× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 687b6663ae5186e2550cc8406a7c38016a526a2a4751eef9c460970f83c001ef
File name: 10d9c298fe0768703b7822f6638a55c8e2a144ee
Detection ratio: 12 / 59
Analysis date: 2019-01-04 08:42:10 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Avast ELF:Mirai-KK [Trj] 20190104
Avast-Mobile ELF:Mirai-UM [Trj] 20190103
AVG ELF:Mirai-KK [Trj] 20190104
ESET-NOD32 a variant of Linux/Mirai.L 20190104
Fortinet ELF/Mirai.AE!tr 20190104
GData Linux.Trojan.Mirai.D 20190104
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20190104
McAfee Linux/Mirai.l 20190104
McAfee-GW-Edition Linux/Mirai.l 20190104
Sophos AV Mal/Generic-S 20190104
Symantec Linux.Mirai 20190104
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20190104
Acronis 20181227
Ad-Aware 20190104
AegisLab 20190104
AhnLab-V3 20190104
Alibaba 20180921
ALYac 20190104
Antiy-AVL 20190104
Arcabit 20190104
Avira (no cloud) 20190104
AVware 20180925
Babable 20180918
Baidu 20190104
BitDefender 20190104
Bkav 20190103
CAT-QuickHeal 20190103
ClamAV 20190104
CMC 20190103
Comodo 20190104
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190104
Cyren 20190104
DrWeb 20190104
eGambit 20190104
Emsisoft 20190104
Endgame 20181108
F-Prot 20190104
F-Secure 20190104
Ikarus 20190104
Sophos ML 20181128
Jiangmin 20190104
K7AntiVirus 20190104
K7GW 20190104
Kingsoft 20190104
Malwarebytes 20190104
MAX 20190104
Microsoft 20190104
eScan 20190104
NANO-Antivirus 20190104
Palo Alto Networks (Known Signatures) 20190104
Panda 20190103
Qihoo-360 20190104
Rising 20190104
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190102
TACHYON 20190104
Tencent 20190104
TheHacker 20181230
TotalDefense 20190103
Trapmine 20190103
TrendMicro 20190104
TrendMicro-HouseCall 20190104
Trustlook 20190104
VBA32 20181229
VIPRE 20190103
ViRobot 20190103
Webroot 20190104
Yandex 20181229
Zillya 20190103
Zoner 20190104
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 10
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
SuperH

File identification
MD5 f1efff91987ce8653416b345895064d6
SHA1 10d9c298fe0768703b7822f6638a55c8e2a144ee
SHA256 687b6663ae5186e2550cc8406a7c38016a526a2a4751eef9c460970f83c001ef
ssdeep
1536:o9JbILaPXPJ0nFBulKqxIcyXd2wCZ3g9yisX7A4KSNSAXKJRklCYieq:o/ILaP/J0nrulKqxIc0DgisXE4KSgAXv

File size 89.6 KB ( 91744 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-04 08:42:10 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-14 08:49:44 UTC ( 1 week, 1 day ago )
File names Solstice.sh4
f1efff91987ce8653416b345895064d6
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!