× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 64cd19f1a3553b90268c9e5f830b981917291b946c0f90ca18724fd5d572e33a
File name: zbetcheckin_tracker_yakuza.sh4
Detection ratio: 17 / 56
Analysis date: 2018-12-31 07:10:24 UTC ( 3 months, 3 weeks ago )
Antivirus Result Update
Antiy-AVL Trojan[Backdoor]/Linux.Gafgyt.av 20181231
Avast ELF:Gafgyt-DZ [Trj] 20181231
Avast-Mobile ELF:Gafgyt-EA [Trj] 20181230
AVG ELF:Gafgyt-DZ [Trj] 20181231
DrWeb Linux.BackDoor.Fgt.199 20181231
ESET-NOD32 a variant of Linux/Gafgyt.AMV 20181231
Fortinet ELF/Gafgyt.WN!tr 20181231
GData Linux.Trojan.Gafgyt.B 20181231
Ikarus Trojan.Linux.Gafgyt 20181230
Jiangmin Backdoor.Linux.blvy 20181231
Kaspersky HEUR:Backdoor.Linux.Gafgyt.av 20181231
McAfee Linux/Gafgyt.h 20181231
McAfee-GW-Edition Linux/Gafgyt.h 20181231
Sophos AV Linux/DDoS-BI 20181231
TrendMicro Possible_GAFGYT.SMLBR4 20181231
TrendMicro-HouseCall Possible_GAFGYT.SMLBR4 20181231
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Gafgyt.av 20181231
Acronis 20181227
Ad-Aware 20181231
AegisLab 20181231
Alibaba 20180921
ALYac 20181231
Arcabit 20181231
Avira (no cloud) 20181230
Babable 20180918
Baidu 20181207
BitDefender 20181231
Bkav 20181227
CAT-QuickHeal 20181230
ClamAV 20181231
CMC 20181230
Comodo 20181231
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181231
Cyren 20181231
eGambit 20181231
Emsisoft 20181231
Endgame 20181108
F-Prot 20181231
F-Secure 20181231
Sophos ML 20181128
K7AntiVirus 20181231
K7GW 20181230
Kingsoft 20181231
Malwarebytes 20181231
MAX 20181231
Microsoft 20181230
eScan 20181231
NANO-Antivirus 20181231
Palo Alto Networks (Known Signatures) 20181231
Panda 20181230
Qihoo-360 20181231
Rising 20181231
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20181226
Symantec 20181230
Symantec Mobile Insight 20181225
TACHYON 20181231
Tencent 20181231
TheHacker 20181230
TotalDefense 20181230
Trapmine 20181205
Trustlook 20181231
VBA32 20181229
ViRobot 20181231
Webroot 20181231
Yandex 20181229
Zillya 20181228
Zoner 20181231
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 16
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.eh_frame
.ctors
.dtors
.jcr
.data
.got
.bss
Segment without sections
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
SuperH

File identification
MD5 1fdc566be7272fc870231b07dc22a082
SHA1 0f0ca722213015c60f50a4ff5f2917d32a535cbf
SHA256 64cd19f1a3553b90268c9e5f830b981917291b946c0f90ca18724fd5d572e33a
ssdeep
1536:PQhsk8EMoT8zY3KRxb3j1Bu1QkXmJxZXCX5h8lWI6saRMnhR090jUeQfXm:aRK86Rxbu1QTXy5h8lv4MhR090QeQfXm

File size 93.7 KB ( 95921 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, not stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2018-12-31 07:10:24 UTC ( 3 months, 3 weeks ago )
Last submission 2018-12-31 07:10:24 UTC ( 3 months, 3 weeks ago )
File names zbetcheckin_tracker_yakuza.sh4
yakuza.sh4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!