× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 552f428d13c34068c6251d527929a5e9db466b4974da3ba01922bab611d80027
File name: local.sh
Detection ratio: 0 / 55
Analysis date: 2014-09-20 15:13:17 UTC ( 4 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20140920
AegisLab 20140920
Yandex 20140920
AhnLab-V3 20140920
Antiy-AVL 20140920
Avast 20140920
AVG 20140920
Avira (no cloud) 20140920
AVware 20140920
Baidu-International 20140920
BitDefender 20140920
Bkav 20140920
ByteHero 20140920
CAT-QuickHeal 20140920
ClamAV 20140920
CMC 20140918
Comodo 20140920
Cyren 20140920
DrWeb 20140920
Emsisoft 20140920
ESET-NOD32 20140919
F-Prot 20140920
F-Secure 20140920
Fortinet 20140920
GData 20140920
Ikarus 20140920
Jiangmin 20140919
K7AntiVirus 20140919
K7GW 20140919
Kaspersky 20140920
Kingsoft 20140920
Malwarebytes 20140920
McAfee 20140920
McAfee-GW-Edition 20140920
Microsoft 20140920
eScan 20140920
NANO-Antivirus 20140920
Norman 20140920
nProtect 20140919
Panda 20140919
Qihoo-360 20140920
Rising 20140920
Sophos AV 20140920
SUPERAntiSpyware 20140920
Symantec 20140920
Tencent 20140920
TheHacker 20140919
TotalDefense 20140920
TrendMicro 20140920
TrendMicro-HouseCall 20140920
VBA32 20140919
VIPRE 20140920
ViRobot 20140920
Zillya 20140919
Zoner 20140919
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Advanced Micro Devices X86-64 machines.
ELF Header
Class ELF64
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Advanced Micro Devices X86-64
Object file version 0x1
Program headers 8
Section headers 27
ELF sections
ELF Segments
Segment without sections
.interp
.interp
.note.ABI-tag
.gnu.hash
.dynsym
.dynstr
.gnu.version
.gnu.version_r
.rela.dyn
.rela.plt
.init
.plt
.text
.fini
.rodata
.eh_frame_hdr
.eh_frame
.ctors
.dtors
.jcr
.dynamic
.got
.got.plt
.data
.bss
.dynamic
.note.ABI-tag
.eh_frame_hdr
Segment without sections
Shared libraries
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
64 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
AMD x86-64

Compressed bundles
File identification
MD5 c36625389cb4739518472de4298536fb
SHA1 3145c9bc797ec3f7842a6318e07478b1078df330
SHA256 552f428d13c34068c6251d527929a5e9db466b4974da3ba01922bab611d80027
ssdeep
192:G7QcAn1dyEFWtGDkKSCfRsO1a0EYR4Iqx:J7n3oGCjY

File size 12.2 KB ( 12488 bytes )
File type ELF
Magic literal
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.9, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
64bits elf

VirusTotal metadata
First submission 2014-09-20 15:13:17 UTC ( 4 years, 8 months ago )
Last submission 2018-10-09 17:30:01 UTC ( 7 months, 2 weeks ago )
File names rVkcbpoi.html
0CMk.zip
local.sh
C36625389CB4739518472DE4298536FB
c36625389cb4739518472de4298536fb.exe
VirusShare_c36625389cb4739518472de4298536fb
VirusShare_c36625389cb4739518472de4298536fb
c36625389cb4739518472de4298536fb
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!