× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
File name: index.php
Detection ratio: 22 / 57
Analysis date: 2015-02-27 06:12:13 UTC ( 6 days, 4 hours ago )
Antivirus Result Update
AVG Exploit.Java_c.ONW 20150228
Antiy-AVL Trojan[Exploit]/Java.CVE-2012-1723.nt 20150228
Avast Java:Agent-FZB [Expl] 20150228
Avira Java/Jogek.ctw.7 20150228
CAT-QuickHeal Exp.JAVA.Agent.ABP 20150227
ClamAV JAVA.Exploit.Exploit.Kit-24 20150228
Comodo UnclassifiedMalware 20150228
DrWeb Exploit.Java.586 20150228
ESET-NOD32 a variant of Java/Exploit.Agent.PPI 20150228
GData Java.Trojan.Agent.5KCUJI 20150228
Ikarus Java.Jogek 20150228
Kaspersky Exploit.Java.CVE-2012-1723.nt 20150228
McAfee RDN/Generic.dx!oz 20150228
McAfee-GW-Edition RDN/Generic.dx!oz 20150228
Microsoft Exploit:Java/CVE-2013-0422 20150228
NANO-Antivirus Exploit.Java.Jogek.cjeies 20150228
Qihoo-360 Trojan.Generic 20150228
Sophos Troj/EncProc-V 20150228
Symantec Trojan.Maljava 20150228
Tencent Java.Exploit.Cve-2012-1723.Htlz 20150228
TotalDefense Java/Tnega.RUDfJSB 20150227
TrendMicro-HouseCall Suspicious_GEN.F47V0212 20150228
ALYac 20150228
AVware 20150228
Ad-Aware 20150228
AegisLab 20150228
Agnitum 20150226
AhnLab-V3 20150227
Alibaba 20150228
Baidu-International 20150227
BitDefender 20150228
Bkav 20150227
ByteHero 20150228
CMC 20150227
Cyren 20150228
Emsisoft 20150228
F-Prot 20150228
F-Secure 20150228
Fortinet 20150228
Jiangmin 20150227
K7AntiVirus 20150228
K7GW 20150228
Kingsoft 20150228
Malwarebytes 20150228
MicroWorld-eScan 20150228
Norman 20150227
Panda 20150227
Rising 20150227
SUPERAntiSpyware 20150228
TheHacker 20150227
TrendMicro 20150228
VBA32 20150227
VIPRE 20150228
ViRobot 20150228
Zillya 20150228
Zoner 20150227
nProtect 20150227
Compressed bundles
PCAP parents
File identification
MD5 91cb051d427bd7b679e1abc99983338e
SHA1 c935c853b6d8c3414eef215bb343944e95324363
SHA256 d1d127d60ca94a8a1779c9d978c4eadfdd5dbb3683a87f2bd1cbc963b09a9a36
ssdeep
384:994uZkxLYDPTW4V9ndbzFVx3hqV+BCcA8in2sZ47J06zu22YCorvZs/RaCRIWuZp:b4uZkxAP1xRstT20cJ0zpwF5CNs

File size 19.3 KB ( 19792 bytes )
File type ZIP
Magic literal
Zip archive data, at least v2.0 to extract

TrID ZIP compressed archive (99.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
Tags
exploit cve-2013-0422 zip cve-2012-1723

VirusTotal metadata
First submission 2013-08-08 06:02:35 UTC ( 1 year, 6 months ago )
Last submission 2014-03-19 13:13:11 UTC ( 11 months, 2 weeks ago )
File names index.php
javacrap
41db9b3f-7ed980b6
jar_cache6954485588439484418.tmp
i9jfuhioejskveohnuojfir.php
equivalent-devote-ways_being.php?QsynEJJ=BaruMb
91cb051d427bd7b679e1abc99983338e
java-exploit-from-173.246.105.15.jar
41db9b3f-7ed980b6
javastuff
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0x00000000

FileType
ZIP

ZipCompression
None

ZipUncompressedSize
0

ZipCompressedSize
0

ZipFileName
WqJmjZxw/

ZipBitFlag
0x0002

ZipModifyDate
2013:08:08 09:08:12

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!