× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7713527d229830f7953f1eb707a2d9943796ca1729c3f6d09d07c6e4fcc3113c
File name: mips(1)
Detection ratio: 4 / 55
Analysis date: 2019-01-11 13:28:36 UTC ( 1 month, 1 week ago )
Antivirus Result Update
ESET-NOD32 a variant of Linux/Mirai.BC 20190111
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190111
Sophos AV Linux/DDoS-CIA 20190111
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190111
Acronis 20190110
Ad-Aware 20190111
AegisLab 20190111
AhnLab-V3 20190111
Alibaba 20180921
ALYac 20190111
Antiy-AVL 20190111
Arcabit 20190111
Avast 20190111
Avast-Mobile 20190111
AVG 20190111
Avira (no cloud) 20190111
Baidu 20190111
BitDefender 20190111
Bkav 20190108
CAT-QuickHeal 20190110
ClamAV 20190111
CMC 20190110
Comodo 20190111
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190111
Cyren 20190111
DrWeb 20190111
eGambit 20190111
Emsisoft 20190111
Endgame 20181108
F-Prot 20190111
F-Secure 20190111
Fortinet 20190111
GData 20190111
Ikarus 20190111
Sophos ML 20181128
Jiangmin 20190111
K7AntiVirus 20190111
K7GW 20190111
Kingsoft 20190111
Malwarebytes 20190111
MAX 20190111
McAfee 20190111
McAfee-GW-Edition 20190111
Microsoft 20190111
eScan 20190111
NANO-Antivirus 20190111
Palo Alto Networks (Known Signatures) 20190111
Panda 20190111
Qihoo-360 20190111
Rising 20190111
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190109
Symantec 20190111
TACHYON 20190111
Tencent 20190111
TheHacker 20190106
Trapmine 20190103
TrendMicro 20190111
TrendMicro-HouseCall 20190111
Trustlook 20190111
VBA32 20190110
ViRobot 20190111
Webroot 20190111
Yandex 20190110
Zillya 20190110
Zoner 20190111
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, big endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 2
Section headers 0
ELF Segments
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Big endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

File identification
MD5 c019a5627e967d6a6e925db7003f097c
SHA1 fd202e80692537c6fa5f5744821d50336cea6927
SHA256 7713527d229830f7953f1eb707a2d9943796ca1729c3f6d09d07c6e4fcc3113c
ssdeep
768:AAjP8f0jXXpcG+ArgcTPCG4jdJgGlzDpCZDl7F5Q0a:McDXpcnUgcTCL3Vk7F5Qn

File size 33.1 KB ( 33900 bytes )
File type ELF
Magic literal
ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf via-tor

VirusTotal metadata
First submission 2019-01-11 13:28:36 UTC ( 1 month, 1 week ago )
Last submission 2019-01-11 13:28:36 UTC ( 1 month, 1 week ago )
File names mips
mips(1)
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!