× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2e66ee1b4414fe2fb17da4372c43a826dd7767c189120eafd427773769302e35
File name: 11@Yowai.x86
Detection ratio: 10 / 59
Analysis date: 2019-01-14 20:32:09 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen13 20190114
Avast ELF:Mirai-OA [Trj] 20190114
Avast-Mobile ELF:Mirai-UM [Trj] 20190114
AVG ELF:Mirai-OA [Trj] 20190114
DrWeb Linux.Mirai.754 20190114
ESET-NOD32 a variant of Linux/Mirai.L 20190114
Fortinet ELF/Mirai.AE!tr 20190114
Kaspersky HEUR:Backdoor.Linux.Mirai.ad 20190114
SentinelOne (Static ML) static engine - malicious 20181223
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ad 20190114
Acronis 20190111
Ad-Aware 20190114
AegisLab 20190114
Alibaba 20180921
ALYac 20190114
Antiy-AVL 20190114
Arcabit 20190114
Avira (no cloud) 20190114
Babable 20180918
Baidu 20190114
BitDefender 20190114
Bkav 20190108
CAT-QuickHeal 20190114
ClamAV 20190114
CMC 20190114
Comodo 20190114
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190114
Cyren 20190114
eGambit 20190114
Emsisoft 20190114
Endgame 20181108
F-Prot 20190114
F-Secure 20190114
GData 20190114
Ikarus 20190114
Sophos ML 20181128
Jiangmin 20190114
K7AntiVirus 20190114
K7GW 20190114
Kingsoft 20190114
Malwarebytes 20190114
MAX 20190114
McAfee 20190114
McAfee-GW-Edition 20190114
Microsoft 20190114
eScan 20190114
NANO-Antivirus 20190114
Palo Alto Networks (Known Signatures) 20190114
Panda 20190113
Qihoo-360 20190114
Rising 20190114
Sophos AV 20190114
SUPERAntiSpyware 20190109
Symantec 20190114
TACHYON 20190114
Tencent 20190114
TheHacker 20190113
TotalDefense 20190114
Trapmine 20190103
TrendMicro 20190114
TrendMicro-HouseCall 20190114
Trustlook 20190114
VBA32 20190114
VIPRE 20190114
ViRobot 20190114
Webroot 20190114
Yandex 20190111
Zillya 20190111
Zoner 20190114
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 3
Section headers 10
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

File identification
MD5 b7f97cc7dcd273019028348a79c1a17c
SHA1 69cbc55b210a06d370186847085804cd3fb8980b
SHA256 2e66ee1b4414fe2fb17da4372c43a826dd7767c189120eafd427773769302e35
ssdeep
1536:T2yjojEzjUxNfHgsR4bUCZcNHMQsBk4ZU:CnjEXUxNYsR4bUWcNs72

File size 80.9 KB ( 82800 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf

VirusTotal metadata
First submission 2019-01-14 20:32:09 UTC ( 1 month, 1 week ago )
Last submission 2019-02-07 21:43:10 UTC ( 2 weeks ago )
File names 83
2e66ee1b4414fe2fb17da4372c43a826dd7767c189120eafd427773769302e35
b7f97cc7dcd273019028348a79c1a17c
11@Yowai.x86
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!