131223
TotalDefense 20131225
VBA32 20131225
VIPRE 20131226
ViRobot 20131225
The file being studied is a Java Archive! Typically a JAR file contains the class files and auxiliary resources associated with applets and applications.
Archive metadata
Total directories 1
Maximum directory depth 1
Total files 8
Maximum member date 2013-12-21 23:25:06
Minimum member date 2013-12-21 23:24:36
Manifest
Java packages
Interesting strings
Embedded files by type
ascii 1
class 7
Embedded files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
9
Uncompressed size
28867
Highest datetime
2013-12-21 23:25:06
Lowest datetime
2013-12-21 23:24:36
Contained files by extension
MF
1
Contained files by type
Java Bytecode
7
directory
1
unknown
1
Compressed bundles
PCAP parents
File identification
MD5 0a4a3fae79346d6f2313f4f73380b4d4
SHA1 36a02f722ba6e21111898ade89c32eeb54b46a43
SHA256 3b18e94ae4226f56f7c6d289402521da604ce76172d19c23bc9b3ac188066893
ssdeep
384:Bx2JaY/pVXSpH3i9wMuc18vzwvq/TlPSdnylHDVqShn5aDfHHmu8a1b3+ektQl:Bob85fcczwvq/Tlcy5DV55GZ1b+Ztq

File size 19.2 KB ( 19690 bytes )
File type JAR
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
exploit jar cve-2013-2463

VirusTotal metadata
First submission 2013-12-23 15:42:34 UTC ( 5 years, 4 months ago )
Last submission 2017-06-28 09:22:06 UTC ( 1 year, 10 months ago )
File names 41_.gif
2013-12-23-java-exploit.jar
vti-rescan
162-9-0_1.eldcoj.zip
fgjrfrusqn
file-7777348_
1494c259-19ee4609.tmp
6d5383a5-19832ba6
0a4a3fae79346d6f2313f4f73380b4d4.malware
2013-12-23-java-exploit.jar
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!