× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 85df5796668c8a37ae35de18df343131eb985d73f4e61d60eebcad547f83ad16
File name: .BC.T_w5ZrY9
Detection ratio: 32 / 59
Analysis date: 2018-06-12 00:18:56 UTC ( 6 months ago )
Antivirus Result Update
Ad-Aware Exploit.Agent.EM 20180611
AegisLab Exploit.Java.CVE-2010-0094.bb!c 20180611
AhnLab-V3 JAVA/Cve-2010-0094 20180611
ALYac Exploit.Agent.EM 20180612
Arcabit Exploit.Agent.EM 20180611
Avast Java:Agent-HH [Expl] 20180611
AVG Java:Agent-HH [Expl] 20180611
Avira (no cloud) EXP/CVE-2010-0094.F.2 20180612
BitDefender Exploit.Agent.EM 20180611
CAT-QuickHeal Exp.JAVA.Agent.BGS 20180611
ClamAV Java.Exploit.102-1 20180611
DrWeb Exploit.CVE2010-0094.3 20180611
Emsisoft Exploit.Agent.EM (B) 20180611
F-Secure Exploit.Agent.EM 20180611
Fortinet Java/CVE20100094.G!exploit 20180611
GData Exploit.Agent.EM 20180611
Jiangmin Exploit.Java.va 20180611
Kaspersky Exploit.Java.CVE-2010-0094.bb 20180611
McAfee Exploit-CVE2010-0094 20180611
McAfee-GW-Edition Exploit-CVE2010-0094 20180611
Microsoft Exploit:Java/CVE-2010-0094 20180611
eScan Exploit.Agent.EM 20180611
NANO-Antivirus Trojan.Java.JavaKCF.balave 20180612
Qihoo-360 Win32/Trojan.Exploit.d06 20180612
Sophos AV Mal/JavaKC-F 20180611
Symantec Trojan.Gen.2 20180611
Tencent Java.Exploit.Cve-2010-0094.Wstt 20180612
TrendMicro JAVA_CVE20100094.A 20180611
TrendMicro-HouseCall JAVA_CVE20100094.A 20180611
VBA32 Exploit.Java.Agent.eo 20180611
Zillya Exploit.CVE.JS.1887 20180611
ZoneAlarm by Check Point Exploit.Java.CVE-2010-0094.bb 20180611
Alibaba 20180611
Antiy-AVL 20180612
Avast-Mobile 20180611
AVware 20180612
Babable 20180406
Baidu 20180611
Bkav 20180611
CMC 20180611
Comodo 20180611
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180612
Cyren 20180611
eGambit 20180612
Endgame 20180507
ESET-NOD32 20180612
F-Prot 20180611
Sophos ML 20180601
K7AntiVirus 20180611
K7GW 20180612
Kingsoft 20180612
Malwarebytes 20180612
MAX 20180612
Palo Alto Networks (Known Signatures) 20180612
Panda 20180611
Rising 20180611
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180612
Symantec Mobile Insight 20180605
TACHYON 20180612
TheHacker 20180608
TotalDefense 20180611
Trustlook 20180612
VIPRE 20180612
ViRobot 20180611
Webroot 20180612
Yandex 20180609
Zoner 20180612
The file being studied is a Java class file! These are files containing a java bytecode which can be executed on the Java Virtual Machine (JVM).
File metadata
Class name Exploit$1
Target Java platform 1.6
Extends java.lang.Object
Implements javax.management.MBeanServer
Requires
Provides
Methods
Constants
Execution parents
Compressed bundles
File identification
MD5 dd49fadd9372cbdef709bb9f0b1105c7
SHA1 427d69c577dc18bf4eb760dac1ca0a0e45e6a5b3
SHA256 85df5796668c8a37ae35de18df343131eb985d73f4e61d60eebcad547f83ad16
ssdeep
192:Vl+NbwKGXHCOVB7/mDnrFN9ZjXTDMo02RE2RQ:VuuCM7eDnrFZTDMo02RE2RQ

File size 7.6 KB ( 7787 bytes )
File type Java Bytecode
Magic literal
compiled Java class data, version 50.0 (Java 1.6)

TrID Java bytecode (60.0%)
Mac OS X Universal Binary executable (40.0%)
Tags
java-bytecode exploit cve-2010-0094

VirusTotal metadata
First submission 2010-11-12 11:52:46 UTC ( 8 years, 1 month ago )
Last submission 2016-06-26 17:42:59 UTC ( 2 years, 5 months ago )
File names Exploit$1.class
.BC.T_w5ZrY9
Exploit$1.class
foo.bar
aa
dd49fadd9372cbdef709bb9f0b1105c7
output.10372411.txt
3BaX.tif
fil956907CDABF378C1AB7ABA64AD0FDF26
10372411
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!