× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 19034c5fa31299e1d50e610dc3389d08db064d0c2a0aa1fb0bab0858532cd9c5
File name: sample
Detection ratio: 0 / 52
Analysis date: 2014-07-28 11:54:51 UTC ( 4 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20140728
AegisLab 20140728
Yandex 20140727
AhnLab-V3 20140727
AntiVir 20140728
Antiy-AVL 20140728
Avast 20140728
AVG 20140728
Baidu-International 20140728
BitDefender 20140728
Bkav 20140728
ByteHero 20140728
CAT-QuickHeal 20140728
ClamAV 20140728
CMC 20140724
Commtouch 20140728
Comodo 20140728
DrWeb 20140728
Emsisoft 20140728
ESET-NOD32 20140728
F-Prot 20140728
F-Secure 20140728
Fortinet 20140728
GData 20140728
Ikarus 20140728
Jiangmin 20140725
K7AntiVirus 20140725
K7GW 20140725
Kaspersky 20140728
Kingsoft 20140728
Malwarebytes 20140728
McAfee 20140728
McAfee-GW-Edition 20140727
Microsoft 20140728
eScan 20140728
NANO-Antivirus 20140728
Norman 20140728
nProtect 20140728
Panda 20140728
Qihoo-360 20140728
Sophos AV 20140728
SUPERAntiSpyware 20140727
Symantec 20140728
Tencent 20140728
TheHacker 20140722
TotalDefense 20140728
TrendMicro 20140728
TrendMicro-HouseCall 20140728
VBA32 20140728
VIPRE 20140728
ViRobot 20140728
Zoner 20140723
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 4
Section headers 25
ELF sections
ELF Segments
.init
.text
__libc_freeres_fn
__libc_thread_freeres_fn
.fini
.rodata
__libc_atexit
__libc_subfreeres
__libc_thread_subfreeres
.eh_frame
.note.ABI-tag
.ctors
.dtors
.jcr
.data.rel.ro
.got
.got.plt
.data
.bss
__libc_freeres_ptrs
.note.ABI-tag
Segment without sections
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

File identification
MD5 d96fe80de7483eb961b38456c5b207e8
SHA1 e2c808c905411df3950f1f882e9d6ee4a8c3d51a
SHA256 19034c5fa31299e1d50e610dc3389d08db064d0c2a0aa1fb0bab0858532cd9c5
ssdeep
12288:sATOFng45mRP6UljSNdzhqmkVshQt4vvL1jK/ua3DxwZWZVvjYZUsW5D:scImEZdomkSitwvL1jKFxwZWZljYZtGD

File size 551.9 KB ( 565159 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.2.5, not stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf

VirusTotal metadata
First submission 2014-07-28 11:54:51 UTC ( 4 years, 4 months ago )
Last submission 2015-06-04 07:11:11 UTC ( 3 years, 6 months ago )
File names sample
e2c808c905411df3950f1f882e9d6ee4a8c3d51a
vti-rescan
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!