qjerome
10a862dc51
Reviewed-on: #2 Co-authored-by: qjerome <quentin.jerome@circl.lu> Co-committed-by: qjerome <quentin.jerome@circl.lu>
626 lines
16 KiB
JSON
626 lines
16 KiB
JSON
{
|
|
"ALYac": {
|
|
"category": "malicious",
|
|
"engine_name": "ALYac",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2.0.0.10",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.1714"
|
|
},
|
|
"APEX": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "APEX",
|
|
"engine_update": "20240610",
|
|
"engine_version": "6.541",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"AVG": {
|
|
"category": "malicious",
|
|
"engine_name": "AVG",
|
|
"engine_update": "20240611",
|
|
"engine_version": "23.9.8494.0",
|
|
"method": "blacklist",
|
|
"result": "ELF:CVE-2010-3081-E [Expl]"
|
|
},
|
|
"Acronis": {
|
|
"category": "undetected",
|
|
"engine_name": "Acronis",
|
|
"engine_update": "20240328",
|
|
"engine_version": "1.2.0.121",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"AhnLab-V3": {
|
|
"category": "undetected",
|
|
"engine_name": "AhnLab-V3",
|
|
"engine_update": "20240611",
|
|
"engine_version": "3.25.1.10473",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Alibaba": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "Alibaba",
|
|
"engine_update": "20190527",
|
|
"engine_version": "0.3.0.5",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Antiy-AVL": {
|
|
"category": "malicious",
|
|
"engine_name": "Antiy-AVL",
|
|
"engine_update": "20240611",
|
|
"engine_version": "3.0",
|
|
"method": "blacklist",
|
|
"result": "Trojan[Exploit]/Linux.Agent.a"
|
|
},
|
|
"Arcabit": {
|
|
"category": "malicious",
|
|
"engine_name": "Arcabit",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2022.0.0.18",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.D6B2"
|
|
},
|
|
"Avast": {
|
|
"category": "malicious",
|
|
"engine_name": "Avast",
|
|
"engine_update": "20240611",
|
|
"engine_version": "23.9.8494.0",
|
|
"method": "blacklist",
|
|
"result": "ELF:CVE-2010-3081-E [Expl]"
|
|
},
|
|
"Avast-Mobile": {
|
|
"category": "undetected",
|
|
"engine_name": "Avast-Mobile",
|
|
"engine_update": "20240611",
|
|
"engine_version": "240611-00",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Avira": {
|
|
"category": "malicious",
|
|
"engine_name": "Avira",
|
|
"engine_update": "20240611",
|
|
"engine_version": "8.3.3.18",
|
|
"method": "blacklist",
|
|
"result": "EXP/CVE-2010-3081.B"
|
|
},
|
|
"Baidu": {
|
|
"category": "undetected",
|
|
"engine_name": "Baidu",
|
|
"engine_update": "20190318",
|
|
"engine_version": "1.0.0.2",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"BitDefender": {
|
|
"category": "malicious",
|
|
"engine_name": "BitDefender",
|
|
"engine_update": "20240611",
|
|
"engine_version": "7.2",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.1714"
|
|
},
|
|
"BitDefenderFalx": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "BitDefenderFalx",
|
|
"engine_update": "20240128",
|
|
"engine_version": "2.0.936",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"BitDefenderTheta": {
|
|
"category": "undetected",
|
|
"engine_name": "BitDefenderTheta",
|
|
"engine_update": "20240529",
|
|
"engine_version": "7.2.37796.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Bkav": {
|
|
"category": "undetected",
|
|
"engine_name": "Bkav",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2.0.0.1",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"CAT-QuickHeal": {
|
|
"category": "undetected",
|
|
"engine_name": "CAT-QuickHeal",
|
|
"engine_update": "20240610",
|
|
"engine_version": "22.00",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"CMC": {
|
|
"category": "undetected",
|
|
"engine_name": "CMC",
|
|
"engine_update": "20240609",
|
|
"engine_version": "2.4.2022.1",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"ClamAV": {
|
|
"category": "malicious",
|
|
"engine_name": "ClamAV",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.3.1.0",
|
|
"method": "blacklist",
|
|
"result": "Unix.Malware.Agent-7437248-0"
|
|
},
|
|
"CrowdStrike": {
|
|
"category": "undetected",
|
|
"engine_name": "CrowdStrike",
|
|
"engine_update": "20231026",
|
|
"engine_version": "1.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Cybereason": {
|
|
"category": "undetected",
|
|
"engine_name": "Cybereason",
|
|
"engine_update": "20240502",
|
|
"engine_version": "1.2.449",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Cylance": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "Cylance",
|
|
"engine_update": "20240606",
|
|
"engine_version": "3.0.0.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Cynet": {
|
|
"category": "malicious",
|
|
"engine_name": "Cynet",
|
|
"engine_update": "20240611",
|
|
"engine_version": "4.0.1.1",
|
|
"method": "blacklist",
|
|
"result": "Malicious (score: 99)"
|
|
},
|
|
"DeepInstinct": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "DeepInstinct",
|
|
"engine_update": "20240606",
|
|
"engine_version": "5.0.0.8",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"DrWeb": {
|
|
"category": "malicious",
|
|
"engine_name": "DrWeb",
|
|
"engine_update": "20240611",
|
|
"engine_version": "7.0.65.5230",
|
|
"method": "blacklist",
|
|
"result": "Linux.Exploit.CVE-2010-3081.1"
|
|
},
|
|
"ESET-NOD32": {
|
|
"category": "malicious",
|
|
"engine_name": "ESET-NOD32",
|
|
"engine_update": "20240611",
|
|
"engine_version": "29374",
|
|
"method": "blacklist",
|
|
"result": "Linux/Exploit.Agent.AY"
|
|
},
|
|
"Elastic": {
|
|
"category": "undetected",
|
|
"engine_name": "Elastic",
|
|
"engine_update": "20240531",
|
|
"engine_version": "4.0.149",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Emsisoft": {
|
|
"category": "malicious",
|
|
"engine_name": "Emsisoft",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2024.1.0.53752",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.1714 (B)"
|
|
},
|
|
"F-Secure": {
|
|
"category": "malicious",
|
|
"engine_name": "F-Secure",
|
|
"engine_update": "20240611",
|
|
"engine_version": "18.10.1547.307",
|
|
"method": "blacklist",
|
|
"result": "Exploit.EXP/CVE-2010-3081.B"
|
|
},
|
|
"FireEye": {
|
|
"category": "malicious",
|
|
"engine_name": "FireEye",
|
|
"engine_update": "20240611",
|
|
"engine_version": "35.47.0.0",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.1714"
|
|
},
|
|
"Fortinet": {
|
|
"category": "undetected",
|
|
"engine_name": "Fortinet",
|
|
"engine_update": "20240611",
|
|
"engine_version": "None",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"GData": {
|
|
"category": "malicious",
|
|
"engine_name": "GData",
|
|
"engine_update": "20240611",
|
|
"engine_version": "A:25.38247B:27.36321",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.1714"
|
|
},
|
|
"Google": {
|
|
"category": "malicious",
|
|
"engine_name": "Google",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1718100027",
|
|
"method": "blacklist",
|
|
"result": "Detected"
|
|
},
|
|
"Gridinsoft": {
|
|
"category": "undetected",
|
|
"engine_name": "Gridinsoft",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.0.179.174",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Ikarus": {
|
|
"category": "malicious",
|
|
"engine_name": "Ikarus",
|
|
"engine_update": "20240611",
|
|
"engine_version": "6.3.12.0",
|
|
"method": "blacklist",
|
|
"result": "Exploit.MS04.CVE-2004-0210-2010-3081.B"
|
|
},
|
|
"Jiangmin": {
|
|
"category": "malicious",
|
|
"engine_name": "Jiangmin",
|
|
"engine_update": "20240610",
|
|
"engine_version": "16.0.100",
|
|
"method": "blacklist",
|
|
"result": "Exploit.Linux.ahn"
|
|
},
|
|
"K7AntiVirus": {
|
|
"category": "undetected",
|
|
"engine_name": "K7AntiVirus",
|
|
"engine_update": "20240611",
|
|
"engine_version": "12.166.52252",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"K7GW": {
|
|
"category": "undetected",
|
|
"engine_name": "K7GW",
|
|
"engine_update": "20240611",
|
|
"engine_version": "12.166.52250",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Kaspersky": {
|
|
"category": "malicious",
|
|
"engine_name": "Kaspersky",
|
|
"engine_update": "20240611",
|
|
"engine_version": "22.0.1.28",
|
|
"method": "blacklist",
|
|
"result": "HEUR:Exploit.Linux.Agent.a"
|
|
},
|
|
"Kingsoft": {
|
|
"category": "undetected",
|
|
"engine_name": "Kingsoft",
|
|
"engine_update": "20230906",
|
|
"engine_version": "None",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Lionic": {
|
|
"category": "malicious",
|
|
"engine_name": "Lionic",
|
|
"engine_update": "20240611",
|
|
"engine_version": "7.5",
|
|
"method": "blacklist",
|
|
"result": "Hacktool.Linux.Agent.3!c"
|
|
},
|
|
"MAX": {
|
|
"category": "malicious",
|
|
"engine_name": "MAX",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2023.1.4.1",
|
|
"method": "blacklist",
|
|
"result": "malware (ai score=96)"
|
|
},
|
|
"Malwarebytes": {
|
|
"category": "undetected",
|
|
"engine_name": "Malwarebytes",
|
|
"engine_update": "20240611",
|
|
"engine_version": "4.5.5.54",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"MaxSecure": {
|
|
"category": "undetected",
|
|
"engine_name": "MaxSecure",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.0.0.1",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"McAfee": {
|
|
"category": "undetected",
|
|
"engine_name": "McAfee",
|
|
"engine_update": "20240610",
|
|
"engine_version": "6.0.6.653",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"McAfeeD": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "McAfeeD",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.2.0.7628",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"MicroWorld-eScan": {
|
|
"category": "malicious",
|
|
"engine_name": "MicroWorld-eScan",
|
|
"engine_update": "20240611",
|
|
"engine_version": "14.0.409.0",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.1714"
|
|
},
|
|
"Microsoft": {
|
|
"category": "malicious",
|
|
"engine_name": "Microsoft",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.1.24050.5",
|
|
"method": "blacklist",
|
|
"result": "Exploit:Linux/CVE-2010-3081.A!MTB"
|
|
},
|
|
"NANO-Antivirus": {
|
|
"category": "malicious",
|
|
"engine_name": "NANO-Antivirus",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.0.146.25796",
|
|
"method": "blacklist",
|
|
"result": "Exploit.Elf32.CVE20103081.dxkfls"
|
|
},
|
|
"Paloalto": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "Paloalto",
|
|
"engine_update": "20240611",
|
|
"engine_version": "0.9.0.1003",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Panda": {
|
|
"category": "undetected",
|
|
"engine_name": "Panda",
|
|
"engine_update": "20240610",
|
|
"engine_version": "4.6.4.2",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Rising": {
|
|
"category": "malicious",
|
|
"engine_name": "Rising",
|
|
"engine_update": "20240611",
|
|
"engine_version": "25.0.0.27",
|
|
"method": "blacklist",
|
|
"result": "Exploit.Agent!8.1B (TFE:14:90c1BLtlaUT)"
|
|
},
|
|
"SUPERAntiSpyware": {
|
|
"category": "undetected",
|
|
"engine_name": "SUPERAntiSpyware",
|
|
"engine_update": "20240611",
|
|
"engine_version": "5.6.0.1032",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Sangfor": {
|
|
"category": "undetected",
|
|
"engine_name": "Sangfor",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2.25.10.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"SentinelOne": {
|
|
"category": "malicious",
|
|
"engine_name": "SentinelOne",
|
|
"engine_update": "20240417",
|
|
"engine_version": "24.2.1.1",
|
|
"method": "blacklist",
|
|
"result": "Static AI - Suspicious ELF"
|
|
},
|
|
"Skyhigh": {
|
|
"category": "malicious",
|
|
"engine_name": "Skyhigh",
|
|
"engine_update": "20240610",
|
|
"engine_version": "v2021.2.0+4045",
|
|
"method": "blacklist",
|
|
"result": "Artemis!Trojan"
|
|
},
|
|
"Sophos": {
|
|
"category": "undetected",
|
|
"engine_name": "Sophos",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2.5.5.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Symantec": {
|
|
"category": "malicious",
|
|
"engine_name": "Symantec",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.21.0.0",
|
|
"method": "blacklist",
|
|
"result": "Trojan.Gen.NPE"
|
|
},
|
|
"SymantecMobileInsight": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "SymantecMobileInsight",
|
|
"engine_update": "20240103",
|
|
"engine_version": "2.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"TACHYON": {
|
|
"category": "undetected",
|
|
"engine_name": "TACHYON",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2024-06-11.02",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Tencent": {
|
|
"category": "malicious",
|
|
"engine_name": "Tencent",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.0.0.1",
|
|
"method": "blacklist",
|
|
"result": "Linux.Exploit.Agent.Qgil"
|
|
},
|
|
"Trapmine": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "Trapmine",
|
|
"engine_update": "20240223",
|
|
"engine_version": "4.0.16.96",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"TrendMicro": {
|
|
"category": "malicious",
|
|
"engine_name": "TrendMicro",
|
|
"engine_update": "20240611",
|
|
"engine_version": "11.0.0.1006",
|
|
"method": "blacklist",
|
|
"result": "ELF_EXPLOYT.LL"
|
|
},
|
|
"TrendMicro-HouseCall": {
|
|
"category": "malicious",
|
|
"engine_name": "TrendMicro-HouseCall",
|
|
"engine_update": "20240611",
|
|
"engine_version": "10.0.0.1040",
|
|
"method": "blacklist",
|
|
"result": "ELF_EXPLOYT.LL"
|
|
},
|
|
"Trustlook": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "Trustlook",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"VBA32": {
|
|
"category": "undetected",
|
|
"engine_name": "VBA32",
|
|
"engine_update": "20240611",
|
|
"engine_version": "5.0.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"VIPRE": {
|
|
"category": "malicious",
|
|
"engine_name": "VIPRE",
|
|
"engine_update": "20240611",
|
|
"engine_version": "6.0.0.35",
|
|
"method": "blacklist",
|
|
"result": "Linux.CornelGEN.1714"
|
|
},
|
|
"Varist": {
|
|
"category": "undetected",
|
|
"engine_name": "Varist",
|
|
"engine_update": "20240611",
|
|
"engine_version": "6.5.1.2",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"ViRobot": {
|
|
"category": "undetected",
|
|
"engine_name": "ViRobot",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2014.3.20.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"VirIT": {
|
|
"category": "undetected",
|
|
"engine_name": "VirIT",
|
|
"engine_update": "20240610",
|
|
"engine_version": "9.5.720",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Webroot": {
|
|
"category": "type-unsupported",
|
|
"engine_name": "Webroot",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.0.0.403",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Xcitium": {
|
|
"category": "malicious",
|
|
"engine_name": "Xcitium",
|
|
"engine_update": "20240611",
|
|
"engine_version": "36779",
|
|
"method": "blacklist",
|
|
"result": "Malware@#57nwy1j6aalm"
|
|
},
|
|
"Yandex": {
|
|
"category": "undetected",
|
|
"engine_name": "Yandex",
|
|
"engine_update": "20240611",
|
|
"engine_version": "5.5.2.24",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"Zillya": {
|
|
"category": "malicious",
|
|
"engine_name": "Zillya",
|
|
"engine_update": "20240610",
|
|
"engine_version": "2.0.0.5130",
|
|
"method": "blacklist",
|
|
"result": "Exploit.Agent.Linux.4"
|
|
},
|
|
"ZoneAlarm": {
|
|
"category": "malicious",
|
|
"engine_name": "ZoneAlarm",
|
|
"engine_update": "20240611",
|
|
"engine_version": "1.0",
|
|
"method": "blacklist",
|
|
"result": "HEUR:Exploit.Linux.Agent.a"
|
|
},
|
|
"Zoner": {
|
|
"category": "undetected",
|
|
"engine_name": "Zoner",
|
|
"engine_update": "20240611",
|
|
"engine_version": "2.2.2.0",
|
|
"method": "blacklist",
|
|
"result": null
|
|
},
|
|
"alibabacloud": {
|
|
"category": "malicious",
|
|
"engine_name": "alibabacloud",
|
|
"engine_update": "20240513",
|
|
"engine_version": "2.1.0",
|
|
"method": "blacklist",
|
|
"result": "Exp:Linux/CVE.2010.3081"
|
|
},
|
|
"tehtris": {
|
|
"category": "undetected",
|
|
"engine_name": "tehtris",
|
|
"engine_update": "20240611",
|
|
"engine_version": "v0.1.4",
|
|
"method": "blacklist",
|
|
"result": null
|
|
}
|
|
}
|