× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a1675097a50051d51f119395023bda89d476efd030c2cc075895617aa84e3900
File name: Tsunami(1).mpsl
Detection ratio: 7 / 57
Analysis date: 2018-12-30 09:48:14 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
DrWeb Linux.Mirai.14 20181230
ESET-NOD32 a variant of Linux/Mirai.L 20181230
Fortinet ELF/Mirai.BL!tr 20181230
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20181230
Symantec Linux.Mirai 20181229
Tencent Trojan.Linux.Mirai.ci 20181230
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20181230
Acronis 20181227
Ad-Aware 20181230
AegisLab 20181230
AhnLab-V3 20181229
Alibaba 20180921
ALYac 20181230
Antiy-AVL 20181230
Arcabit 20181230
Avast 20181230
Avast-Mobile 20181229
AVG 20181230
Avira (no cloud) 20181229
Babable 20180918
Baidu 20181207
BitDefender 20181230
Bkav 20181227
CAT-QuickHeal 20181229
ClamAV 20181230
CMC 20181229
Comodo 20181230
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181230
Cyren 20181230
eGambit 20181230
Emsisoft 20181230
Endgame 20181108
F-Prot 20181230
F-Secure 20181230
GData 20181230
Ikarus 20181229
Sophos ML 20181128
Jiangmin 20181230
K7AntiVirus 20181230
K7GW 20181230
Kingsoft 20181230
Malwarebytes 20181230
MAX 20181230
McAfee 20181230
McAfee-GW-Edition 20181230
Microsoft 20181230
eScan 20181230
NANO-Antivirus 20181230
Palo Alto Networks (Known Signatures) 20181230
Panda 20181229
Qihoo-360 20181230
Rising 20181230
SentinelOne (Static ML) 20181223
Sophos AV 20181230
SUPERAntiSpyware 20181226
Symantec Mobile Insight 20181225
TACHYON 20181230
TheHacker 20181230
Trapmine 20181205
TrendMicro 20181230
TrendMicro-HouseCall 20181230
Trustlook 20181230
VBA32 20181229
VIPRE 20181230
ViRobot 20181230
Webroot 20181230
Yandex 20181229
Zillya 20181228
Zoner 20181230
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 2
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

File identification
MD5 5fe4f9d3eeaf17450b5090669a5cdabe
SHA1 0761aab0517e0b874953d593d0ddef42ae2ef1f0
SHA256 a1675097a50051d51f119395023bda89d476efd030c2cc075895617aa84e3900
ssdeep
384:1UyZKDSoFKC1SbL3HQFbi96Ed13+ziDOmjgqxtCbJuAW/Jwv2bjJin66n1sBRWGZ:1UyZtn3v3B6RzdmjzKdu1RwIfIaWA

File size 24.2 KB ( 24772 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf upx via-tor

VirusTotal metadata
First submission 2018-12-30 09:48:14 UTC ( 3 months, 3 weeks ago )
Last submission 2019-02-14 08:05:28 UTC ( 2 months, 1 week ago )
File names 9
Tsunami(1).mpsl
Tsunami.mpsl
20
1
5fe4f9d3eeaf17450b5090669a5cdabe
8
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!