× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e66bfe5de8e6ac955863268139e148c24dce794c4a18d953b86246f281f15fea
File name: DOITYOUR02.html
Detection ratio: 23 / 56
Analysis date: 2015-05-15 08:19:22 UTC ( 3 months, 2 weeks ago )
Antivirus Result Update
ALYac Trojan.Script.480407 20150515
AVG Exploit 20150515
Ad-Aware Trojan.Script.480407 20150515
AhnLab-V3 JS/Cve-2012-4792 20150515
Avast JS:Downloader-BUW [Trj] 20150515
BitDefender Trojan.Script.480407 20150515
Comodo UnclassifiedMalware 20150515
DrWeb Exploit.CVE-2012-4792.4 20150515
ESET-NOD32 JS/Kryptik.AEZ 20150515
Emsisoft Trojan.Script.480407 (B) 20150515
F-Secure Trojan.Script.480407 20150515
GData Trojan.Script.480407 20150515
Ikarus Exploit 20150515
MicroWorld-eScan Trojan.Script.480407 20150515
Microsoft Exploit:Win32/CVE-2012-4792.E 20150515
NANO-Antivirus Trojan.Script.Heuristic-js.iacgm 20150515
Norman Exploit.ADL 20150515
Panda Exploit/CVE-2012-4792 20150514
Sophos Exp/20124792-B 20150515
Tencent Script.Trojan.Generic.Taez 20150515
TrendMicro JS_EXPLOIT.SB 20150515
TrendMicro-HouseCall JS_EXPLOIT.SB 20150515
nProtect Script-JS/W32.Agent.ANA 20150515
AVware 20150515
AegisLab 20150515
Agnitum 20150514
Alibaba 20150515
Antiy-AVL 20150515
Baidu-International 20150514
Bkav 20150514
ByteHero 20150515
CAT-QuickHeal 20150514
CMC 20150513
ClamAV 20150515
Cyren 20150515
F-Prot 20150515
Fortinet 20150515
Jiangmin 20150513
K7AntiVirus 20150515
K7GW 20150515
Kaspersky 20150515
Kingsoft 20150515
Malwarebytes 20150515
McAfee 20150515
McAfee-GW-Edition 20150514
Qihoo-360 20150515
Rising 20150514
SUPERAntiSpyware 20150515
Symantec 20150515
TheHacker 20150514
TotalDefense 20150514
VBA32 20150514
VIPRE 20150515
ViRobot 20150515
Zillya 20150514
Zoner 20150513
File identification
MD5 cf394f4619db14d335dde12ca9657656
SHA1 e946ec1d7a1129d0b1438eaeae5c60f946dc85da
SHA256 e66bfe5de8e6ac955863268139e148c24dce794c4a18d953b86246f281f15fea
ssdeep
48:0WOrkyR1J1yGqpHRLJfoGiCWiTkI0ncGNVEC+R:WnFsVRF9WP7fYR

File size 2.6 KB ( 2706 bytes )
File type HTML
Magic literal
HTML document text

TrID HyperText Markup Language (100.0%)
Tags
cve-2012-4792 exploit html

VirusTotal metadata
First submission 2013-01-10 06:58:18 UTC ( 2 years, 7 months ago )
Last submission 2013-03-19 05:04:59 UTC ( 2 years, 5 months ago )
File names vti-rescan
DOITYOUR02.html
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

ExifTool file metadata
MIMEType
text/html

FileType
HTML

FileTypeExtension
html

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!