× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b0cf580821fb2fb2a7f6da64835e8542687e3fd8d069dcfbd2bfaa726d7f9b62
File name: WsLzLo.jar
Detection ratio: 22 / 56
Analysis date: 2016-11-24 11:33:48 UTC ( 2 years, 6 months ago )
Antivirus Result Update
Ad-Aware Java.Exploit.CVE-2011-3544.W 20161124
AegisLab Exploit.Java.Generic!c 20161124
AhnLab-V3 Java/Exploit 20161124
ALYac Java.Exploit.CVE-2011-3544.W 20161124
Arcabit Java.Exploit.CVE-2011-3544.W 20161124
Avast Java:Malware-gen [Trj] 20161124
AVG Java/CVE-2011-3544 20161124
BitDefender Java.Exploit.CVE-2011-3544.W 20161124
Comodo UnclassifiedMalware 20161124
Emsisoft Java.Exploit.CVE-2011-3544.W (B) 20161124
ESET-NOD32 a variant of Java/Exploit.CVE-2011-3544.DN 20161124
F-Secure Java.Exploit.CVE-2011-3544.W 20161124
GData Java.Exploit.CVE-2011-3544.W 20161124
Ikarus Trojan.Java.Exploit 20161124
Jiangmin Exploit.Java.ab 20161124
Kaspersky HEUR:Exploit.Java.Generic 20161124
McAfee RDN/Generic Exploit!1m3 20161124
McAfee-GW-Edition RDN/Generic Exploit!1m3 20161124
Microsoft Exploit:Java/CVE-2011-3544.NP 20161124
eScan Java.Exploit.CVE-2011-3544.W 20161124
Sophos AV Mal/Generic-S 20161124
Zillya Exploit.CVE.JS.2361 20161123
Alibaba 20161124
Antiy-AVL 20161124
Avira (no cloud) 20161124
AVware 20161124
Baidu 20161124
Bkav 20161124
CAT-QuickHeal 20161124
ClamAV 20161124
CMC 20161124
CrowdStrike Falcon (ML) 20161024
Cyren 20161124
DrWeb 20161124
F-Prot 20161124
Fortinet 20161124
Sophos ML 20161018
K7AntiVirus 20161124
K7GW 20161124
Kingsoft 20161124
Malwarebytes 20161124
NANO-Antivirus 20161124
nProtect 20161124
Panda 20161123
Qihoo-360 20161124
Rising 20161124
SUPERAntiSpyware 20161124
Symantec 20161124
Tencent 20161124
TheHacker 20161124
TotalDefense 20161124
TrendMicro 20161124
TrendMicro-HouseCall 20161124
Trustlook 20161124
VBA32 20161123
VIPRE 20161124
ViRobot 20161124
WhiteArmor 20161018
Yandex 20161123
Zoner 20161124
The file being studied is a Java Archive! Typically a JAR file contains the class files and auxiliary resources associated with applets and applications.
Archive metadata
Total directories 1
Maximum directory depth 1
Total files 5
Maximum member date 2015-01-30 20:32:52
Minimum member date 2011-12-01 15:31:34
Manifest
Java packages
Interesting strings
Embedded files by type
xml 2
ascii 1
class 2
Embedded files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
6
Uncompressed size
11209
Highest datetime
2015-01-30 20:32:52
Lowest datetime
2011-12-01 15:31:34
Contained files by extension
MF
1
Contained files by type
Java Bytecode
2
XML
2
directory
1
unknown
1
File identification
MD5 bf4705cedd537bfb2a81eb397df3dbe4
SHA1 63074a74b8b31d48face0e75630400c998e0d78f
SHA256 b0cf580821fb2fb2a7f6da64835e8542687e3fd8d069dcfbd2bfaa726d7f9b62
ssdeep
192:1lHTq2jpbEPNekT6hXMW9/Qmn413NYQ+5g:11JeN1QMW9Ymn+3Nsg

File size 6.7 KB ( 6910 bytes )
File type JAR
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
exploit jar cve-2011-3544

VirusTotal metadata
First submission 2015-02-01 03:19:06 UTC ( 4 years, 3 months ago )
Last submission 2015-02-01 03:19:06 UTC ( 4 years, 3 months ago )
File names WsLzLo.jar
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!