× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4247fea3ab6c2870ca2afcc66ef37e9be31bc683af05efe80a5d19d2c723762a
File name: .BC.T_NyaaS7
Detection ratio: 24 / 60
Analysis date: 2018-07-17 06:32:08 UTC ( 5 months ago )
Antivirus Result Update
AegisLab Exploit.Java.Cve!c 20180717
AhnLab-V3 JAVA/Jade 20180716
ALYac Exploit.Java.CVE-2010-0840.AB 20180717
Arcabit Exploit.Java.CVE-2010-0840.AB 20180717
Avast Java:Jade-A [Heur] 20180716
AVG Java:Jade-A [Heur] 20180716
BitDefender Exploit.Java.CVE-2010-0840.AB 20180717
ClamAV Win.Trojan.Java-104 20180717
ESET-NOD32 Java/Agent.AA 20180717
F-Secure Exploit.Java.CVE-2010-0840.AB 20180717
GData Exploit.Java.CVE-2010-0840.AB 20180717
Ikarus Trojan.Java.Agent 20180716
MAX malware (ai score=100) 20180717
McAfee Exploit-CVE2010-0840 20180717
McAfee-GW-Edition BehavesLike.Java.Suspicious.xm 20180717
Microsoft Trojan:Win32/Bitrep.A 20180717
eScan Exploit.Java.CVE-2010-0840.AB 20180717
Qihoo-360 Win32/Trojan.929 20180717
Symantec Trojan Horse 20180717
Tencent Java.Trojan.Dload.Lffv 20180717
TrendMicro JAVA_DLOAD.GER 20180717
TrendMicro-HouseCall JAVA_DLOAD.GER 20180717
VBA32 Java.Agent.AA 20180716
Webroot W32.Malware.Gen 20180717
Ad-Aware 20180717
Alibaba 20180713
Antiy-AVL 20180717
Avast-Mobile 20180716
Avira (no cloud) 20180717
AVware 20180717
Babable 20180406
Baidu 20180717
Bkav 20180716
CAT-QuickHeal 20180716
CMC 20180716
Comodo 20180717
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180717
Cyren 20180717
DrWeb 20180717
eGambit 20180717
Emsisoft 20180717
Endgame 20180711
F-Prot 20180717
Fortinet 20180717
Sophos ML 20180601
Jiangmin 20180717
K7AntiVirus 20180717
K7GW 20180717
Kaspersky 20180717
Kingsoft 20180717
Malwarebytes 20180717
NANO-Antivirus 20180717
Palo Alto Networks (Known Signatures) 20180717
Panda 20180716
Rising 20180717
SentinelOne (Static ML) 20180701
Sophos AV 20180717
SUPERAntiSpyware 20180717
TACHYON 20180717
TheHacker 20180716
TotalDefense 20180717
Trustlook 20180717
VIPRE 20180717
ViRobot 20180717
Yandex 20180716
ZoneAlarm by Check Point 20180717
Zoner 20180716
The file being studied is a Java class file! These are files containing a java bytecode which can be executed on the Java Virtual Machine (JVM).
File metadata
Class name vuln.Link
Target Java platform 1.2
Extends java.beans.Expression
Implements java.util.Map$Entry
Requires
Provides
Methods
Constants
Execution parents
Compressed bundles
File identification
MD5 3013c223a80371bca0798e1c21683305
SHA1 b8331215fb6a0c696f7318b9cee5cec04cfdf7d1
SHA256 4247fea3ab6c2870ca2afcc66ef37e9be31bc683af05efe80a5d19d2c723762a
ssdeep
12:blIVOm+2IW2xzMtlwJlPsomtv/MOu/25Y/XIWaI0Q1lXdN3lXmAkfwlFs:blsOB2x23Jljmtl58XxaTQvX9gfQFs

File size 672 bytes ( 672 bytes )
File type Java Bytecode
Magic literal
compiled Java class data, version 46.0 (Java 1.2)

TrID Java bytecode (60.0%)
Mac OS X Universal Binary executable (40.0%)
Tags
cve-2010-0840 java-bytecode exploit

VirusTotal metadata
First submission 2010-08-22 10:28:18 UTC ( 8 years, 3 months ago )
Last submission 2014-08-19 09:04:50 UTC ( 4 years, 3 months ago )
File names 13105628 MD5 3013c223a80371bca0798e1c21683305.lst
3013C223A80371BCA0798E1C21683305
unp32154630.tmp
aa
8dEabnLpQ.txt
smona_4247fea3ab6c2870ca2afcc66ef37e9be31bc683af05efe80a5d19d2c723762a.bin
1
.BC.T_NyaaS7
3013c223a80371bca0798e1c21683305
Link.class
VirusShare_3013c223a80371bca0798e1c21683305
Link.class
filA59753CC162CD57A33D9BE9DE4924A43
vt-upload-NhTIL
b8331215fb6a0c696f7318b9cee5cec04cfdf7d1_Link.class
MCI_Vr957.7z
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!