
Originally Posted by
njiii
... I've discovered the same strings which I believe may be due to a virus or trojan...
Aha! A security hole!

Originally Posted by
njiii
... Yet, clamav, rkhunter, chkrootkit do not detect abnormalities. ...
The authors of these tools don't agree. Better file a security advisory pronto. 

Originally Posted by
KIAaze
Then why does the copy command contain java code?
It doesn't. It contains some default symbols that the GCC compiler put in. If you actually compile some code and scan the symbol table in the executable then you'll see that they're tagged as weak symbols and also undefined (missing text/data address.) There are other considerations (primarily relating to default shared objects) but that's the gist of it.
Code:
$ nm a.out
08049f20 d _DYNAMIC
08049ff4 d _GLOBAL_OFFSET_TABLE_
080484dc R _IO_stdin_used
w _Jv_RegisterClasses
08049f10 d __CTOR_END__
08049f0c d __CTOR_LIST__
08049f18 D __DTOR_END__
08049f14 d __DTOR_LIST__
080484ec r __FRAME_END__
08049f1c d __JCR_END__
08049f1c d __JCR_LIST__
0804a018 A __bss_start
0804a010 D __data_start
08048490 t __do_global_ctors_aux
08048370 t __do_global_dtors_aux
0804a014 D __dso_handle
w __gmon_start__
0804848a T __i686.get_pc_thunk.bx
08049f0c d __init_array_end
08049f0c d __init_array_start
08048420 T __libc_csu_fini
08048430 T __libc_csu_init
U __libc_start_main@@GLIBC_2.0
0804a018 A _edata
0804a020 A _end
080484bc T _fini
080484d8 R _fp_hw
080482b8 T _init
08048340 T _start
0804a018 b completed.6625
0804a010 W data_start
0804a01c b dtor_idx.6627
U exit@@GLIBC_2.0
080483d0 t frame_dummy
080483f4 T main
U puts@@GLIBC_2.0