× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ae3a55464de5bde35ed1527b95f5d20ed76700a44b88090f1a7cab10580d804c
File name: zbetcheckin_tracker_yakuza.arm6
Detection ratio: 21 / 58
Analysis date: 2018-12-30 07:04:24 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Gafgyt.Gen25 20181229
Antiy-AVL Trojan[Backdoor]/Linux.Gafgyt.av 20181230
Avast ELF:Gafgyt-FH [Trj] 20181230
Avast-Mobile ELF:Gafgyt-FH [Trj] 20181229
AVG ELF:Gafgyt-FH [Trj] 20181230
Avira (no cloud) LINUX/Gafgyt.opnd 20181229
DrWeb Linux.BackDoor.Fgt.309 20181230
ESET-NOD32 a variant of Linux/Gafgyt.AMV 20181230
Fortinet ELF/Gafgyt.WN!tr 20181230
GData Linux.Trojan.Gafgyt.B 20181230
Ikarus Trojan.Linux.Fgt 20181229
Jiangmin Backdoor.Linux.bhle 20181230
Kaspersky HEUR:Backdoor.Linux.Gafgyt.av 20181229
McAfee Linux/Gafgyt.h 20181230
McAfee-GW-Edition Linux/Gafgyt.h 20181230
Microsoft DDoS:Linux/Lightaidra!rfn 20181230
Sophos AV Linux/DDoS-BI 20181230
TrendMicro Possible_GAFGYT.SMLBR4 20181230
TrendMicro-HouseCall Possible_GAFGYT.SMLBR4 20181230
Zillya Backdoor.Gafgyt.Linux.31485 20181228
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Gafgyt.av 20181230
Acronis 20181227
Ad-Aware 20181230
AegisLab 20181230
Alibaba 20180921
ALYac 20181230
Arcabit 20181230
Babable 20180918
Baidu 20181207
BitDefender 20181230
Bkav 20181227
CAT-QuickHeal 20181229
ClamAV 20181230
CMC 20181229
Comodo 20181230
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181230
Cyren 20181230
eGambit 20181230
Emsisoft 20181230
Endgame 20181108
F-Prot 20181230
F-Secure 20181230
Sophos ML 20181128
K7AntiVirus 20181230
K7GW 20181229
Kingsoft 20181230
Malwarebytes 20181230
MAX 20181230
eScan 20181230
NANO-Antivirus 20181230
Palo Alto Networks (Known Signatures) 20181230
Panda 20181229
Qihoo-360 20181230
Rising 20181230
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20181226
Symantec 20181229
Symantec Mobile Insight 20181225
TACHYON 20181230
Tencent 20181230
TheHacker 20181230
TotalDefense 20181229
Trapmine 20181205
Trustlook 20181230
VBA32 20181229
VIPRE None
ViRobot 20181230
Webroot 20181230
Yandex 20181229
Zoner 20181230
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 4
Section headers 24
ELF sections
ELF Segments
.ARM.exidx
.init
.text
.fini
.rodata
.ARM.extab
.ARM.exidx
.eh_frame
.init_array
.fini_array
.jcr
.got
.data
.bss
Segment without sections
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

File identification
MD5 f1401fe1cce382e9464f34f29a1ce175
SHA1 c99084b03d35b451406607a17235af8548029a8c
SHA256 ae3a55464de5bde35ed1527b95f5d20ed76700a44b88090f1a7cab10580d804c
ssdeep
3072:JmfdWmd6pUeQKbQsSoaa2mWA2vKjB2z45hASyqg+8umy/QsYJ0Yj/:sjoaa2mV2s5hA9qVmy/QsYJ0Yj/

File size 127.4 KB ( 130434 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, not stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2018-12-30 07:04:24 UTC ( 3 months, 3 weeks ago )
Last submission 2019-02-14 08:05:39 UTC ( 2 months ago )
File names f1401fe1cce382e9464f34f29a1ce175
101
54
139
146
yakuza.arm6
zbetcheckin_tracker_yakuza.arm6
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!