× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5a3ac1587608462e2470919f6e122ca59c90272a1d63601e737df602f5d3089f
File name: 49mips.AES.DDoS.MIPS
Detection ratio: 10 / 55
Analysis date: 2015-07-02 22:33:39 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Ddosagent 20150702
Avast ELF:MrBlack-L [Cryp] 20150702
AVG Linux/MrBlack.I 20150702
CAT-QuickHeal Linux.Roopre.c615 20150702
DrWeb Linux.Mrblack.8 20150702
ESET-NOD32 Linux/Dofloo.A 20150702
Ikarus Trojan.Linux.Dofloo 20150702
Jiangmin Backdoor/Linux.of 20150702
Kaspersky HEUR:Backdoor.Linux.Dofloo.d 20150702
Rising NORMAL:Trojan.Linux.Dofloo.d!1616141 20150702
Ad-Aware 20150702
AegisLab 20150702
Yandex 20150630
Alibaba 20150630
ALYac 20150702
Antiy-AVL 20150702
Arcabit 20150630
Avira (no cloud) 20150702
AVware 20150702
Baidu-International 20150702
BitDefender 20150702
Bkav 20150702
ByteHero 20150702
ClamAV 20150702
Comodo 20150702
Cyren 20150702
Emsisoft 20150702
F-Prot 20150702
F-Secure 20150702
Fortinet 20150702
GData 20150702
K7AntiVirus 20150702
K7GW 20150702
Kingsoft 20150702
Malwarebytes 20150702
McAfee 20150702
McAfee-GW-Edition 20150702
Microsoft 20150702
eScan 20150702
NANO-Antivirus 20150702
nProtect 20150702
Panda 20150702
Qihoo-360 20150702
Sophos AV 20150702
SUPERAntiSpyware 20150702
Symantec 20150702
Tencent 20150702
TheHacker 20150702
TrendMicro 20150702
TrendMicro-HouseCall 20150702
VBA32 20150702
VIPRE 20150702
ViRobot 20150702
Zillya 20150702
Zoner 20150702
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 2
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

File identification
MD5 ac93f826c3031859f4a71529794fe7f9
SHA1 9936958a23f85539fe26503fa9c2382c66ad2c3a
SHA256 5a3ac1587608462e2470919f6e122ca59c90272a1d63601e737df602f5d3089f
ssdeep
12288:RajQZk3KMqSurunllNRwRq+V4kRNJrVgsaPrh:ocBMpzNRwUeJr2Dh

File size 444.0 KB ( 454640 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf upx

VirusTotal metadata
First submission 2015-07-02 22:33:39 UTC ( 2 years, 4 months ago )
Last submission 2015-07-02 22:33:39 UTC ( 2 years, 4 months ago )
File names 49mips.AES.DDoS.MIPS
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!