× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 334d63f7910fa67b562a7be6eb23998bdb37b2b9cc174122fdd6f7c2b05ef24b
File name: Josho.sh4
Detection ratio: 16 / 55
Analysis date: 2019-02-02 10:49:34 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen3 20190202
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.b 20190202
Avast-Mobile ELF:Mirai-ID [Trj] 20190202
DrWeb Linux.Mirai.19 20190202
ESET-NOD32 a variant of Linux/Mirai.AT 20190202
Fortinet ELF/Mirai.AT!tr 20190201
GData Linux.Trojan.Mirai.J 20190202
Jiangmin Backdoor.Linux.aurj 20190202
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190202
McAfee Linux/mirai.d 20190202
McAfee-GW-Edition Linux/mirai.d 20190201
Symantec Linux.Mirai 20190202
Tencent Trojan.Linux.Mirai.bd 20190202
TrendMicro Possible_MIRAI.SMLBEM1 20190202
TrendMicro-HouseCall Possible_MIRAI.SMLBEM1 20190202
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190202
Acronis 20190130
Ad-Aware 20190202
AegisLab 20190202
Alibaba 20180921
ALYac 20190202
Arcabit 20190202
Avira (no cloud) 20190202
Baidu 20190202
BitDefender 20190202
Bkav 20190201
CAT-QuickHeal 20190202
ClamAV 20190201
CMC 20190202
Comodo 20190202
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190202
Cyren 20190202
eGambit 20190202
Emsisoft 20190202
Endgame 20181108
F-Prot 20190202
F-Secure 20190202
Ikarus 20190202
Sophos ML 20181128
K7AntiVirus 20190202
K7GW 20190202
Kingsoft 20190202
Malwarebytes 20190202
MAX 20190202
Microsoft 20190202
eScan 20190202
NANO-Antivirus 20190202
Palo Alto Networks (Known Signatures) 20190202
Panda 20190202
Qihoo-360 20190202
Rising 20190202
SentinelOne (Static ML) 20190124
Sophos AV 20190202
SUPERAntiSpyware 20190130
TACHYON 20190202
TheHacker 20190131
TotalDefense 20190202
Trapmine 20190123
Trustlook 20190202
VBA32 20190201
VIPRE 20190201
ViRobot 20190201
Webroot 20190202
Yandex 20190201
Zillya 20190201
Zoner 20190202
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 10
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
SuperH

File identification
MD5 dab346b9b3e6c71dfe1d8ce8c5ddf3ce
SHA1 a205142f11e140d4776b2e3916ea45bd5ae0670b
SHA256 334d63f7910fa67b562a7be6eb23998bdb37b2b9cc174122fdd6f7c2b05ef24b
ssdeep
1536:5aR5ewtQZut8GdcPs3q/aKlMLEm0DOFCn:5k5eDM2P+qiK60CF

File size 50.1 KB ( 51336 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-02-02 10:49:34 UTC ( 2 months, 2 weeks ago )
Last submission 2019-02-02 10:49:34 UTC ( 2 months, 2 weeks ago )
File names Josho.sh4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!