× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 58588ce6d0a1e042450946b03fa4cd92ac1b4246cb6879a7f50a0aab2a84086a
File name: mt.html
Detection ratio: 22 / 57
Analysis date: 2015-05-15 08:19:32 UTC ( 1 week ago )
Antivirus Result Update
ALYac Trojan.JS.Agent.IHS 20150515
Ad-Aware Trojan.JS.Agent.IHS 20150515
AhnLab-V3 JS/Cve-2012-4792 20150515
Avast JS:Includer-FF [Trj] 20150515
Avira JS/Agent.asc 20150515
BitDefender Trojan.JS.Agent.IHS 20150515
Comodo UnclassifiedMalware 20150515
DrWeb SCRIPT.Virus 20150515
ESET-NOD32 JS/Kryptik.AEZ 20150515
Emsisoft Trojan.JS.Agent.IHS (B) 20150515
F-Secure Trojan.JS.Agent.IHS 20150515
GData Trojan.JS.Agent.IHS 20150515
McAfee-GW-Edition BehavesLike.HTML.ExploitBlacole.cx 20150514
MicroWorld-eScan Trojan.JS.Agent.IHS 20150515
Microsoft Exploit:Win32/CVE-2012-4792.D 20150515
NANO-Antivirus Trojan.Script.Agent.brblsr 20150515
Panda Exploit/CVE-2012-4792 20150514
Sophos Exp/20124792-B 20150515
Tencent Win32.Trojan.Exploit.ddyk 20150515
TrendMicro JS_EXPLOIT.SB 20150515
TrendMicro-HouseCall JS_EXPLOIT.SB 20150515
nProtect Script-JS/W32.Agent.ANB 20150515
AVG 20150515
AVware 20150515
AegisLab 20150515
Agnitum 20150514
Alibaba 20150515
Antiy-AVL 20150515
Baidu-International 20150514
Bkav 20150514
ByteHero 20150515
CAT-QuickHeal 20150514
CMC 20150513
ClamAV 20150515
Cyren 20150515
F-Prot 20150515
Fortinet 20150515
Ikarus 20150515
Jiangmin 20150513
K7AntiVirus 20150515
K7GW 20150515
Kaspersky 20150515
Kingsoft 20150515
Malwarebytes 20150515
McAfee 20150515
Norman 20150515
Qihoo-360 20150515
Rising 20150514
SUPERAntiSpyware 20150515
Symantec 20150515
TheHacker 20150514
TotalDefense 20150514
VBA32 20150514
VIPRE 20150515
ViRobot 20150515
Zillya 20150514
Zoner 20150513
File identification
MD5 d85e34827980b13c9244cbcab13b35ea
SHA1 468298c628fb971115f45056f74ff88e57bf1e61
SHA256 58588ce6d0a1e042450946b03fa4cd92ac1b4246cb6879a7f50a0aab2a84086a
ssdeep
1536:xbWlyRyAySywcqHv4dvE73Y899pU/zB+aQMUaRIR:3c6v47899pU/zBrQMUaRIR

File size 121.5 KB ( 124435 bytes )
File type HTML
Magic literal
HTML document text

TrID HyperText Markup Language (100.0%)
Tags
cve-2012-4792 exploit html

VirusTotal metadata
First submission 2013-01-15 11:02:06 UTC ( 2 years, 4 months ago )
Last submission 2013-02-25 15:16:58 UTC ( 2 years, 2 months ago )
File names vti-rescan
mt.html
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

ExifTool file metadata
MIMEType
text/html

FileType
HTML

FileTypeExtension
html

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!