Submission Summary:

What's been foundSeverity Level
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk

Threat CategoryDescription
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 %Temp%\s_a\s_a.class 1,086 bytes MD5: 0xD770CB344D5CC57DCB36C818F803991C
SHA-1: 0x524544F0F59A86383FB0E7BA8CBEA0458FAFACCA
Trojan.Maljava [Symantec]
Exploit.Java.CVE-2011-3544.qh [Kaspersky Lab]
JV/Exploit-Blacole [McAfee]
Mal/JavaGen-E [Sophos]
Exploit.11- [Ikarus]
2 %Temp%\s_a\s_b.class 4,614 bytes MD5: 0x30BA7C105030DB4E2131E900E93D3542
SHA-1: 0x59F75808AE1D02FD80C6D12EA512A01634520E1B
Trojan.Gen.2 [Symantec]
Exploit.Java.Agent.gg [Kaspersky Lab]
JV/Exploit-Blacole.a [McAfee]
Mal/JavaGen-A [Sophos]
Exploit.Java.CVE [Ikarus]
3 %Temp%\s_a\s_c.class 15,722 bytes MD5: 0x3415DAEA8E3F9AB3BA79EF3857C14E27
SHA-1: 0xD3CD5F6EEA9C8BA852D60BDF1CD26E7829A3D70D
Trojan.Maljava [Symantec]
Exploit.Java.CVE-2011-3544.on [Kaspersky Lab]
JV/Exploit-Blacole.f [McAfee]
Mal/JavaGen-E, Mal/JavaGen-E [Sophos]
Exploit.Java.CVE [Ikarus]
4 [file and pathname of the sample #1] 15,404 bytes MD5: 0x020B0B477706596E71DE25286ED77991
SHA-1: 0xC196A7B07BFE3D3593E93F7D98E910FA8E63AFF6
Exploit.Java.CVE-2011-3544.qh, Exploit.Java.CVE-2011-3544.on, Exploit.Java.Agent.gg [Kaspersky Lab]
Exploit.11- [Ikarus]

 

Other details

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.