Exploit:Java/CVE-2013-0422

Exploit:Java/CVE-2013-0422 Description

Type: Malware

Exploit:Java/CVE-2013-0422 is a malevolent Java application that aims at exploiting a vulnerability (CVE-2013-0422) in Oracle JRE 7, in order to drop and install damaging files onto the compromised PC. If Exploit:Java/CVE-2013-0422 is reported then it is possible that your machine has been affected. Exploit:Java/CVE-2013-0422 is distributed via hijacked websites involving the malevolent code and attacks PCs using a vulnerable version of Java. Exploit:Java/CVE-2013-0422 then aims at downloading and executing files from a remote web address that could incorporate additional security infections.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Sophos Mal/VB-YA
BitDefender Gen:Trojan.Heur.VP2.em1@aGgwwlmi
AVG Generic31.BLWR
Panda Generic Trojan
AVG Generic6_c.ZYK
Fortinet W32/Generic
McAfee-GW-Edition Heuristic.LooksLike.Win32.SuspiciousPE.C
TrendMicro TROJ_GEN.USBH31ACN
AntiVir TR/Spy.409608
Sophos Mal/Behav-023
BitDefender Gen:Trojan.Heur.GM.0800460800
Symantec Trojan.ADH.2
F-Prot W32/Heuristic-3
K7AntiVirus Riskware
McAfee Artemis!45C989419E00

Technical Information

File System Details

Exploit:Java/CVE-2013-0422 creates the following file(s):
# File Name MD5 Detection Count
1 syshost.exe 58c094b9a87828c72343f7c885494154 40
2 Serviecs.vbs f3e7390115d4a4ad5cfa9cca22d84eef 16
3 lollipop.exe e0220e1170c209be4bd0000f7120fddb 10
4 %TEMP%.exe 96c67723e619ad0866bcb53df70e1efe 9
5 WindowsSecurity.exe cdf83a08a0c0c321775ad90fce52cc17 7
6 tgnyyjcp.exe cbdd7c07ae47f92cc66ce9c76aec42ca 4
7 WFX32.exe 45c989419e00b0c0d019f3a93151bdaa 2
8 Wenmemor.exe ea0c6b4f7dba75c86fdfa462a9662594 2
9 96970517.exe c5a73af0221742deeb757dfb9aebddae 2
10 477278.exe a8651203ab59f0d2a27915b83ca527b7 2
11 dnfue.exe 11b7ba3d9c79cb4cd6446cd446fd59bb 1
12 mswin32.exe 762218f4bb8319f90f1575a93acd673b 1
13 DxJBorW.class 3301c763a77132c33a58e32f0222ad5f 0
14 Java710.jar 5c73922dfe407c836ba2055c05e9a068 0
15 4774.mycaniev.com-19980-images-e2f5ec124f711cf99105ba2df45a45da-1360620216-8d26bf153bdae710d672d025ead349e0.jar-110213-220355 afe44969ffabb080a724a96babff1b37 0
16 java2.jar 5599f12b1c2ce9c68dc629d013241273 0
17 jmx.jar fbccf2e1338e496199401f543aad1a3c 0
More files

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.