× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
File name: regard_alternate_sheet.php?sCgjKzq=XxMXwha
Detection ratio: 29 / 57
Analysis date: 2015-05-21 09:59:03 UTC ( 4 days, 19 hours ago )
Antivirus Result Update
ALYac Java.Exploit.CVE-2013-0422.Y 20150521
AVG Exploit.Java_c.ONW 20150521
Ad-Aware Java.Exploit.CVE-2013-0422.Y 20150521
Antiy-AVL Trojan[Exploit]/Java.CVE-2012-1723.nt 20150521
Avast Java:Agent-FZB [Expl] 20150521
Avira JAVA/Jogek.ctw.7 20150521
BitDefender Java.Exploit.CVE-2013-0422.Y 20150521
CAT-QuickHeal Exp.JAVA.Agent.ABP 20150520
ClamAV JAVA.Exploit.Exploit.Kit-24 20150521
Comodo UnclassifiedMalware 20150521
DrWeb Exploit.Java.586 20150521
ESET-NOD32 a variant of Java/Exploit.Agent.PPI 20150521
Emsisoft Java.Exploit.CVE-2013-0422.Y (B) 20150521
F-Secure Java.Exploit.CVE-2013-0422.Y 20150521
GData Java.Exploit.CVE-2013-0422.Y 20150521
Ikarus Java.Jogek 20150521
Kaspersky Exploit.Java.CVE-2012-1723.nt 20150521
McAfee Generic.dx!B03B341F834C 20150521
McAfee-GW-Edition Generic.dx!3988E77C72A5 20150521
MicroWorld-eScan Java.Exploit.CVE-2013-0422.Y 20150521
Microsoft Exploit:Java/CVE-2013-0422 20150521
NANO-Antivirus Exploit.Java.Jogek.cjeies 20150521
Qihoo-360 Trojan.Generic 20150521
Sophos Troj/EncProc-V 20150521
Symantec Trojan.Maljava 20150521
Tencent Java.Exploit.Cve-2012-1723.Htlz 20150521
TotalDefense Java/Tnega.RUDfJSB 20150521
TrendMicro-HouseCall Suspicious_GEN.F47V0212 20150521
nProtect Java.Exploit.CVE-2013-0422.Y 20150521
AVware 20150521
AegisLab 20150521
Agnitum 20150520
AhnLab-V3 20150520
Alibaba 20150521
Baidu-International 20150521
Bkav 20150520
ByteHero 20150521
CMC 20150520
Cyren 20150521
F-Prot 20150521
Fortinet 20150521
Jiangmin 20150519
K7AntiVirus 20150521
K7GW 20150521
Kingsoft 20150521
Malwarebytes 20150521
Norman 20150521
Panda 20150521
Rising 20150520
SUPERAntiSpyware 20150521
TheHacker 20150520
TrendMicro 20150521
VBA32 20150520
VIPRE 20150521
ViRobot 20150521
Zillya 20150521
Zoner 20150520
Compressed bundles
PCAP parents
File identification
MD5 91cb051d427bd7b679e1abc99983338e
SHA1 c935c853b6d8c3414eef215bb343944e95324363
SHA256 d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
ssdeep
384:994uZkxLYDPTW4V9ndbzFVx3hqV+BCcA8in2sZ47J06zu22YCorvZs/RaCRIWuZp:b4uZkxAP1xRstT20cJ0zpwF5CNs

File size 19.3 KB ( 19792 bytes )
File type ZIP
Magic literal
Zip archive data, at least v2.0 to extract

TrID ZIP compressed archive (99.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
Tags
exploit cve-2013-0422 zip cve-2012-1723

VirusTotal metadata
First submission 2013-08-08 06:02:35 UTC ( 1 year, 9 months ago )
Last submission 2015-04-30 01:10:07 UTC ( 3 weeks, 5 days ago )
File names index.php
javacrap
41db9b3f-7ed980b6
java-exploit-from-173.246.105.15.jar
i9jfuhioejskveohnuojfir.php
equivalent-devote-ways_being.php?QsynEJJ=BaruMb
91cb051d427bd7b679e1abc99983338e
jar_cache6954485588439484418.tmp
regard_alternate_sheet.php?sCgjKzq=XxMXwha
41db9b3f-7ed980b6
javastuff
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0x00000000

FileType
ZIP

ZipCompression
None

ZipUncompressedSize
0

ZipCompressedSize
0

FileTypeExtension
zip

ZipFileName
WqJmjZxw/

ZipBitFlag
0x0002

ZipModifyDate
2013:08:08 09:08:12

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!