× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 685924aab3214e0858e2b3d7b0517c0cc3457597e324e421535c67c5fa4ced3f
File name: 112
Detection ratio: 26 / 59
Analysis date: 2019-01-09 12:08:24 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Gafgyt.Gen28 20190108
Antiy-AVL Trojan[Backdoor]/Linux.Gafgyt.bj 20190109
Avast ELF:DDoS-S [Trj] 20190109
Avast-Mobile ELF:DDoS-S [Trj] 20190109
AVG ELF:DDoS-S [Trj] 20190109
Avira (no cloud) LINUX/Gafgyt.opnd 20190109
ClamAV Unix.Trojan.Gafgyt-6735651-0 20190109
DrWeb Linux.BackDoor.Fgt.209 20190109
ESET-NOD32 a variant of Linux/Gafgyt.ANR 20190109
Fortinet ELF/Gafgyt.BJ!tr 20190109
GData Linux.Trojan.Agent.GD4WZJ 20190109
Ikarus Trojan.Linux.Fgt 20190108
Jiangmin Backdoor.Linux.bmsd 20190109
Kaspersky HEUR:Backdoor.Linux.Gafgyt.bj 20190109
MAX malware (ai score=100) 20190109
McAfee Linux/Backdoor-gen.a 20190109
McAfee-GW-Edition Linux/Backdoor-gen.a 20190109
Microsoft DDoS:Linux/Lightaidra!rfn 20190109
NANO-Antivirus Trojan.ElfArm32.Gafgyt.flwccz 20190109
Qihoo-360 Win32/Backdoor.745 20190109
Rising Backdoor.Gafgyt!1.B562 (CLASSIC) 20190109
Symantec Linux.Lightaidra 20190109
Tencent Linux.Backdoor.Gafgyt.Duwi 20190109
TrendMicro Possible_BASHLITE.SMLBN1 20190109
TrendMicro-HouseCall Possible_BASHLITE.SMLBN1 20190109
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Gafgyt.bj 20190109
Acronis 20181227
Ad-Aware 20190109
AegisLab 20190109
Alibaba 20180921
ALYac 20190109
Arcabit 20190109
AVware 20180925
Babable 20180918
Baidu 20190109
BitDefender 20190109
Bkav 20190108
CAT-QuickHeal 20190108
CMC 20190108
Comodo 20190109
CrowdStrike Falcon (ML) 20181022
Cybereason 20190109
Cylance 20190109
Cyren 20190109
eGambit 20190109
Emsisoft 20190109
Endgame 20181108
F-Prot 20190109
F-Secure 20190109
Sophos ML 20181128
K7AntiVirus 20190109
K7GW 20190109
Kingsoft 20190109
Malwarebytes 20190109
eScan 20190109
Palo Alto Networks (Known Signatures) 20190109
Panda 20190108
SentinelOne (Static ML) 20181223
Sophos AV 20190109
SUPERAntiSpyware 20190102
TACHYON 20190109
TheHacker 20190106
TotalDefense 20190109
Trapmine 20190103
Trustlook 20190109
VBA32 20190108
VIPRE 20190108
ViRobot 20190109
Webroot 20190109
Yandex 20181229
Zillya 20190108
Zoner 20190109
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 4
Section headers 24
ELF sections
ELF Segments
.ARM.exidx
.init
.text
.fini
.rodata
.ARM.extab
.ARM.exidx
.eh_frame
.init_array
.fini_array
.jcr
.got
.data
.bss
Segment without sections
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

File identification
MD5 123c6a1c717a28d29442a9548ad01a8a
SHA1 c86f558c1d3fc3dd79505d5aa3cd63397c4cf560
SHA256 685924aab3214e0858e2b3d7b0517c0cc3457597e324e421535c67c5fa4ced3f
ssdeep
3072:wobRlbvYQAa4UEvGaGM68Fdf+m0QOW7Xm0a:zbRldAacGaGMtf+m0QOWLm0a

File size 105.5 KB ( 107995 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, not stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-08 08:37:21 UTC ( 1 month, 1 week ago )
Last submission 2019-01-28 21:08:36 UTC ( 3 weeks ago )
File names 27
112
Demon.arm6
183
284
123c6a1c717a28d29442a9548ad01a8a
39
165
258
76
49
685924aab3214e0858e2b3d7b0517c0cc3457597e324e421535c67c5fa4ced3f
30
86
96
355
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!