× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5bdad60418c08a69b94c976e244c7ba42c14cd7630743c9552f00f5bd983a3eb
File name: 5BDAD60418C08A69B94C976E244C7BA42C14CD7630743C9552F00F5BD983A3EB
Detection ratio: 18 / 58
Analysis date: 2019-01-09 01:02:37 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen3 20190108
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.ba 20190108
Avast ELF:Mirai-HU [Trj] 20190108
Avast-Mobile ELF:Mirai-ID [Trj] 20190108
AVG ELF:Mirai-HU [Trj] 20190108
DrWeb Linux.Mirai.19 20190108
ESET-NOD32 a variant of Linux/Mirai.AT 20190109
Fortinet ELF/Mirai.AT!tr 20190108
GData Linux.Trojan.Mirai.J 20190108
Jiangmin Backdoor.Linux.ccff 20190108
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190108
McAfee Linux/mirai.d 20190109
McAfee-GW-Edition Linux/mirai.d 20190109
Symantec Linux.Mirai 20190109
Tencent Backdoor.Linux.Mirai.vu 20190109
TrendMicro Possible_MIRAI.SMLBEM1 20190109
TrendMicro-HouseCall Possible_MIRAI.SMLBEM1 20190108
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190108
Acronis 20181227
Ad-Aware 20190108
AegisLab 20190108
Alibaba 20180921
ALYac 20190108
Arcabit 20190108
Avira (no cloud) 20190108
Babable 20180918
Baidu 20190108
BitDefender 20190108
Bkav 20190108
CAT-QuickHeal 20190108
ClamAV 20190108
CMC 20190108
Comodo 20190108
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190109
Cyren 20190108
eGambit 20190109
Emsisoft 20190108
Endgame 20181108
F-Prot 20190108
F-Secure 20190108
Ikarus 20190108
Sophos ML 20181128
K7AntiVirus 20190108
K7GW 20190108
Kingsoft 20190109
Malwarebytes 20190108
MAX 20190109
Microsoft 20190109
eScan 20190109
NANO-Antivirus 20190109
Palo Alto Networks (Known Signatures) 20190109
Panda 20190108
Qihoo-360 20190109
Rising 20190109
SentinelOne (Static ML) 20181223
Sophos AV 20190108
SUPERAntiSpyware 20190102
TACHYON 20190109
TheHacker 20190106
TotalDefense 20190108
Trapmine 20190103
Trustlook 20190109
VBA32 20190108
VIPRE 20190108
ViRobot 20190108
Webroot 20190109
Yandex 20181229
Zillya 20190108
Zoner 20190108
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 10
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
SuperH

Execution parents
File identification
MD5 5e0332d7baba4f372f7f9e6862e7e674
SHA1 2eef9c96d79ec27009dedc15777a4b07e6845b8b
SHA256 5bdad60418c08a69b94c976e244c7ba42c14cd7630743c9552f00f5bd983a3eb
ssdeep
768:caSpNwt3mAoj87UoezeC6m9grMemX18/qYCQYFojeQCv:caANwt2mBrMemXa/qYMKyQCv

File size 43.3 KB ( 44288 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-09 01:02:24 UTC ( 1 month, 1 week ago )
Last submission 2019-01-12 04:32:42 UTC ( 1 month ago )
File names hoho.sh4
5bdad60418c08a69b94c976e244c7ba42c14cd7630743c9552f00f5bd983a3eb
hoho.sh4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!