www.wicar.org
Open in
urlscan Pro
199.34.228.69
Public Scan
Submitted URL: https://malware.wicar.org/
Effective URL: https://www.wicar.org/test-malware.html
Submission: On July 02 via api from US — Scanned from DE
Effective URL: https://www.wicar.org/test-malware.html
Submission: On July 02 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
WICAR.org - Test Your Anti-Malware Solution! * Home * Test Malware! * Results * Resources * Feedback * more... SELECT A TEST PAYLOAD... Each test will open up a new browser window at http://malware.wicar.org/. You may wish to try each test systematically. Ideally, all tests should be blocked by your anti-malware defences. If a blank window loads, then it likely was not detected/prevented. -------------------------------------------------------------------------------- EICAR TEST-VIRUS [SSL] The official EICAR.COM anti-virus test file. This is a 16bit DOS COM file and cannot run on recent OSes, but should be detected. MS14-064 XP and below [SSL] All Windows NT/95/98/2000/XP IE3+ Internet Explorer Windows OLE Automation Array (pre XP) CVE-2014-6332 MS14-064 2003 to Windows 10 [SSL] All Windows 2003/Vista/2008/7/8/10 IE6+ Internet Explorer Windows OLE Automation Array (post XP) CVE-2014-6332 -------------------------------------------------------------------------------- Java JRE 1.7 Applet [SSL] win32 (Java 7 JRE/JDK) Chrome Firefox IE Java 7 Applet Remote Code Execution (Browser Independent) CVE-2012-4681 MS03-020 [SSL] win32 NT/XP/2003 IE6 MS03-020 Internet Explorer's handling of the OBJECT type attribute CVE-2003-0344 MS05-054 [SSL] win32 XP IE6 MS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler CVE-2005-1790 MS09-002 [SSL] win32 XP/Vista IE7 Internet Explorer 7 CFunctionPointer Uninitialized Memory Corruption CVE-2009-0075 MS09-072 [SSL] win32 IE6 Internet Explorer Style getElementsByTagName Memory Corruption CVE-2009-3672 MS10-090 [SSL] win32 IE6 Internet Explorer CSS SetUserClip Memory Corruption CVE-2010-3962 -------------------------------------------------------------------------------- Firefox 5.0 - 15.0.1 exposedProps [SSL] Windows Firefox 5.0 to 15.0.1 exposedProps CVE-2012-3993 Embedded VLC AMV [SSL] Windows VLC v1.1.4 to 1.1.8 Browser Independent AMV invalid pointer CVE-2010-3275 Adobe Flash Hacking Team leak [SSL] Hacking Team July 2015 data leak Adobe Flash 18.0.0.194 Use After Free CVE-2015-5119 -------------------------------------------------------------------------------- JavaScript Crypto Miner [SSL] JavaScript based Cryptocurrency Miner Consumes 70% of CPU and some RAM (Proceeds will be used to fund WICAR) -------------------------------------------------------------------------------- DISCLAIMER: We cannot accept any responsibility or liability for any loss, damage, cost or expense you might incur as a result of the use of, or reliance upon, the materials which appear at this or any linked site. We have tested all the modules in our lab and confirmed them as working. Your mileage may vary however, depending on software version, configuration changes, service pack, operating system release and processor architecture, and may result in either: * Your browser exiting and opening the Windows calculator (vulnerable). [demonstration video - youtube] * Your browser opening the file and nothing happens (patched / immune). * Your browser displaying an error message or crashing (vulnerable but your system does not match the correct exploit conditions). If there is an exploit you would like to see added, please see the github repository, or contact us. -------------------------------------------------------------------------------- The wicar.org website was designed to test the correct operation your anti-virus / anti-malware software. The following table contains static HTML pages with known malicious content, based on the Metasploit Framework. The exploits contain a non-malicious payload which under Windows will execute 'calc.exe', the in-built calculator (if your browser is vulnerable). Your anti-malware software should prevent you accessing these pages... if not, there is something wrong with your anti-malware solution or the vulnerability trigger for a specific exploit is not specific enough for anti-malware to detect. Home Test Malware! Results Resources Feedback WICAR service provided by OSI Security * Resources * Feedback