× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
File name: index.php
Detection ratio: 22 / 56
Analysis date: 2015-03-13 07:54:34 UTC ( 2 weeks, 4 days ago )
Antivirus Result Update
AVG Exploit.Java_c.ONW 20150313
Antiy-AVL Trojan[Exploit]/Java.CVE-2012-1723.nt 20150313
Avast Java:Agent-FZB [Expl] 20150313
Avira Java/Jogek.ctw.7 20150313
CAT-QuickHeal Exp.JAVA.Agent.ABP 20150313
ClamAV JAVA.Exploit.Exploit.Kit-24 20150313
Comodo UnclassifiedMalware 20150313
DrWeb Exploit.Java.586 20150313
ESET-NOD32 a variant of Java/Exploit.Agent.PPI 20150313
GData Java.Trojan.Agent.5KCUJI 20150313
Ikarus Java.Jogek 20150313
Kaspersky Exploit.Java.CVE-2012-1723.nt 20150313
McAfee RDN/Generic.dx!oz 20150313
McAfee-GW-Edition RDN/Generic.dx!oz 20150313
Microsoft Exploit:Java/CVE-2013-0422 20150313
NANO-Antivirus Exploit.Java.Jogek.cjeies 20150313
Qihoo-360 Trojan.Generic 20150313
Sophos Troj/EncProc-V 20150313
Symantec Trojan.Maljava 20150313
Tencent Java.Exploit.Cve-2012-1723.Htlz 20150313
TotalDefense Java/Tnega.RUDfJSB 20150313
TrendMicro-HouseCall Suspicious_GEN.F47V0212 20150313
ALYac 20150313
AVware 20150313
Ad-Aware 20150313
AegisLab 20150313
Agnitum 20150312
AhnLab-V3 20150313
Alibaba 20150313
Baidu-International 20150313
BitDefender 20150313
Bkav 20150312
ByteHero 20150313
CMC 20150313
Cyren 20150313
Emsisoft 20150313
F-Prot 20150313
F-Secure 20150313
Fortinet 20150313
K7AntiVirus 20150313
K7GW 20150313
Kingsoft 20150313
Malwarebytes 20150313
MicroWorld-eScan 20150313
Norman 20150313
Panda 20150311
Rising 20150312
SUPERAntiSpyware 20150313
TheHacker 20150313
TrendMicro 20150313
VBA32 20150312
VIPRE 20150313
ViRobot 20150313
Zillya 20150312
Zoner 20150312
nProtect 20150313
Compressed bundles
PCAP parents
File identification
MD5 91cb051d427bd7b679e1abc99983338e
SHA1 c935c853b6d8c3414eef215bb343944e95324363
SHA256 d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
ssdeep
384:994uZkxLYDPTW4V9ndbzFVx3hqV+BCcA8in2sZ47J06zu22YCorvZs/RaCRIWuZp:b4uZkxAP1xRstT20cJ0zpwF5CNs

File size 19.3 KB ( 19792 bytes )
File type ZIP
Magic literal
Zip archive data, at least v2.0 to extract

TrID ZIP compressed archive (99.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
Tags
exploit cve-2013-0422 zip cve-2012-1723

VirusTotal metadata
First submission 2013-08-08 06:02:35 UTC ( 1 year, 7 months ago )
Last submission 2014-03-19 13:13:11 UTC ( 1 year ago )
File names index.php
javacrap
41db9b3f-7ed980b6
jar_cache6954485588439484418.tmp
i9jfuhioejskveohnuojfir.php
equivalent-devote-ways_being.php?QsynEJJ=BaruMb
91cb051d427bd7b679e1abc99983338e
java-exploit-from-173.246.105.15.jar
41db9b3f-7ed980b6
javastuff
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0x00000000

FileType
ZIP

ZipCompression
None

ZipUncompressedSize
0

ZipCompressedSize
0

ZipFileName
WqJmjZxw/

ZipBitFlag
0x0002

ZipModifyDate
2013:08:08 09:08:12

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!