× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0206efba7fc13700efd59354e9c6ca4d1ffe34f6689bd195798181824d46b83d
File name: attacker module file
Detection ratio: 0 / 55
Analysis date: 2016-09-07 08:06:23 UTC ( 2 years, 6 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160907
AegisLab 20160907
AhnLab-V3 20160906
Alibaba 20160907
ALYac 20160907
Antiy-AVL 20160907
Arcabit 20160907
Avast 20160907
AVG 20160907
Avira (no cloud) 20160907
AVware 20160907
Baidu 20160907
BitDefender 20160907
Bkav 20160907
CAT-QuickHeal 20160907
ClamAV 20160907
CMC 20160905
Comodo 20160907
Cyren 20160907
DrWeb 20160907
Emsisoft 20160907
ESET-NOD32 20160907
F-Prot 20160907
Fortinet 20160907
GData 20160907
Ikarus 20160907
Jiangmin 20160907
K7AntiVirus 20160907
K7GW 20160907
Kaspersky 20160907
Kingsoft 20160907
Malwarebytes 20160907
McAfee 20160907
McAfee-GW-Edition 20160907
Microsoft 20160907
eScan 20160907
NANO-Antivirus 20160907
nProtect 20160907
Panda 20160906
Qihoo-360 20160907
Rising 20160907
Sophos AV 20160907
SUPERAntiSpyware 20160907
Symantec 20160907
Tencent 20160907
TheHacker 20160905
TotalDefense 20160907
TrendMicro 20160907
TrendMicro-HouseCall 20160907
VBA32 20160905
VIPRE 20160907
ViRobot 20160907
Yandex 20160906
Zillya 20160907
Zoner 20160907
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 4
Section headers 15
ELF sections
ELF Segments
.ARM.exidx
.init
.text
.fini
.rodata
.ARM.exidx
.eh_frame
.init_array
.fini_array
.jcr
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

File identification
MD5 8e7637d72e522cb52012c02eb8ddfdbe
SHA1 8f68f088908bd6113ab27c39f18bb4a75886c298
SHA256 0206efba7fc13700efd59354e9c6ca4d1ffe34f6689bd195798181824d46b83d
ssdeep
768:+CB4uaizGX5w5IKHwQI08iXUDeNXK0Er:+CB4uaizE5wj/ZtNXKTr

File size 25.5 KB ( 26136 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2016-09-06 14:17:15 UTC ( 2 years, 6 months ago )
Last submission 2018-05-19 01:01:07 UTC ( 10 months ago )
File names 8f68f088908bd6113ab27c39f18bb4a75886c298_attacker module file
attacker module file
attacker module file
0206EFBA7FC13700EFD59354E9C6CA4D1FFE34F6689BD195798181824D46B83D.dat
dcc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!