× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f91aff8edded984f61fc31635f6da9d06cebf85f67d3b8643fcb38c2e889e84c
File name: 2014-03-16-Fiesta-EK-java-exploit.jar
Detection ratio: 29 / 59
Analysis date: 2017-11-04 01:52:21 UTC ( 1 year, 6 months ago )
Antivirus Result Update
Ad-Aware Java.Trojan.GenericGB.126 20171104
AegisLab Exploit.Java.Generic!c 20171104
Antiy-AVL Trojan[Exploit]/Java.Agent 20171103
Arcabit Java.Trojan.GenericGB.126 20171104
Avast Java:CVE-2013-2465-BK [Expl] 20171104
AVG Java:CVE-2013-2465-BK [Expl] 20171104
Avira (no cloud) EXP/Java.HLP.EB.444 20171104
BitDefender Java.Trojan.GenericGB.126 20171104
CAT-QuickHeal Exp.JAVA.Agent.UV 20171103
ClamAV Java.Exploit.Fiesta-62 20171103
Comodo UnclassifiedMalware 20171104
Emsisoft Java.Trojan.GenericGB.126 (B) 20171104
ESET-NOD32 Java/Exploit.Agent.RCM 20171104
F-Secure Java.Trojan.GenericGB.126 20171103
GData Java.Trojan.GenericGB.126 20171103
Ikarus Trojan.Java.Exploit 20171103
Kaspersky HEUR:Exploit.Java.Generic 20171103
MAX malware (ai score=87) 20171103
McAfee Generic.dx!394C2F53ED7F 20171031
McAfee-GW-Edition RDN/Generic Exploit!1m3 20171103
Microsoft Exploit:Java/CVE-2012-0507 20171103
eScan Java.Trojan.GenericGB.126 20171103
NANO-Antivirus Exploit.Zip.Heuristic-java.csrvpr 20171104
Qihoo-360 Win32/Trojan.407 20171104
Sophos AV Mal/Generic-S 20171103
Symantec Trojan.Gen.NPE 20171103
TotalDefense Java/Tnega.XAPE!suspicious 20171103
TrendMicro HEUR_JAVA.HDFN 20171104
ZoneAlarm by Check Point HEUR:Exploit.Java.Generic 20171104
AhnLab-V3 20171103
Alibaba 20170911
ALYac 20171104
Avast-Mobile 20171103
AVware 20171104
Baidu 20171103
Bkav 20171102
CMC 20171103
CrowdStrike Falcon (ML) 20171016
Cybereason 20171030
Cyren 20171104
DrWeb 20171104
eGambit 20171104
Endgame 20171024
F-Prot 20171104
Fortinet 20171103
Sophos ML 20170914
Jiangmin 20171103
K7AntiVirus 20171103
K7GW 20171103
Kingsoft 20171104
Malwarebytes 20171104
nProtect 20171104
Palo Alto Networks (Known Signatures) 20171104
Panda 20171103
Rising 20171104
SentinelOne (Static ML) 20171019
SUPERAntiSpyware 20171104
Symantec Mobile Insight 20171103
Tencent 20171104
TheHacker 20171102
TrendMicro-HouseCall 20171104
Trustlook 20171104
VBA32 20171103
VIPRE 20171104
ViRobot 20171103
WhiteArmor 20171024
Yandex 20171102
Zoner 20171104
The file being studied is a Java Archive! Typically a JAR file contains the class files and auxiliary resources associated with applets and applications.
Archive metadata
Total directories 1
Maximum directory depth 1
Total files 5
Maximum member date 2014-03-12 15:49:00
Minimum member date 2014-03-12 15:48:58
Manifest
Java packages
Interesting strings
Embedded files by type
ascii 1
class 4
Embedded files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
6
Uncompressed size
8271
Highest datetime
2014-03-12 15:49:00
Lowest datetime
2014-03-12 15:48:58
Contained files by extension
MF
1
Contained files by type
Java Bytecode
4
directory
1
unknown
1
Compressed bundles
PCAP parents
File identification
MD5 6aa4afa29af9ccb2c02700ab2e253c3d
SHA1 8bebfdfee5f6854cd55117fabf7d698d80bac0c3
SHA256 f91aff8edded984f61fc31635f6da9d06cebf85f67d3b8643fcb38c2e889e84c
ssdeep
96:RT7xu+bx3SN4DxIUaYEatPGMKKurifkN9O+g2Gd8MKFGQTx9uOk:tx44D6LDwP7KKurGk6IGd85GQ9m

File size 4.7 KB ( 4859 bytes )
File type JAR
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
cve-2013-2465 cve-2012-0507 exploit jar

VirusTotal metadata
First submission 2014-03-14 16:32:13 UTC ( 5 years, 2 months ago )
Last submission 2015-01-24 00:45:48 UTC ( 4 years, 4 months ago )
File names 2014-03-16-Fiesta-EK-java-exploit.jar
ECYT9hkX.jar.java-archive
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!