× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5d57d66f70e35c8f038d68472eef756483b95329335f20da0a518e51e08f5eb6
File name: 2014-06-24-Magnitude-EK-java-exploit.jar
Detection ratio: 33 / 59
Analysis date: 2017-06-30 00:43:57 UTC ( 1 year, 10 months ago )
Antivirus Result Update
Ad-Aware Java.Exploit.CVE-2012-0507.Gen.G 20170630
AegisLab Exploit.Java.Generic!c 20170630
ALYac Java.Exploit.CVE-2012-0507.AP 20170630
Arcabit Java.Exploit.CVE-2012-0507.Gen.G 20170630
Avast Java:Malware-gen [Trj] 20170630
AVG Java:Malware-gen [Trj] 20170630
AVware Trojan.Java.Generic.a (v) 20170630
BitDefender Java.Exploit.CVE-2012-0507.Gen.G 20170630
CAT-QuickHeal Exp.JAVA.Agent.CBW 20170630
ClamAV Java.Exploit.Magnitude-10 20170630
Comodo UnclassifiedMalware 20170630
Cyren Java/Agent.JC 20170630
Emsisoft Java.Exploit.CVE-2012-0507.Gen.G (B) 20170630
ESET-NOD32 a variant of Java/Exploit.Agent.RLC 20170630
F-Prot Java/Agent.JC 20170630
F-Secure Java.Exploit.CVE-2012-0507.AP 20170630
GData Java.Trojan.Agent.SK5A6A 20170630
Ikarus Exploit.Java.Agent 20170630
Kaspersky HEUR:Exploit.Java.Generic 20170630
McAfee Generic.dx!3BDC756CBFCC 20170630
McAfee-GW-Edition Exploit-FVR!CVE2012-0507 20170630
Microsoft Exploit:Java/CVE-2012-0507 20170630
eScan Java.Exploit.CVE-2012-0507.Gen.G 20170630
NANO-Antivirus Trojan.Java.Agent.ellyrg 20170630
Sophos AV Mal/ExpJava-C 20170630
Symantec Trojan.Maljava 20170630
TotalDefense Java/Tnega.XAZL!suspicious 20170630
TrendMicro HEUR_JAVA.HDFN 20170630
TrendMicro-HouseCall Suspicious_GEN.F47V0315 20170630
VIPRE Trojan.Java.Generic.a (v) 20170630
ViRobot JAVA.S.Agent.13820 20170630
Zillya Exploit.Agent.JS.2008 20170630
ZoneAlarm by Check Point HEUR:Exploit.Java.Generic 20170630
AhnLab-V3 20170630
Alibaba 20170630
Antiy-AVL 20170630
Avira (no cloud) 20170630
Baidu 20170630
Bkav 20170630
CMC 20170630
CrowdStrike Falcon (ML) 20170420
DrWeb 20170630
Endgame 20170629
Fortinet 20170629
Sophos ML 20170607
Jiangmin 20170628
K7AntiVirus 20170630
K7GW 20170630
Kingsoft 20170630
Malwarebytes 20170630
nProtect 20170630
Palo Alto Networks (Known Signatures) 20170630
Panda 20170629
Qihoo-360 20170630
Rising 20170630
SentinelOne (Static ML) 20170516
SUPERAntiSpyware 20170630
Symantec Mobile Insight 20170630
Tencent 20170630
TheHacker 20170628
Trustlook 20170630
VBA32 20170629
Webroot 20170630
WhiteArmor 20170627
Yandex 20170630
Zoner 20170630
The file being studied is a compressed stream! More specifically, it is a ZIP file.
Contained files
Compression metadata
Contained files
14
Uncompressed size
22469
Highest datetime
2014-06-24 20:04:02
Lowest datetime
2014-06-24 20:04:00
Contained files by type
Java Bytecode
14
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0x8fcb554f

FileType
ZIP

ZipCompression
Deflated

ZipUncompressedSize
1829

ZipCompressedSize
985

FileTypeExtension
zip

ZipFileName
amsyxwfl.class

ZipBitFlag
0x0008

ZipModifyDate
2014:06:24 20:04:00

Compressed bundles
PCAP parents
File identification
MD5 c2fef7dc598471f562f0c3ebf8409fd2
SHA1 0d1898029d3553c293f754297eb8701e102a30d8
SHA256 5d57d66f70e35c8f038d68472eef756483b95329335f20da0a518e51e08f5eb6
ssdeep
192:mzpCBD6s+n0krCpJK3WdMnHWZzs16FkuAiyVPNso7emhsmekn1yuESBiHRib+4ac:BD6b0AMMHWK0SuCXzanG1CUyivaNozzb

File size 13.5 KB ( 13820 bytes )
File type ZIP
Magic literal
Zip archive data, at least v2.0 to extract

TrID ZIP compressed archive (100.0%)
Tags
cve-2012-0507 exploit zip

VirusTotal metadata
First submission 2014-06-24 19:13:16 UTC ( 4 years, 10 months ago )
Last submission 2015-12-16 18:00:44 UTC ( 3 years, 5 months ago )
File names vti-rescan
5c8992de38e85a6fef18fd1f97a40fde.x-java-archive
2014-06-24-Magnitude-EK-java-exploit
2014-06-24-Magnitude-EK-java-exploit.jar
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!