× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2267e1c25fe2961f4f375f6435461e9461a573f8b1c12feb28cd29531586d392
File name: 6@Yowai.x86
Detection ratio: 10 / 58
Analysis date: 2019-01-10 20:32:02 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen13 20190110
Avast ELF:Mirai-OA [Trj] 20190110
Avast-Mobile ELF:Mirai-UM [Trj] 20190110
AVG ELF:Mirai-OA [Trj] 20190110
DrWeb Linux.Mirai.754 20190110
ESET-NOD32 a variant of Linux/Mirai.L 20190110
Fortinet ELF/Mirai.AE!tr 20190110
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20190110
SentinelOne (Static ML) static engine - malicious 20181223
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20190110
Acronis 20190110
Ad-Aware 20190110
AegisLab 20190110
Alibaba 20180921
ALYac 20190110
Antiy-AVL 20190110
Arcabit 20190110
Avira (no cloud) 20190110
Babable 20180918
Baidu 20190110
BitDefender 20190110
Bkav 20190108
CAT-QuickHeal 20190110
ClamAV 20190110
CMC 20190110
Comodo 20190110
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190110
Cyren 20190110
eGambit 20190110
Emsisoft 20190110
Endgame 20181108
F-Prot 20190110
F-Secure 20190110
GData 20190110
Ikarus 20190110
Sophos ML 20181128
Jiangmin 20190110
K7AntiVirus 20190110
K7GW 20190110
Kingsoft 20190110
MAX 20190110
McAfee 20190110
McAfee-GW-Edition 20190110
Microsoft 20190110
eScan 20190110
NANO-Antivirus 20190110
Palo Alto Networks (Known Signatures) 20190110
Panda 20190110
Qihoo-360 20190110
Rising 20190110
Sophos AV 20190110
SUPERAntiSpyware 20190109
Symantec 20190110
TACHYON 20190110
Tencent 20190110
TheHacker 20190106
TotalDefense 20190110
Trapmine 20190103
TrendMicro 20190110
TrendMicro-HouseCall 20190110
Trustlook 20190110
VBA32 20190110
VIPRE 20190110
ViRobot 20190110
Webroot 20190110
Yandex 20190110
Zillya 20190110
Zoner 20190110
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 3
Section headers 10
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

File identification
MD5 25e8cab75bd32f13e1e3eeac2441c117
SHA1 1ac184ee6fcc1e5b89892c6ce42ada293bb879d0
SHA256 2267e1c25fe2961f4f375f6435461e9461a573f8b1c12feb28cd29531586d392
ssdeep
768:wzM/RWjPPMXHTdWA+DKfBQqSMT8bmdwg5hN1ljdMZGU7UlNGD12SRfbaxI0z4aSz:wzMKUXHTdH8bmddkuA3Rjax7z4aSH

File size 56.8 KB ( 58128 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf

VirusTotal metadata
First submission 2019-01-10 20:32:02 UTC ( 1 month, 1 week ago )
Last submission 2019-02-07 21:45:07 UTC ( 1 week, 4 days ago )
File names 26
Yowai.x86
6@Yowai.x86
0
14
23
16
169
2267e1c25fe2961f4f375f6435461e9461a573f8b1c12feb28cd29531586d392
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!