× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a673b5f47148f8c2ca6d8a707db021777f2ff65bced3496a6eee3c734e413cce
File name: .BC.T_5uZpCV
Detection ratio: 31 / 59
Analysis date: 2018-06-07 23:57:25 UTC ( 6 months, 1 week ago )
Antivirus Result Update
AegisLab Exploit.Java.CVE-2010-0094.e!c 20180607
AhnLab-V3 JAVA/Cve-2010-0094 20180607
ALYac Exploit.Agent.EN 20180607
Avast Java:CVE-2010-0094-R [Expl] 20180607
AVG Java:CVE-2010-0094-R [Expl] 20180607
Avira (no cloud) EXP/JAVA.Carbul.Gen 20180607
BitDefender Exploit.Agent.EN 20180607
CAT-QuickHeal Exp.JAVA.Agent.RQ 20180607
ClamAV Java.Exploit.97-1 20180607
Comodo UnclassifiedMalware 20180607
Emsisoft Exploit.Agent.EN (B) 20180607
ESET-NOD32 a variant of Java/Exploit.CVE-2010-0094.B 20180607
F-Secure Exploit.Agent.EN 20180607
GData Exploit.Agent.EN 20180607
Ikarus Exploit.Java.CVE-2010 20180607
Jiangmin Exploit.Java.vb 20180607
Kaspersky Exploit.Java.CVE-2010-0094.e 20180607
McAfee Exploit-CVE2010-0094 20180607
McAfee-GW-Edition BehavesLike.Java.Downloader.xm 20180607
Microsoft Exploit:Java/CVE-2010-0094 20180607
eScan Exploit.Agent.EN 20180607
NANO-Antivirus Trojan.Java.JavaKCP.dugjo 20180607
Qihoo-360 virus.java.cve-2010-3563.a 20180608
Sophos AV Mal/JavaKC-P 20180607
Symantec Trojan.Gen.2 20180607
Tencent Java.Exploit.Cve-2010-0094.Lhni 20180608
TrendMicro JAVA_EXPL.SM2 20180607
TrendMicro-HouseCall JAVA_EXPL.SM2 20180607
VBA32 Exploit.Java.CVE-2010-0094.e 20180607
Zillya Exploit.CVE.JS.1886 20180607
ZoneAlarm by Check Point Exploit.Java.CVE-2010-0094.e 20180607
Ad-Aware 20180607
Alibaba 20180607
Antiy-AVL 20180608
Arcabit 20180607
Avast-Mobile 20180607
AVware 20180607
Babable 20180406
Baidu 20180607
Bkav 20180607
CMC 20180607
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180608
Cyren 20180607
DrWeb 20180607
eGambit 20180608
Endgame 20180507
F-Prot 20180607
Fortinet 20180607
Sophos ML 20180601
K7AntiVirus 20180607
K7GW 20180608
Malwarebytes 20180608
MAX 20180608
Palo Alto Networks (Known Signatures) 20180608
Panda 20180607
Rising 20180607
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180607
Symantec Mobile Insight 20180605
TACHYON 20180608
TheHacker 20180606
TotalDefense 20180607
Trustlook 20180608
VIPRE 20180607
ViRobot 20180607
Webroot 20180608
Yandex 20180529
Zoner 20180607
The file being studied is a Java class file! These are files containing a java bytecode which can be executed on the Java Virtual Machine (JVM).
File metadata
Class name Exploit
Target Java platform 1.6
Extends java.applet.Applet
Requires
Provides
Methods
Constants
Execution parents
Compressed bundles
File identification
MD5 334ec1071b85d52a3da4223ed7dc6d74
SHA1 160eeb9b0c347f245080eaaf9680b34b0858baec
SHA256 a673b5f47148f8c2ca6d8a707db021777f2ff65bced3496a6eee3c734e413cce
ssdeep

File size 2.5 KB ( 2595 bytes )
File type Java Bytecode
Magic literal
compiled Java class data, version 50.0 (Java 1.6)

TrID Java bytecode (60.0%)
Mac OS X Universal Binary executable (40.0%)
Tags
java-bytecode exploit cve-2010-3563 cve-2010-0094

VirusTotal metadata
First submission 2010-11-09 08:32:41 UTC ( 8 years, 1 month ago )
Last submission 2016-06-26 17:42:59 UTC ( 2 years, 5 months ago )
File names wODdG6oq.mht
foo.bar
aa
fil360284AAFD4803C93C5CC3621C0EFF36
.BC.T_5uZpCV
Exploit.class
334ec1071b85d52a3da4223ed7dc6d74
Exploit.class
IWJ2.jpeg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!