× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5174882a3ede405e98d6f7605d7d4716436fdd593015928ef890e415a33a9904
File name: 16
Detection ratio: 6 / 58
Analysis date: 2019-02-10 00:00:13 UTC ( 3 months, 2 weeks ago ) View latest
Antivirus Result Update
DrWeb Linux.Mirai.2052 20190210
ESET-NOD32 a variant of Linux/Mirai.BR 20190209
Fortinet ELF/Mirai.AE!tr 20190209
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20190209
SentinelOne (Static ML) static engine - malicious 20190203
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20190209
Acronis 20190208
Ad-Aware 20190210
AegisLab 20190209
AhnLab-V3 20190209
Alibaba 20180921
ALYac 20190210
Antiy-AVL 20190209
Arcabit 20190208
Avast 20190209
Avast-Mobile 20190209
AVG 20190209
Avira (no cloud) 20190210
Babable 20180918
Baidu 20190202
BitDefender 20190209
Bkav 20190201
CAT-QuickHeal 20190209
ClamAV 20190209
CMC 20190209
Comodo 20190209
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190210
Cyren 20190209
eGambit 20190210
Emsisoft 20190210
Endgame 20181108
F-Prot 20190209
F-Secure 20190209
GData 20190209
Ikarus 20190209
Sophos ML 20181128
Jiangmin 20190209
K7AntiVirus 20190209
K7GW 20190209
Kingsoft 20190210
Malwarebytes 20190209
MAX 20190210
McAfee 20190209
McAfee-GW-Edition 20190209
Microsoft 20190209
eScan 20190209
NANO-Antivirus 20190209
Palo Alto Networks (Known Signatures) 20190210
Panda 20190209
Qihoo-360 20190210
Rising 20190209
Sophos AV 20190209
SUPERAntiSpyware 20190206
Symantec 20190209
Symantec Mobile Insight 20190207
TACHYON 20190209
Tencent 20190210
TheHacker 20190203
TotalDefense 20190206
Trapmine 20190123
TrendMicro 20190209
TrendMicro-HouseCall 20190209
Trustlook 20190210
VBA32 20190208
ViRobot 20190209
Webroot 20190210
Yandex 20190208
Zillya 20190208
Zoner 20190210
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - Linux
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 2
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

File identification
MD5 698f2a706051fd9264014d6f16cd41d5
SHA1 b0605a811a0f336b6af0161ba82968a8d0f80b40
SHA256 5174882a3ede405e98d6f7605d7d4716436fdd593015928ef890e415a33a9904
ssdeep
768:+KSSJ1mPDQr0ZZYSwEAGojVBCGtWAxnbcuyD7UvccpB8:TSSbjPEbIJtWAxnouy8vccpB8

File size 28.7 KB ( 29372 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf upx

VirusTotal metadata
First submission 2019-02-09 23:31:46 UTC ( 3 months, 2 weeks ago )
Last submission 2019-02-10 18:18:32 UTC ( 3 months, 2 weeks ago )
File names 27
16
rift.x86
153
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!