× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
File name: regard_alternate_sheet.php?sCgjKzq=XxMXwha
Detection ratio: 29 / 56
Analysis date: 2015-10-15 13:04:22 UTC ( 8 months, 2 weeks ago )
Antivirus Result Update
AVG Exploit.Java_c.ONW 20151015
Ad-Aware Java.Exploit.CVE-2013-0422.Y 20151015
Antiy-AVL Trojan[Exploit]/Java.CVE-2012-1723.nt 20151015
Arcabit Java.Exploit.CVE-2013-0422.Y 20151015
Avast Java:Agent-FZB [Expl] 20151014
Avira (no cloud) JAVA/Jogek.ctw.7 20151015
BitDefender Java.Exploit.CVE-2013-0422.Y 20151015
CAT-QuickHeal Exp.JAVA.Agent.ABP 20151015
ClamAV JAVA.Exploit.Exploit.Kit-24 20151015
Comodo UnclassifiedMalware 20151015
DrWeb Exploit.Java.586 20151015
ESET-NOD32 a variant of Java/Exploit.Agent.PPI 20151015
Emsisoft Java.Exploit.CVE-2013-0422.Y (B) 20151015
F-Secure Java.Exploit.CVE-2013-0422.Y 20151015
GData Java.Exploit.CVE-2013-0422.Y 20151015
Ikarus Java.Jogek 20151015
Kaspersky Exploit.Java.CVE-2012-1723.nt 20151015
McAfee Generic.dx!B03B341F834C 20151015
McAfee-GW-Edition Generic.dx!3988E77C72A5 20151015
eScan Java.Exploit.CVE-2013-0422.Y 20151015
Microsoft Exploit:Java/CVE-2013-0422 20151015
NANO-Antivirus Exploit.Java.Jogek.cjeies 20151015
Qihoo-360 Win32/Virus.027 20151015
Sophos Troj/EncProc-V 20151015
Symantec Trojan.Maljava!gen35 20151014
Tencent Java.Exploit.Cve-2012-1723.Htlz 20151015
TotalDefense Java/Tnega.RUDfJSB 20151014
ViRobot JAVA.S.Agent.19792[h] 20151015
nProtect Java.Exploit.CVE-2013-0422.Y 20151015
AVware 20151015
AegisLab 20151015
Yandex 20151014
AhnLab-V3 20151015
Alibaba 20151015
Baidu-International 20151015
Bkav 20151014
ByteHero 20151015
CMC 20151014
Cyren 20151015
F-Prot 20151015
Fortinet 20151015
Jiangmin 20151014
K7AntiVirus 20151015
K7GW 20151015
Kingsoft 20151015
Malwarebytes 20151015
Panda 20151015
Rising 20151014
SUPERAntiSpyware 20151015
TheHacker 20151012
TrendMicro 20151015
TrendMicro-HouseCall 20151015
VBA32 20151014
VIPRE 20151015
Zillya 20151014
Zoner 20151015
The file being studied is a compressed stream! More specifically, it is a ZIP file.
Contained files
Compression metadata
Contained files
11
Uncompressed size
37778
Highest datetime
2013-08-08 09:09:52
Lowest datetime
2013-08-05 22:14:44
Contained files by type
Java Bytecode
9
directory
1
unknown
1
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0x00000000

FileType
ZIP

ZipCompression
None

ZipUncompressedSize
0

ZipCompressedSize
0

FileTypeExtension
zip

ZipFileName
WqJmjZxw/

ZipBitFlag
0x0002

ZipModifyDate
2013:08:08 09:08:12

Compressed bundles
PCAP parents
File identification
MD5 91cb051d427bd7b679e1abc99983338e
SHA1 c935c853b6d8c3414eef215bb343944e95324363
SHA256 d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
ssdeep
384:994uZkxLYDPTW4V9ndbzFVx3hqV+BCcA8in2sZ47J06zu22YCorvZs/RaCRIWuZp:b4uZkxAP1xRstT20cJ0zpwF5CNs

File size 19.3 KB ( 19792 bytes )
File type ZIP
Magic literal
Zip archive data, at least v2.0 to extract

TrID ZIP compressed archive (99.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
Tags
exploit cve-2013-0422 zip cve-2012-1723

VirusTotal metadata
First submission 2013-08-08 06:02:35 UTC ( 2 years, 10 months ago )
Last submission 2015-04-30 01:10:07 UTC ( 1 year, 2 months ago )
File names index.php
javacrap
41db9b3f-7ed980b6
java-exploit-from-173.246.105.15.jar
i9jfuhioejskveohnuojfir.php
equivalent-devote-ways_being.php?QsynEJJ=BaruMb
91cb051d427bd7b679e1abc99983338e
jar_cache6954485588439484418.tmp
regard_alternate_sheet.php?sCgjKzq=XxMXwha
41db9b3f-7ed980b6
javastuff
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!