www.wicar.org Open in urlscan Pro
199.34.228.69  Public Scan

Submitted URL: http://malware.wicar.org/
Effective URL: https://www.wicar.org/test-malware.html
Submission: On August 11 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

WICAR.org - Test Your Anti-Malware Solution!
 * Home
 * Test Malware!
 * Results
 * Resources
 * Feedback
 * more...


SELECT A TEST PAYLOAD...

Each test will open up a new browser window at http://malware.wicar.org/. You
may wish to try each test systematically. Ideally, all tests should be blocked
by your anti-malware defences. If a blank window loads, then it likely was not
detected/prevented.

--------------------------------------------------------------------------------



EICAR TEST-VIRUS

[SSL] The official EICAR.COM anti-virus test file.
This is a 16bit DOS COM file and cannot
run on recent OSes, but should be detected.

MS14-064 XP and below

[SSL] All Windows NT/95/98/2000/XP IE3+
Internet Explorer Windows OLE Automation Array (pre  XP) CVE-2014-6332

MS14-064 2003 to Windows 10

[SSL] All Windows 2003/Vista/2008/7/8/10 IE6+
Internet Explorer Windows OLE Automation Array (post XP) CVE-2014-6332

--------------------------------------------------------------------------------



Java JRE 1.7 Applet

[SSL] win32 (Java 7 JRE/JDK) Chrome Firefox IE
Java 7 Applet Remote Code Execution (Browser Independent) CVE-2012-4681

MS03-020

[SSL] win32 NT/XP/2003 IE6
MS03-020 Internet Explorer's handling of the OBJECT type attribute CVE-2003-0344

MS05-054

[SSL] win32 XP IE6
MS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler CVE-2005-1790


MS09-002

[SSL] win32 XP/Vista IE7
Internet Explorer 7 CFunctionPointer Uninitialized Memory Corruption
CVE-2009-0075

MS09-072

[SSL] win32 IE6
Internet Explorer Style getElementsByTagName Memory Corruption CVE-2009-3672

MS10-090

[SSL] win32 IE6
Internet Explorer CSS SetUserClip Memory Corruption CVE-2010-3962

--------------------------------------------------------------------------------



Firefox 5.0 - 15.0.1 exposedProps

[SSL] Windows
Firefox 5.0 to 15.0.1 
exposedProps CVE-2012-3993

Embedded VLC AMV

[SSL] Windows VLC v1.1.4 to 1.1.8
Browser Independent
AMV invalid pointer CVE-2010-3275

Adobe Flash Hacking Team leak

[SSL] Hacking Team July 2015 data leak
Adobe Flash 18.0.0.194
Use After Free CVE-2015-5119

--------------------------------------------------------------------------------



JavaScript Crypto Miner

[SSL] JavaScript based Cryptocurrency Miner
Consumes 70% of CPU and some RAM
(Proceeds will be used to fund WICAR)


--------------------------------------------------------------------------------


DISCLAIMER: We cannot accept any responsibility or liability for any loss,
damage, cost or expense you might incur as a result of the use of, or reliance
upon, the materials which appear at this or any linked site.

We have tested all the modules in our lab and confirmed them as working. Your
mileage may vary however, depending on software version, configuration changes,
service pack, operating system release and processor architecture, and may
result in either:
 * Your browser exiting and opening the Windows calculator (vulnerable).
   [demonstration video - youtube]
 * Your browser opening the file and nothing happens (patched / immune).
 * Your browser displaying an error message or crashing (vulnerable but your
   system does not match the correct exploit conditions).


If there is an exploit you would like to see added, please see the github
repository, or contact us.

--------------------------------------------------------------------------------


The wicar.org website was designed to test the correct operation your anti-virus
/ anti-malware software. The following table contains static HTML pages with
known malicious content, based on the Metasploit Framework. The exploits contain
a non-malicious payload which under Windows will execute 'calc.exe', the
in-built calculator (if your browser is vulnerable). Your anti-malware software
should prevent you accessing these pages... if not, there is something wrong
with your anti-malware solution or the vulnerability trigger for a specific
exploit is not specific enough for anti-malware to detect.
Home
Test Malware!
Results
Resources
Feedback

WICAR service provided by OSI Security



 * Resources
 * Feedback