× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 77c4d35e7a930d7bdd0d9906f65ce81fee8f721c1ab9cff6d348d225494b1cd7
File name: 2015-05-04-Fiesta-EK-flash-exploit.swf
Detection ratio: 8 / 57
Analysis date: 2015-05-06 12:49:04 UTC ( 4 years ago ) View latest
Antivirus Result Update
Avast SWF:Agent-DZ [Expl] 20150506
CAT-QuickHeal SWF.Heur.Gen 20150506
ESET-NOD32 SWF/Exploit.CVE-2014-0569.A 20150506
McAfee-GW-Edition BehavesLike.Flash.Exploit.lg 20150506
Sophos AV Troj/ExpFl-G 20150506
Symantec Trojan.Swifi 20150506
TrendMicro SWF_EXPLOYT.CX 20150506
TrendMicro-HouseCall Suspicious_GEN.F47V0504 20150506
Ad-Aware 20150506
AegisLab 20150506
Yandex 20150505
AhnLab-V3 20150506
Alibaba 20150506
ALYac 20150506
Antiy-AVL 20150506
AVG 20150506
Avira (no cloud) 20150506
AVware 20150506
Baidu-International 20150506
BitDefender 20150506
Bkav 20150506
ByteHero 20150506
ClamAV 20150506
CMC 20150506
Comodo 20150506
Cyren 20150506
DrWeb 20150506
Emsisoft 20150506
F-Prot 20150505
F-Secure 20150506
Fortinet 20150506
GData 20150506
Ikarus 20150506
Jiangmin 20150505
K7AntiVirus 20150506
K7GW 20150506
Kaspersky 20150506
Kingsoft 20150510
Malwarebytes 20150510
McAfee 20150506
Microsoft 20150506
eScan 20150506
NANO-Antivirus 20150506
Norman 20150506
nProtect 20150506
Panda 20150505
Qihoo-360 20150506
Rising 20150505
SUPERAntiSpyware 20150506
Tencent 20150506
TheHacker 20150505
TotalDefense 20150430
VBA32 20150506
VIPRE 20150506
ViRobot 20150506
Zillya 20150505
Zoner 20150506
The file being studied is a SWF file! SWF files deliver vector graphics, text, video, and sound over the Internet.
Commonly abused SWF properties
The studied SWF file makes use of ActionScript3, some exploits have been found in the past targeting the ActionScript Virtual Machine. ActionScript has also been used to force unwanted redirections and other badness. Note that many legitimate flash files may also use it to implement rich content and animations.
SWF Properties
SWF version
19
Compression
zlib
Frame size
800.0x600.0 px
Frame count
1
Duration
0.033 seconds
File attributes
HasMetadata, ActionScript3, UseNetwork
Unrecognized SWF tags
1
Total SWF tags
10
ActionScript 3 Packages
flash.display
flash.events
flash.external
flash.system
flash.utils
SWF metadata
ExifTool file metadata
MIMEType
application/x-shockwave-flash

Publisher
unknown

Megapixels
0.48

Description
http://www.adobe.com/products/flex

Language
EN

Format
application/x-shockwave-flash

FlashAttributes
UseNetwork, ActionScript3, HasMetadata

Title
Adobe Flex 4 Application

FrameRate
30

FlashVersion
19

Duration
0.03 s

Creator
unknown

FileTypeExtension
swf

Compressed
True

ImageWidth
800

Date
May 3, 2015

ImageHeight
600

Warning
[minor] Fixed incorrect URI for xmlns:dc

FileType
SWF

FrameCount
1

ImageSize
800x600

PCAP parents
File identification
MD5 9ce5e9b78670ef596be438fcb6a99537
SHA1 5e3bd80d8e9ca97bd4979fb383ac62d6f7cb12ef
SHA256 77c4d35e7a930d7bdd0d9906f65ce81fee8f721c1ab9cff6d348d225494b1cd7
ssdeep
192:+jttWP4mPsVFSA5gDkVbua/pl66BfiORp3L5pnKc2+LjY0n6PKSkmD:+1YCvCkVbua/b665iGPDw0JSD

File size 10.0 KB ( 10202 bytes )
File type Flash
Magic literal
Macromedia Flash data (compressed), version 19

TrID Macromedia Flash Player Compressed Movie (100.0%)
Tags
flash exploit zlib cve-2014-0569 via-tor

VirusTotal metadata
First submission 2015-05-04 02:35:08 UTC ( 4 years ago )
Last submission 2015-10-02 19:04:38 UTC ( 3 years, 7 months ago )
File names 2015-05-04-Fiesta-EK-flash-exploit.swf
lsxri235.swf.x-shockwave-flash
77c4d35e7a930d7bdd0d9906f65ce81fee8f721c1ab9cff6d348d225494b1cd7.swf
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!