× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8b1786d4e3c237d0897aec1c0059022ba2f76533264340eab282544b05cab57c
File name: 2015-09-03-Nuclear-EK-Flash-Exploit.swf
Detection ratio: 0 / 56
Analysis date: 2015-09-06 19:00:47 UTC ( 1 year, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20150906
AegisLab 20150906
Yandex 20150906
AhnLab-V3 20150906
Alibaba 20150902
ALYac 20150906
Antiy-AVL 20150906
Arcabit 20150905
Avast 20150906
AVG 20150906
Avira (no cloud) 20150906
AVware 20150901
Baidu-International 20150906
BitDefender 20150906
Bkav 20150905
ByteHero 20150906
CAT-QuickHeal 20150905
ClamAV 20150906
CMC 20150902
Comodo 20150906
Cyren 20150906
DrWeb 20150906
Emsisoft 20150906
ESET-NOD32 20150906
F-Prot 20150906
F-Secure 20150905
Fortinet 20150906
GData 20150906
Ikarus 20150906
Jiangmin 20150905
K7AntiVirus 20150906
K7GW 20150906
Kaspersky 20150906
Kingsoft 20150906
Malwarebytes 20150906
McAfee 20150906
McAfee-GW-Edition 20150906
Microsoft 20150906
eScan 20150906
NANO-Antivirus 20150906
nProtect 20150904
Panda 20150906
Qihoo-360 20150906
Rising 20150906
Sophos 20150906
SUPERAntiSpyware 20150905
Symantec 20150906
Tencent 20150906
TheHacker 20150904
TrendMicro 20150906
TrendMicro-HouseCall 20150906
VBA32 20150905
VIPRE 20150906
ViRobot 20150906
Zillya 20150905
Zoner 20150906
The file being studied is a SWF file! SWF files deliver vector graphics, text, video, and sound over the Internet.
Commonly abused SWF properties
The studied SWF file makes use of ActionScript3, some exploits have been found in the past targeting the ActionScript Virtual Machine. ActionScript has also been used to force unwanted redirections and other badness. Note that many legitimate flash files may also use it to implement rich content and animations.
SWF Properties
SWF version
14
Compression
zlib
Frame size
500.0x375.0 px
Frame count
1
Duration
0.042 seconds
File attributes
HasMetadata, ActionScript3, UseNetwork
Unrecognized SWF tags
1
Total SWF tags
11
ActionScript 3 Packages
flash.display
flash.events
flash.external
flash.system
flash.utils
mx.core
SWF metadata
ExifTool file metadata
MIMEType
application/x-shockwave-flash

Publisher
unknown

Megapixels
0.188

Description
http://www.adobe.com/products/flex

Language
EN

Format
application/x-shockwave-flash

FlashAttributes
UseNetwork, ActionScript3, HasMetadata

Title
Adobe Flex 4 Application

FrameRate
24

FlashVersion
14

Duration
0.04 s

Creator
unknown

FileTypeExtension
swf

Compressed
True

ImageWidth
500

Date
Sep 3, 2015

ImageHeight
375

Warning
[minor] Fixed incorrect URI for xmlns:dc

FileType
SWF

FrameCount
1

ImageSize
500x375

File identification
MD5 787dd6fc5fae6038b10ab8c23039cf57
SHA1 29a552aed25e6feb988fc7796ff84c97a26f5c6a
SHA256 8b1786d4e3c237d0897aec1c0059022ba2f76533264340eab282544b05cab57c
ssdeep
384:owZUgeMENeViI5Dku+k5TwIzgWSgXpMROaE6om0HlJHOgqLBPnq5b0TBWyG25waO:owZURMkedF2IUWSga8yz0HlJAB/q5gTe

File size 23.2 KB ( 23709 bytes )
File type Flash
Magic literal
Macromedia Flash data (compressed), version 14

TrID Macromedia Flash Player Compressed Movie (100.0%)
Tags
flash exploit zlib cve-2015-5119 cve-2015-5122

VirusTotal metadata
First submission 2015-09-06 18:55:22 UTC ( 1 year, 8 months ago )
Last submission 2015-12-17 13:27:13 UTC ( 1 year, 5 months ago )
File names 2015-09-03-Nuclear-EK-Flash-Exploit.swf
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!