× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b371848c5d2bbf8c9e0f3b83078d63d40f18b112d40e81f07a93e24ebebc89a5
File name: find
Detection ratio: 22 / 46
Analysis date: 2013-04-25 01:56:08 UTC ( 5 years, 11 months ago ) View latest
Antivirus Result Update
AntiVir SPR/NetTool.B 20130425
Avast ELF:Malware-gen 20130425
BitDefender Trojan.Hacktool.Scanner.G 20130425
Comodo TrojWare.Linux.HackTool.Small.i 20130425
Emsisoft Trojan.Hacktool.Scanner.G (B) 20130425
F-Secure Trojan.Hacktool.Scanner.G 20130424
Fortinet Riskware/Scanner 20130424
GData Trojan.Hacktool.Scanner.G 20130425
Ikarus HackTool.Linux.Small 20130425
Jiangmin HackTool.Linux.ba 20130424
Kaspersky HackTool.Linux.Small.i 20130425
McAfee Linux/Portscan 20130425
McAfee-GW-Edition Linux/Portscan 20130425
Microsoft HackTool:Linux/Small.I 20130425
eScan Trojan.Hacktool.Scanner.G 20130425
NANO-Antivirus Trojan.Unix.Small.mrfh 20130424
nProtect Trojan.Hacktool.Scanner.G 20130424
PCTools Hacktool.Generic 20130425
Sophos AV Troj/ScanA-Gen 20130424
Symantec Hacktool 20130425
TrendMicro EXPL_HideExecute 20130425
TrendMicro-HouseCall EXPL_HideExecute 20130425
Yandex 20130424
AhnLab-V3 20130424
Antiy-AVL 20130424
AVG 20130425
ByteHero 20130424
CAT-QuickHeal 20130424
ClamAV 20130425
Commtouch 20130425
DrWeb 20130425
eSafe 20130423
ESET-NOD32 20130424
F-Prot 20130425
K7AntiVirus 20130424
K7GW 20130424
Kingsoft 20130422
Malwarebytes 20130424
Norman 20130424
Panda 20130424
SUPERAntiSpyware 20130425
TheHacker 20130424
TotalDefense 20130424
VBA32 20130424
VIPRE 20130425
ViRobot 20130425
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 7
Section headers 34
ELF sections
ELF Segments
Segment without sections
.interp
.interp
.note.ABI-tag
.hash
.dynsym
.dynstr
.gnu.version
.gnu.version_r
.rel.dyn
.rel.plt
.init
.plt
.text
.fini
.rodata
.eh_frame
.ctors
.dtors
.jcr
.dynamic
.got
.got.plt
.data
.bss
.dynamic
.note.ABI-tag
Segment without sections
Shared libraries
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

Compressed bundles
File identification
MD5 66e2d41b889f76b41273927bbb9125ea
SHA1 f3b3b1d28b57a5cc9f7bc820f9f1451b1528c141
SHA256 b371848c5d2bbf8c9e0f3b83078d63d40f18b112d40e81f07a93e24ebebc89a5
ssdeep
192:fNTevcg57urx+zZ48rzv9cp55liqGcWqqI/DOZPci6BNsUvF6P:fNM5GGb3UXiqGq85ca

File size 15.4 KB ( 15729 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.0.0, not stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf

VirusTotal metadata
First submission 2008-02-26 15:24:56 UTC ( 11 years ago )
Last submission 2018-05-29 09:13:58 UTC ( 10 months ago )
File names M26AaHyoKe.xdp
VirusShare_66e2d41b889f76b41273927bbb9125ea
HackTool.Linux.Small.i
B371848C5D2BBF8C9E0F3B83078D63D40F18B112D40E81F07A93E24EBEBC89A5.dat
66e2d41b889f76b41273927bbb9125ea.apk
file-7134906_
66e2d41b889f76b41273927bbb9125ea
0zxwZLIkt.chm
IH7M.xml
VirusShare_66e2d41b889f76b41273927bbb9125ea
IOVrAFq6Op.html
HackTool.Linux.Small.i
find
66e2d41b889f76b41273927bbb9125eaf3b3b1d28b57a5cc9f7bc820f9f1451b1528c14115729.exe
aa
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!