× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b402085168dbeafba1ac273257d7ba977a1fc8e46277144c66f14ca16d9f20af
File name: 56
Detection ratio: 17 / 57
Analysis date: 2019-01-11 17:43:32 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen3 20190111
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.ba 20190111
Avast ELF:Mirai-HU [Trj] 20190111
Avast-Mobile ELF:Mirai-UM [Trj] 20190111
AVG ELF:Mirai-HU [Trj] 20190111
DrWeb Linux.Mirai.53 20190111
ESET-NOD32 a variant of Linux/Mirai.AT 20190111
Fortinet ELF/Mirai.OX!tr 20190111
GData Linux.Trojan.Mirai.J 20190111
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190111
McAfee Linux/Mirai.g 20190111
McAfee-GW-Edition Linux/Mirai.g 20190111
Sophos AV Linux/DDoS-CIA 20190111
Symantec Linux.Mirai 20190111
TrendMicro Possible_MIRAI.SMLBO13 20190111
TrendMicro-HouseCall Possible_MIRAI.SMLBO13 20190111
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190111
Acronis 20190111
Ad-Aware 20190111
AegisLab 20190111
Alibaba 20180921
ALYac 20190111
Arcabit 20190111
Avira (no cloud) 20190111
Babable 20180918
Baidu 20190111
BitDefender 20190111
Bkav 20190108
CAT-QuickHeal 20190111
ClamAV 20190111
CMC 20190111
Comodo 20190111
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190111
Cyren 20190111
eGambit 20190111
Emsisoft 20190111
Endgame 20181108
F-Prot 20190111
F-Secure 20190111
Ikarus 20190111
Sophos ML 20181128
Jiangmin 20190111
K7AntiVirus 20190111
K7GW 20190111
Kingsoft 20190111
Malwarebytes 20190111
MAX 20190111
Microsoft 20190111
eScan 20190111
NANO-Antivirus 20190111
Palo Alto Networks (Known Signatures) 20190111
Panda 20190111
Qihoo-360 20190111
Rising 20190111
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190109
TACHYON 20190111
Tencent 20190111
TheHacker 20190106
TotalDefense 20190111
Trapmine 20190103
Trustlook 20190111
VBA32 20190111
ViRobot 20190111
Webroot 20190111
Yandex 20190111
Zillya 20190110
Zoner 20190111
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 3
Section headers 14
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data.rel.ro
.data
.got
.sbss
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

File identification
MD5 909e73229d0c86e89c4b3797048f0aa4
SHA1 6ed6b85428c270d03d34298a82a0469664ffded6
SHA256 b402085168dbeafba1ac273257d7ba977a1fc8e46277144c66f14ca16d9f20af
ssdeep
1536:6qJw3YsMggrwj0f38bBSsZjZrzZXxhaGAAnWj:6qJesZrwj0P4rzej

File size 78.2 KB ( 80052 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-11 16:58:18 UTC ( 1 month, 1 week ago )
Last submission 2019-01-23 11:46:28 UTC ( 4 weeks, 1 day ago )
File names 265
b402085168dbeafba1ac273257d7ba977a1fc8e46277144c66f14ca16d9f20af
56
128
98
909e73229d0c86e89c4b3797048f0aa4
slav.mpsl
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!