× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 634d048177a63f6bc9c99e17d844ec1cc6418340ac03db553f8b15de44cde737
File name: 3
Detection ratio: 15 / 56
Analysis date: 2019-01-17 23:00:37 UTC ( 2 months ago )
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen3 20190117
Avast ELF:Mirai-HU [Trj] 20190117
Avast-Mobile ELF:Mirai-ID [Trj] 20190117
AVG ELF:Mirai-HU [Trj] 20190117
DrWeb Linux.Mirai.60 20190117
ESET-NOD32 a variant of Linux/Mirai.AT 20190117
Fortinet ELF/Mirai.AT!tr 20190117
GData Linux.Trojan.Mirai.J 20190117
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190117
McAfee Linux/Mirai.g 20190117
McAfee-GW-Edition Linux/Mirai.g 20190117
Symantec Linux.Mirai 20190117
TrendMicro Possible_MIRAI.SMLBEM5 20190117
TrendMicro-HouseCall Possible_MIRAI.SMLBEM5 20190117
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190117
Acronis 20190117
Ad-Aware 20190117
AegisLab 20190117
Alibaba 20180921
ALYac 20190117
Antiy-AVL 20190117
Arcabit 20190117
Avira (no cloud) 20190117
Baidu 20190117
BitDefender 20190117
Bkav 20190117
CAT-QuickHeal 20190117
ClamAV 20190117
CMC 20190117
Comodo 20190117
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190118
Cyren 20190117
eGambit 20190118
Emsisoft 20190117
Endgame 20181108
F-Prot 20190117
F-Secure 20190117
Ikarus 20190117
Sophos ML 20181128
Jiangmin 20190117
K7AntiVirus 20190117
K7GW 20190117
Kingsoft 20190118
Malwarebytes 20190117
MAX 20190118
Microsoft 20190117
NANO-Antivirus 20190117
Palo Alto Networks (Known Signatures) 20190118
Panda 20190117
Qihoo-360 20190118
Rising 20190117
SentinelOne (Static ML) 20181223
Sophos AV 20190117
SUPERAntiSpyware 20190116
TACHYON 20190117
Tencent 20190118
TheHacker 20190115
TotalDefense 20190117
Trapmine 20190103
Trustlook 20190118
VBA32 20190117
VIPRE 20190117
ViRobot 20190117
Webroot 20190118
Yandex 20190117
Zillya 20190117
Zoner 20190117
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, big endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 12
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.sdata
.sbss
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Big endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
PowerPC

File identification
MD5 1494a19cf18ae3a06df0f4083e38bc51
SHA1 174802d9a4a62ad6985bb658c123dcb16d838d70
SHA256 634d048177a63f6bc9c99e17d844ec1cc6418340ac03db553f8b15de44cde737
ssdeep
1536:dOJCj11+npN63IAh7g4TKrIo3MADKGrgPEI1v:4pN63a4mrIo/+GCEIB

File size 55.7 KB ( 57064 bytes )
File type ELF
Magic literal
ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-17 22:40:18 UTC ( 2 months ago )
Last submission 2019-01-17 23:00:37 UTC ( 2 months ago )
File names 130
3
turbo.ppc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!