× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3374890dc5f75b2b515bd2d47a610a1d5873c5174ab7b6d9dd8d7b497ccc367e
File name: Yowai.sh4
Detection ratio: 21 / 59
Analysis date: 2019-01-11 07:43:12 UTC ( 1 month ago )
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen13 20190110
Avast ELF:Mirai-AAJ [Trj] 20190111
Avast-Mobile ELF:Mirai-UM [Trj] 20190110
AVG ELF:Mirai-AAJ [Trj] 20190111
Avira (no cloud) LINUX/Mirai.insag 20190110
Comodo Malware@#1nanrz65qxhpy 20190111
DrWeb Linux.Mirai.1659 20190111
ESET-NOD32 a variant of Linux/Mirai.L 20190111
Fortinet ELF/Mirai.OX!tr 20190111
GData Linux.Trojan.Agent.J32TD7 20190111
Ikarus Trojan.Linux.Mirai 20190110
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20190111
McAfee RDN/Generic.dx 20190111
NANO-Antivirus Trojan.Elf32.Mirai.flxiuz 20190111
Qihoo-360 Win32/Backdoor.6f4 20190111
Sophos AV Mal/Generic-S 20190111
Symantec Linux.Mirai 20190110
Tencent Linux.Backdoor.Mirai.Aotg 20190111
TrendMicro Possible_MIRAI.SMLBO13 20190111
TrendMicro-HouseCall Possible_MIRAI.SMLBO13 20190111
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20190111
Acronis 20190110
Ad-Aware 20190111
AegisLab 20190111
Alibaba 20180921
ALYac 20190111
Antiy-AVL 20190111
Arcabit 20190111
AVware 20180925
Babable 20180918
Baidu 20190110
BitDefender 20190111
Bkav 20190108
CAT-QuickHeal 20190110
ClamAV 20190110
CMC 20190110
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190111
Cyren 20190111
eGambit 20190111
Emsisoft 20190111
Endgame 20181108
F-Prot 20190111
F-Secure 20190111
Sophos ML 20181128
Jiangmin 20190111
K7AntiVirus 20190111
K7GW 20190111
Kingsoft 20190111
Malwarebytes 20190111
MAX 20190111
McAfee-GW-Edition 20190111
Microsoft 20190111
eScan 20190111
Palo Alto Networks (Known Signatures) 20190111
Panda 20190110
Rising 20190111
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190109
TACHYON 20190111
TheHacker 20190106
TotalDefense 20190111
Trapmine 20190103
Trustlook 20190111
VBA32 20190110
VIPRE 20190111
ViRobot 20190111
Webroot 20190111
Yandex 20190110
Zillya 20190110
Zoner 20190111
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 10
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
SuperH

Execution parents
File identification
MD5 eebcb7a8bdc2880902338747528c7b8e
SHA1 1ef2fe588fb4bb090e52354a1d3f76a719a19322
SHA256 3374890dc5f75b2b515bd2d47a610a1d5873c5174ab7b6d9dd8d7b497ccc367e
ssdeep
768:n/TONR9leF5XTkiaCQOoOnwi73fMrYnolgYRMT3A6ChoUBz8J4CaO/R:n/aR+v9aCZ7YEYRAA6xUyJ4CaO/

File size 53.8 KB ( 55060 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-10 03:33:59 UTC ( 1 month, 1 week ago )
Last submission 2019-01-11 07:43:12 UTC ( 1 month ago )
File names Yowai.sh4
Yowai.sh4
SSH
SSH
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!