× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4a26a64c75ee486a09ff768c3c50c571c2d1db19373d1f7b876d32dbf7fe89e9
File name: L24_36000.BillGates
Detection ratio: 11 / 55
Analysis date: 2014-09-19 13:17:16 UTC ( 4 years, 6 months ago ) View latest
Antivirus Result Update
Avast ELF:Elknot-AS [Trj] 20140919
ClamAV Unix.Trojan.Elknot 20140918
DrWeb Linux.BackDoor.Gates.7 20140919
ESET-NOD32 Linux/Agent.I 20140919
Fortinet ELF/Ganiw.A!tr 20140919
Ikarus Linux.Trojan.Agent 20140919
Jiangmin Backdoor/Linux.kh 20140918
Kaspersky Backdoor.Linux.Ganiw.a 20140919
Qihoo-360 virus.elf.rootkit.f 20140919
Sophos AV Linux/DDoS-BD 20140919
Symantec Trojan.Chikdos.B!gen2 20140919
Ad-Aware 20140919
AegisLab 20140919
Yandex 20140918
AhnLab-V3 20140919
Antiy-AVL 20140919
AVG 20140919
Avira (no cloud) 20140919
AVware 20140919
Baidu-International 20140919
BitDefender 20140919
Bkav 20140919
ByteHero 20140919
CAT-QuickHeal 20140919
CMC 20140918
Comodo 20140919
Cyren 20140919
Emsisoft 20140919
F-Prot 20140919
F-Secure 20140919
GData 20140919
K7AntiVirus 20140919
K7GW 20140919
Kingsoft 20140919
Malwarebytes 20140919
McAfee 20140919
McAfee-GW-Edition 20140919
Microsoft 20140919
eScan 20140919
NANO-Antivirus 20140919
Norman 20140919
nProtect 20140919
Panda 20140919
Rising 20140919
SUPERAntiSpyware 20140919
Tencent 20140919
TheHacker 20140917
TotalDefense 20140918
TrendMicro 20140919
TrendMicro-HouseCall 20140919
VBA32 20140919
VIPRE 20140919
ViRobot 20140919
Zillya 20140919
Zoner 20140919
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 3
Section headers 31
ELF sections
ELF Segments
.init
.text
__libc_freeres_fn
__libc_thread_freeres_fn
.fini
.rodata
__libc_subfreeres
__libc_atexit
__libc_thread_subfreeres
.eh_frame
.gcc_except_table
.note.ABI-tag
.data
.ctors
.dtors
.jcr
.got
.bss
__libc_freeres_ptrs
.note.ABI-tag
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

File identification
MD5 572217d2f0e5216c4a9d1dcf6e9ed939
SHA1 376a583a25d604153054cf4612c977870ec0cb98
SHA256 4a26a64c75ee486a09ff768c3c50c571c2d1db19373d1f7b876d32dbf7fe89e9
ssdeep
24576:2SI+pOxCSVgBlhIhQTm9ND8qChJGIxmhC926trIjUYxUq8oypdM4GJXVQGEL8wQz:HUMl3Tm9ND8VhJ0CM6tr6UYxtd8M4GJH

File size 1.5 MB ( 1539205 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.2.5, not stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf

VirusTotal metadata
First submission 2014-09-19 13:17:16 UTC ( 4 years, 6 months ago )
Last submission 2018-10-09 16:42:57 UTC ( 5 months, 2 weeks ago )
File names 572217d2f0e5216c4a9d1dcf6e9ed939
376a583a25d604153054cf4612c977870ec0cb98_L24_36000
L24_36000.BillGates
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!