× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6901fa633e615e05c358f8cafebe1f1485595f06fc605dec5ad46fa5c51a4799
File name: 3AvA
Detection ratio: 17 / 55
Analysis date: 2019-01-04 06:19:55 UTC ( 1 month, 2 weeks ago )
Antivirus Result Update
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.b 20181231
Avast ELF:Mirai-HU [Trj] 20181231
Avast-Mobile ELF:Mirai-ID [Trj] 20181230
AVG ELF:Mirai-HU [Trj] 20181231
DrWeb Linux.Mirai.60 20181231
ESET-NOD32 a variant of Linux/Mirai.AT 20181231
Fortinet ELF/Mirai.AT!tr 20181231
GData Linux.Trojan.Mirai.J 20181231
Jiangmin Backdoor.Linux.arzt 20181231
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20181231
McAfee Linux/mirai.d 20181231
McAfee-GW-Edition Linux/mirai.d 20181231
Symantec Linux.Mirai 20181230
Tencent Trojan.Linux.Mirai.bd 20190104
TrendMicro Possible_MIRAI.SMLBEM3 20181231
TrendMicro-HouseCall Possible_MIRAI.SMLBEM3 20181231
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20181231
Acronis 20181227
Ad-Aware 20181231
AegisLab 20181231
Alibaba 20180921
ALYac 20181231
Arcabit 20181231
Avira (no cloud) 20181230
Baidu 20181207
BitDefender 20181231
Bkav 20181227
CAT-QuickHeal 20181230
ClamAV 20181231
CMC 20181230
Comodo 20181231
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190104
Cyren 20181231
eGambit 20190104
Emsisoft 20181231
Endgame 20181108
F-Prot 20181231
F-Secure 20181231
Ikarus 20181230
Sophos ML 20181128
K7AntiVirus 20181231
K7GW 20181230
Kingsoft 20190104
MAX 20190104
Microsoft 20181230
eScan 20181231
NANO-Antivirus 20181231
Palo Alto Networks (Known Signatures) 20190104
Panda 20181230
Qihoo-360 20190104
Rising 20181231
SentinelOne (Static ML) 20181223
Sophos AV 20181231
SUPERAntiSpyware 20181226
TACHYON 20181231
TheHacker 20181230
TotalDefense 20181230
Trapmine 20181205
Trustlook 20190104
VBA32 20181229
VIPRE 20181231
ViRobot 20181231
Webroot 20190104
Yandex 20181229
Zillya 20181228
Zoner 20181231
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, big endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 12
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.sdata
.sbss
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Big endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
PowerPC

Execution parents
File identification
MD5 54abdded3f5ffc0e90e67f3e858aaa88
SHA1 29bbf3d1395187494fb61897dd5eacf6fb3a0a81
SHA256 6901fa633e615e05c358f8cafebe1f1485595f06fc605dec5ad46fa5c51a4799
ssdeep
768:/KfsbnHAt1ezbnAgCN7RkIV3fgB1TRNRR7Eg3tbv6VFssuWXwdy3q:k6HAt1ezbnAXZUBt33tbC/3Xw6q

File size 50.1 KB ( 51332 bytes )
File type ELF
Magic literal
ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-04 06:19:55 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-04 06:19:55 UTC ( 1 month, 2 weeks ago )
File names Josho.ppc
Josho.ppc
3AvA
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!