× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7afe21416cbe9ebffc0ee4a8ce85ee24dc5386407b1bef110fd3c6570b04d265
File name: 967-RPmfYY
Detection ratio: 21 / 58
Analysis date: 2017-10-04 18:10:27 UTC ( 1 year, 4 months ago )
Antivirus Result Update
AegisLab Java.Exployt.Gen!c 20171004
Antiy-AVL Trojan[Exploit]/JAVA.CVE-2012-1723 20171004
Avast Java:Agent-FZB [Expl] 20171004
Avira (no cloud) JAVA/Lamar.sjd.25 20171004
CAT-QuickHeal Exp.JAVA.Agent.ABP 20171004
Comodo UnclassifiedMalware 20171004
DrWeb Java.Downloader.926 20171004
GData Java.Trojan.Agent.GSRZMH 20171004
Ikarus Exploit.Java.CVE-2013 20171004
Jiangmin Exploit.Java.bkd 20171004
Kaspersky Exploit.Java.Agent.nh 20171004
McAfee RDN/Generic.dx!ox 20171004
McAfee-GW-Edition RDN/Generic Exploit 20171004
Microsoft Exploit:Java/CVE-2013-0422 20171004
NANO-Antivirus Trojan.Java.Lamar.eoghem 20171004
Sophos AV Troj/EncProc-V 20171004
Symantec Trojan.Maljava!gen35 20171004
TotalDefense Java/Tnega.IbPOMeB 20171004
TrendMicro JAVA_EXPLOYT.GX 20171004
TrendMicro-HouseCall JAVA_EXPLOYT.GX 20171004
ZoneAlarm by Check Point Exploit.Java.Agent.nh 20171004
Ad-Aware 20171004
AhnLab-V3 20171004
Alibaba 20170911
ALYac 20171004
Arcabit 20171004
Avast-Mobile 20171004
AVware 20171004
Baidu 20170930
BitDefender 20171004
Bkav 20171004
ClamAV 20171004
CMC 20171004
CrowdStrike Falcon (ML) 20170804
Cylance 20171004
Cyren 20171004
Emsisoft 20171004
F-Prot 20171004
F-Secure 20171004
Fortinet 20171004
Sophos ML 20170914
K7AntiVirus 20171004
K7GW 20171004
Kingsoft 20171004
Malwarebytes 20171004
MAX 20171004
eScan 20171004
nProtect 20171004
Palo Alto Networks (Known Signatures) 20171004
Panda 20171004
Qihoo-360 20171004
SentinelOne (Static ML) 20171001
SUPERAntiSpyware 20171004
Tencent 20171004
TheHacker 20171002
Trustlook 20171004
VBA32 20171004
VIPRE 20171004
ViRobot 20171004
Webroot 20171004
WhiteArmor 20170927
Yandex 20171004
Zillya 20171004
Zoner 20171004
The file being studied is a compressed stream! More specifically, it is a ZIP file.
Contained files
Compression metadata
Contained files
10
Uncompressed size
37034
Highest datetime
2013-08-03 13:59:26
Lowest datetime
2013-07-31 13:41:00
Contained files by type
Java Bytecode
8
directory
1
unknown
1
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0x00000000

FileType
ZIP

ZipCompression
None

ZipUncompressedSize
0

ZipCompressedSize
0

FileTypeExtension
zip

ZipFileName
WqJmjZxw/

ZipBitFlag
0x0002

ZipModifyDate
2013:08:03 13:59:13

File identification
MD5 5287ac993778b87a9af994556298c2de
SHA1 e1b7d2d1695162d7858d6de751a25dcb9279a8a8
SHA256 7afe21416cbe9ebffc0ee4a8ce85ee24dc5386407b1bef110fd3c6570b04d265
ssdeep
384:TmVGHbxctoKzyRnwcAnZ3QQD16Xd0iSyAD2oac4tldQuVLD:buoxan1L1AbSyAD2vceQupD

File size 18.8 KB ( 19207 bytes )
File type ZIP
Magic literal
Zip archive data, at least v2.0 to extract

TrID ZIP compressed archive (100.0%)
Tags
exploit cve-2013-0422 zip cve-2012-1723

VirusTotal metadata
First submission 2013-08-03 12:30:35 UTC ( 5 years, 6 months ago )
Last submission 2017-10-04 18:10:27 UTC ( 1 year, 4 months ago )
File names 5287ac993778b87a9af994556298c2de
stops-followed-forces.php.2.jar
967-RPmfYY
stops-followed-forces.php.txt
coupon_voucher.php
stops-followed-forces.php.jar
5287ac993778b87a9af994556298c2de.txt
java-20130805-09h41__AFD90B0B.jar
7afe21416cbe9ebffc0ee4a8ce85ee24dc5386407b1bef110fd3c6570b04d265.jar
jar_cache3537771383509525599.tmp_cddc.qr
stops-followed-forces.php.zip
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!