× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7bb8e51de91d34529849a753b35a3550c7f467b37a10e99e4bb5bd5aee31551a
File name: 92
Detection ratio: 10 / 56
Analysis date: 2019-01-03 20:49:38 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
AegisLab Trojan.Linux.Mirai.4!c 20181231
DrWeb Linux.Mirai.919 20181231
ESET-NOD32 a variant of Linux/Mirai.BZ 20181231
Fortinet ELF/Mirai.IA!tr 20181231
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20181231
Qihoo-360 Win32/Backdoor.6f4 20190103
Sophos AV Mal/Generic-S 20181231
Symantec Linux.Mirai 20181230
Tencent Trojan.Linux.Mirai.ci 20190103
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20181231
Acronis 20181227
Ad-Aware 20181231
Alibaba 20180921
ALYac 20181231
Antiy-AVL 20181231
Arcabit 20181231
Avast 20181231
Avast-Mobile 20181230
AVG 20181231
Avira (no cloud) 20181230
Babable 20180918
Baidu 20181207
BitDefender 20181231
Bkav 20181227
CAT-QuickHeal 20181230
ClamAV 20181231
CMC 20181230
Comodo 20181231
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190103
Cyren 20181231
eGambit 20190103
Emsisoft 20181231
Endgame 20181108
F-Prot 20181231
F-Secure 20181231
GData 20181231
Ikarus 20181230
Sophos ML 20181128
Jiangmin 20181231
K7AntiVirus 20181231
K7GW 20181230
Kingsoft 20190103
MAX 20190103
McAfee 20181231
McAfee-GW-Edition 20181231
Microsoft 20181230
eScan 20181231
NANO-Antivirus 20181231
Palo Alto Networks (Known Signatures) 20190103
Panda 20181230
Rising 20181231
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20181226
TACHYON 20181231
TheHacker 20181230
TotalDefense 20181230
Trapmine 20181205
TrendMicro 20181231
TrendMicro-HouseCall 20181231
Trustlook 20190103
VBA32 20181229
VIPRE 20181231
ViRobot 20181231
Webroot 20190103
Yandex 20181229
Zillya 20181228
Zoner 20181231
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI ARM
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 3
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

Execution parents
File identification
MD5 c764b045c487e2e9ecab043abb4bc27b
SHA1 514fe5f40e3ed90784f601026775b8ae68049331
SHA256 7bb8e51de91d34529849a753b35a3550c7f467b37a10e99e4bb5bd5aee31551a
ssdeep
384:nLUoHN3IV50u7/htIev1Q1D8JlxW1kTI+Z7kAKhymdGUop5hKA:nLUoHN3/u7pxdeD8J06jkds3UozYA

File size 19.2 KB ( 19652 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1, statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf upx

VirusTotal metadata
First submission 2018-12-31 10:41:34 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-14 08:51:02 UTC ( 4 days, 3 hours ago )
File names c764b045c487e2e9ecab043abb4bc27b
388
132
0
6
2
Tsunami.arm5
10
7bb8e51de91d34529849a753b35a3550c7f467b37a10e99e4bb5bd5aee31551a
14
44
8
29
Tsunami.arm5
21
92
22
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!