× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 76e04557fa3c89dfc872444ad535fa0f85dc417238c0e707670db928adc0268e
File name: Josho.mpsl
Detection ratio: 19 / 57
Analysis date: 2019-01-13 06:03:58 UTC ( 4 months, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen3 20190112
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.b 20190113
Avast ELF:Mirai-HU [Trj] 20190113
Avast-Mobile ELF:Mirai-ID [Trj] 20190112
AVG ELF:Mirai-HU [Trj] 20190113
DrWeb Linux.Mirai.53 20190113
ESET-NOD32 a variant of Linux/Mirai.AT 20190112
Fortinet ELF/Mirai.B!tr 20190113
GData Linux.Trojan.Mirai.J 20190113
Jiangmin Backdoor.Linux.asgc 20190113
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190113
McAfee Linux/mirai.d 20190112
McAfee-GW-Edition Linux/mirai.d 20190112
Symantec Linux.Mirai 20190112
Tencent Trojan.Linux.Mirai.bd 20190113
TrendMicro Possible_MIRAI.SMLBEM2 20190112
TrendMicro-HouseCall Possible_MIRAI.SMLBEM2 20190113
Zillya Backdoor.Mirai.Linux.5789 20190111
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190113
Acronis 20190111
Ad-Aware 20190113
AegisLab 20190113
Alibaba 20180921
ALYac 20190113
Arcabit 20190113
Avira (no cloud) 20190112
Babable 20180918
Baidu 20190111
BitDefender 20190113
Bkav 20190108
CAT-QuickHeal 20190111
ClamAV 20190113
CMC 20190112
Comodo 20190113
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190113
Cyren 20190113
eGambit 20190113
Emsisoft 20190113
Endgame 20181108
F-Prot 20190113
F-Secure 20190111
Ikarus 20190112
Sophos ML 20181128
K7AntiVirus 20190113
K7GW 20190113
Kingsoft 20190113
Malwarebytes 20190113
MAX 20190113
Microsoft 20190112
eScan 20190112
NANO-Antivirus 20190112
Palo Alto Networks (Known Signatures) 20190113
Panda 20190112
Qihoo-360 20190113
Rising 20190112
SentinelOne (Static ML) 20181223
Sophos AV 20190112
SUPERAntiSpyware 20190109
TACHYON 20190112
TheHacker 20190106
TotalDefense 20190112
Trapmine 20190103
Trustlook 20190113
VBA32 20190111
ViRobot 20190113
Webroot 20190113
Yandex 20190111
Zoner 20190113
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 3
Section headers 13
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.got
.sbss
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

Execution parents
File identification
MD5 d9e2bc6e7fc64708d1e4000c2a8db7d6
SHA1 deae935e6f6a47c5cda6fd97207a70be8aac19c8
SHA256 76e04557fa3c89dfc872444ad535fa0f85dc417238c0e707670db928adc0268e
ssdeep
768:QxNCJ0EYlDYhHnrwqsFDwLX3U6ngBhN6PNUpGXS5SyeweVKe0n3oNWpkmPqXitMF:QxNCJBYlZFwwjhwPTXSNxIKzn6CpC

File size 69.9 KB ( 71528 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-13 06:01:58 UTC ( 4 months, 1 week ago )
Last submission 2019-01-21 22:20:46 UTC ( 4 months ago )
File names d9e2bc6e7fc64708d1e4000c2a8db7d6
Josho.mpsl
Josho.mpsl
76e04557fa3c89dfc872444ad535fa0f85dc417238c0e707670db928adc0268e
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!