× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 85df5796668c8a37ae35de18df343131eb985d73f4e61d60eebcad547f83ad16
File name: fil956907CDABF378C1AB7ABA64AD0FDF26
Detection ratio: 32 / 59
Analysis date: 2017-10-18 05:17:36 UTC ( 22 hours, 33 minutes ago )
Antivirus Result Update
Ad-Aware Exploit.Agent.EM 20171018
AegisLab Exploit.Java.CVE-2010-0094.bb!c 20171018
AhnLab-V3 JAVA/Cve-2010-0094 20171017
ALYac Exploit.Agent.EM 20171017
Arcabit Exploit.Agent.EM 20171017
Avast Java:Agent-HH [Expl] 20171018
AVG Java:Agent-HH [Expl] 20171018
Avira (no cloud) EXP/CVE-2010-0094.F.2 20171018
BitDefender Exploit.Agent.EM 20171018
CAT-QuickHeal Exp.JAVA.Agent.BGS 20171017
ClamAV Java.Exploit.102-1 20171017
Emsisoft Exploit.Agent.EM (B) 20171018
F-Secure Exploit.Agent.EM 20171018
Fortinet Java/CVE20100094.G!exploit 20171018
GData Exploit.Agent.EM 20171018
Ikarus Exploit.Java.CVE-2010-0094 20171017
Jiangmin Exploit.Java.va 20171018
Kaspersky Exploit.Java.CVE-2010-0094.bb 20171017
McAfee Exploit-CVE2010-0094 20171018
McAfee-GW-Edition Exploit-CVE2010-0094 20171018
Microsoft Exploit:Java/CVE-2010-0094 20171018
eScan Exploit.Agent.EM 20171018
NANO-Antivirus Trojan.Java.JavaKCF.balave 20171018
Qihoo-360 Win32/Trojan.Exploit.d06 20171018
Sophos AV Mal/JavaKC-F 20171018
Symantec Trojan.Gen.2 20171018
Tencent Java.Exploit.Cve-2010-0094.Wstt 20171018
TrendMicro JAVA_CVE20100094.A 20171018
TrendMicro-HouseCall JAVA_CVE20100094.A 20171018
VBA32 Exploit.Java.Agent.eo 20171017
Zillya Exploit.CVE.JS.1887 20171017
ZoneAlarm by Check Point Exploit.Java.CVE-2010-0094.bb 20171018
Alibaba 20170911
Antiy-AVL 20171018
Avast-Mobile 20171017
AVware 20171018
Baidu 20171017
Bkav 20171017
CMC 20171017
Comodo 20171017
CrowdStrike Falcon (ML) 20170804
Cylance 20171018
Cyren 20171018
eGambit 20171018
Endgame 20171016
ESET-NOD32 20171018
F-Prot 20171018
Sophos ML 20170914
K7AntiVirus 20171017
K7GW 20171016
Kingsoft 20171018
Malwarebytes 20171018
MAX 20171017
nProtect 20171018
Palo Alto Networks (Known Signatures) 20171018
Panda 20171017
Rising 20171018
SentinelOne (Static ML) 20171001
SUPERAntiSpyware 20171018
Symantec Mobile Insight 20171011
TheHacker 20171017
TotalDefense 20171017
Trustlook 20171018
VIPRE 20171018
ViRobot 20171018
Webroot 20171018
WhiteArmor 20171016
Yandex 20171017
Zoner 20171018
The file being studied is a Java class file! These are files containing a java bytecode which can be executed on the Java Virtual Machine (JVM).
File metadata
Class name Exploit$1
Target Java platform 1.6
Extends java.lang.Object
Implements javax.management.MBeanServer
Requires
Provides
Methods
Constants
Compressed bundles
File identification
MD5 dd49fadd9372cbdef709bb9f0b1105c7
SHA1 427d69c577dc18bf4eb760dac1ca0a0e45e6a5b3
SHA256 85df5796668c8a37ae35de18df343131eb985d73f4e61d60eebcad547f83ad16
ssdeep
192:Vl+NbwKGXHCOVB7/mDnrFN9ZjXTDMo02RE2RQ:VuuCM7eDnrFZTDMo02RE2RQ

File size 7.6 KB ( 7787 bytes )
File type Java Bytecode
Magic literal
compiled Java class data, version 50.0 (Java 1.6)

TrID Java bytecode (60.0%)
Mac OS X Universal Binary executable (40.0%)
Tags
java-bytecode exploit cve-2010-0094

VirusTotal metadata
First submission 2010-11-12 11:52:46 UTC ( 6 years, 11 months ago )
Last submission 2016-06-26 17:42:59 UTC ( 1 year, 3 months ago )
File names Exploit$1.class
aa
dd49fadd9372cbdef709bb9f0b1105c7
output.10372411.txt
3BaX.tif
fil956907CDABF378C1AB7ABA64AD0FDF26
10372411
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!