× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1ad872bc5d7fd502d8e4f2b7ae94d2f0a049466c3fcaa35736e81767205e843a
File name: zbetcheckin_tracker_Yowai.ppc
Detection ratio: 12 / 57
Analysis date: 2019-01-11 06:58:57 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen13 20190110
Avast ELF:Mirai-AAJ [Trj] 20190111
Avast-Mobile ELF:Mirai-UM [Trj] 20190110
AVG ELF:Mirai-AAJ [Trj] 20190111
DrWeb Linux.Mirai.659 20190111
ESET-NOD32 a variant of Linux/Mirai.BR 20190111
Fortinet ELF/Mirai.BO!tr 20190111
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20190111
Symantec Linux.Mirai 20190110
TrendMicro Possible_MIRAI.SMLBO14 20190111
TrendMicro-HouseCall Possible_MIRAI.SMLBO14 20190111
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20190111
Acronis 20190109
Ad-Aware 20190111
AegisLab 20190111
Alibaba 20180921
ALYac 20190111
Antiy-AVL 20190111
Arcabit 20190111
Avira (no cloud) 20190110
Baidu 20190110
BitDefender 20190111
Bkav 20190108
CAT-QuickHeal 20190110
ClamAV 20190110
CMC 20190110
Comodo 20190111
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190111
Cyren 20190111
eGambit 20190111
Emsisoft 20190111
Endgame 20181108
F-Prot 20190111
F-Secure 20190111
GData 20190111
Ikarus 20190110
Sophos ML 20181128
Jiangmin 20190111
K7AntiVirus 20190111
K7GW 20190111
Kingsoft 20190111
Malwarebytes 20190111
MAX 20190111
McAfee 20190111
McAfee-GW-Edition 20190111
Microsoft 20190111
eScan 20190111
NANO-Antivirus 20190111
Palo Alto Networks (Known Signatures) 20190111
Panda 20190110
Qihoo-360 20190111
Rising 20190111
SentinelOne (Static ML) 20181223
Sophos AV 20190111
SUPERAntiSpyware 20190109
TACHYON 20190111
Tencent 20190111
TheHacker 20190106
TotalDefense 20190110
Trapmine 20190103
Trustlook 20190111
VBA32 20190110
VIPRE 20190110
ViRobot 20190111
Webroot 20190111
Yandex 20190110
Zillya 20190110
Zoner 20190111
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, big endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 12
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.sdata
.sbss
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Big endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
PowerPC

File identification
MD5 9b9d54d7eb3886512c04255ad89c0ce5
SHA1 93cc23fb024ab739fc2b17261a880868d82ab8eb
SHA256 1ad872bc5d7fd502d8e4f2b7ae94d2f0a049466c3fcaa35736e81767205e843a
ssdeep
768:VS/5pobvNTZZjYLhXsRKlbNFLHTt+aVU9DsWZeI7uBdnF7z3a5+CotRP:sS1T898yHfPOGz3a5JotJ

File size 57.2 KB ( 58536 bytes )
File type ELF
Magic literal
ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-11 06:58:57 UTC ( 1 month, 1 week ago )
Last submission 2019-01-12 18:22:14 UTC ( 1 month ago )
File names zbetcheckin_tracker_Yowai.ppc
Yowai.ppc
28
10
12
1ad872bc5d7fd502d8e4f2b7ae94d2f0a049466c3fcaa35736e81767205e843a
179
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!