× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5b1a44f74aa818db6d9b5256183df6c649fb5f262b4548baae6e622a38f6b0ab
File name: tty0.loonysquad.elf.mmd
Detection ratio: 7 / 54
Analysis date: 2016-02-13 21:33:23 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
AegisLab Backdoor.Linux.Tsunami!c 20160213
AVG Linux/Tsunami.CY 20160213
ESET-NOD32 Linux/Tsunami.NGH 20160213
Fortinet PossibleThreat.P0 20160213
Kaspersky HEUR:Backdoor.Linux.Tsunami.bj 20160213
Qihoo-360 Win32/Backdoor.ce6 20160213
Sophos AV Mal/Generic-S 20160213
Ad-Aware 20160213
Yandex 20160213
AhnLab-V3 20160213
Alibaba 20160204
ALYac 20160213
Antiy-AVL 20160211
Arcabit 20160213
Avast 20160213
Avira (no cloud) 20160213
Baidu-International 20160213
BitDefender 20160213
Bkav 20160204
ByteHero 20160213
CAT-QuickHeal 20160213
ClamAV 20160213
CMC 20160205
Comodo 20160213
Cyren 20160213
DrWeb 20160213
Emsisoft 20160213
F-Prot 20160213
F-Secure 20160213
GData 20160213
Ikarus 20160213
Jiangmin 20160213
K7AntiVirus 20160213
K7GW 20160213
Malwarebytes 20160213
McAfee 20160213
McAfee-GW-Edition 20160213
Microsoft 20160213
eScan 20160213
NANO-Antivirus 20160213
nProtect 20160212
Panda 20160213
Rising 20160213
SUPERAntiSpyware 20160213
Symantec 20160213
Tencent 20160213
TheHacker 20160213
TrendMicro 20160213
TrendMicro-HouseCall 20160213
VBA32 20160212
VIPRE 20160213
ViRobot 20160213
Zillya 20160213
Zoner 20160213
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 2
Section headers 0
ELF Segments
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

File identification
MD5 03db579ac3a28c5acac2253ebc24d3f2
SHA1 af59b026153d50965be45d874d40fd8386c591fd
SHA256 5b1a44f74aa818db6d9b5256183df6c649fb5f262b4548baae6e622a38f6b0ab
ssdeep
768:qmsYl9ck/3X/RAYhjsXMD4YpVL+V3PqYWZ7BmnIMW:3sAck/H/SYhjx4YpA3PqbdmIMW

File size 37.9 KB ( 38856 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf via-tor

VirusTotal metadata
First submission 2016-02-11 09:26:25 UTC ( 2 years, 10 months ago )
Last submission 2016-02-24 16:52:05 UTC ( 2 years, 9 months ago )
File names tty0.loonysquad.elf.mmd
af59b026153d50965be45d874d40fd8386c591fd_tty0
tty0
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!