× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: abc560dff04caf43b33b1561abb772f5963041c1db9b0a51f7285c9686c73e52
File name: guguru.mpsl
Detection ratio: 5 / 57
Analysis date: 2018-12-28 21:52:49 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
ESET-NOD32 a variant of Linux/Mirai.A 20181228
Fortinet ELF/Mirai.AE!tr 20181228
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20181228
Symantec Linux.Mirai 20181228
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20181228
Acronis 20181227
Ad-Aware 20181228
AegisLab 20181228
AhnLab-V3 20181228
Alibaba 20180921
ALYac 20181228
Antiy-AVL 20181228
Arcabit 20181228
Avast 20181228
Avast-Mobile 20181228
AVG 20181228
Avira (no cloud) 20181228
Babable 20180918
Baidu 20181207
BitDefender 20181228
Bkav 20181227
CAT-QuickHeal 20181228
ClamAV 20181228
CMC 20181228
Comodo 20181228
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181228
Cyren 20181228
DrWeb 20181228
eGambit 20181228
Emsisoft 20181228
Endgame 20181108
F-Prot 20181228
F-Secure 20181228
GData 20181228
Ikarus 20181228
Sophos ML 20181128
Jiangmin 20181228
K7AntiVirus 20181228
K7GW 20181228
Kingsoft 20181228
Malwarebytes 20181228
MAX 20181228
McAfee 20181228
McAfee-GW-Edition 20181228
Microsoft 20181228
eScan 20181228
NANO-Antivirus 20181228
Palo Alto Networks (Known Signatures) 20181228
Panda 20181228
Qihoo-360 20181228
Rising 20181228
SentinelOne (Static ML) 20181223
Sophos AV 20181228
SUPERAntiSpyware 20181226
Symantec Mobile Insight 20181225
TACHYON 20181228
Tencent 20181228
TheHacker 20181225
Trapmine 20181205
TrendMicro 20181228
TrendMicro-HouseCall 20181228
Trustlook 20181228
VBA32 20181228
VIPRE 20181227
ViRobot 20181228
Webroot 20181228
Yandex 20181227
Zillya 20181228
Zoner 20181228
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 2
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

File identification
MD5 be147462783d7d6c03ac39be19dcad2e
SHA1 8eb7cc2c88331849b30a3eafe15edb4dc9158d9b
SHA256 abc560dff04caf43b33b1561abb772f5963041c1db9b0a51f7285c9686c73e52
ssdeep
768:9th62FZdAXEPnGjep8PI6AREB8XCXL93ky3SniznmurWU+:bh9TyIG9ZB3ZMidT+

File size 39.2 KB ( 40092 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf upx via-tor

VirusTotal metadata
First submission 2018-12-28 21:52:49 UTC ( 3 months, 3 weeks ago )
Last submission 2019-01-19 05:34:14 UTC ( 3 months ago )
File names be147462783d7d6c03ac39be19dcad2e
guguru.mpsl
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!