× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bdcbe3391365cdff66b9084280eb9884df48bebf38295d2f4bd7273666d04fed
File name: 154
Detection ratio: 37 / 57
Analysis date: 2018-12-05 08:49:50 UTC ( 5 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Linux.Generic.5808 20181205
AhnLab-V3 Linux/Flooder.3465 20181204
ALYac Trojan.Linux.Agent 20181205
Antiy-AVL Trojan[Exploit]/Linux.Intfour.a 20181205
Arcabit Trojan.Linux.Generic.D16B0 20181205
Avast ELF:CVE-2013-2094-D [Expl] 20181205
AVG ELF:CVE-2013-2094-D [Expl] 20181205
Avira (no cloud) EXP/Agent.cvne 20181205
BitDefender Trojan.Linux.Generic.5808 20181205
CAT-QuickHeal Exploit.Linux.Intfour.A 20181205
ClamAV Unix.Exploit.Fsheep-1 20181203
Comodo Malware@#3h3qfl928rhb0 20181205
DrWeb Linux.Exploit.CVE-2013-2094.1 20181205
Emsisoft Trojan.Linux.Generic.5808 (B) 20181205
ESET-NOD32 Linux/Exploit.CVE-2013-2094.B 20181205
F-Secure Trojan.Linux.Generic.5808 20181205
GData Trojan.Linux.Generic.5808 20181205
Ikarus Exploit.CVE-2013-2094 20181204
Jiangmin Exploit.Linux.ln 20181205
K7AntiVirus Trojan ( 0001140e1 ) 20181205
K7GW Trojan ( 0001140e1 ) 20181205
Kaspersky HEUR:Exploit.Linux.Intfour.a 20181204
MAX malware (ai score=100) 20181205
McAfee Exploit-CVE2013-2094 20181205
McAfee-GW-Edition Exploit-CVE2013-2094 20181205
Microsoft Trojan:Win32/Skeeyah.A!rfn 20181205
eScan Trojan.Linux.Generic.5808 20181205
NANO-Antivirus Exploit.Elf64.Intfour.dxkflx 20181205
Qihoo-360 Win32/Trojan.66e 20181205
Sophos AV Linux/Loit-K 20181205
Symantec Trojan.Gen.NPE 20181205
Tencent Linux.Exploit.Intfour.Eehi 20181205
TrendMicro ELF64_CVE20132094.DMB 20181205
TrendMicro-HouseCall ELF64_CVE20132094.DMB 20181205
VBA32 Exploit.Linux.Small.fy 20181204
Zillya Exploit.CVE.Linux.1 20181204
ZoneAlarm by Check Point HEUR:Exploit.Linux.Intfour.a 20181205
AegisLab 20181205
Alibaba 20180921
Avast-Mobile 20181204
Babable 20180918
Baidu 20181204
Bkav 20181203
CMC 20181204
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181205
Cyren 20181205
eGambit 20181205
Endgame 20181108
F-Prot 20181205
Fortinet 20181205
Sophos ML 20181128
Kingsoft 20181205
Malwarebytes 20181205
Palo Alto Networks (Known Signatures) 20181205
Panda 20181204
Rising 20181205
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
TACHYON 20181205
TheHacker 20181202
TotalDefense 20181205
Trapmine 20181128
Trustlook 20181205
ViRobot 20181205
Webroot 20181205
Yandex 20181204
Zoner 20181205
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Advanced Micro Devices X86-64 machines.
ELF Header
Class ELF64
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Advanced Micro Devices X86-64
Object file version 0x1
Program headers 9
Section headers 31
ELF sections
ELF Segments
Segment without sections
.interp
.interp
.note.ABI-tag
.note.gnu.build-id
.hash
.gnu.hash
.dynsym
.dynstr
.gnu.version
.gnu.version_r
.rela.dyn
.rela.plt
.init
.plt
.text
.fini
.rodata
.eh_frame_hdr
.eh_frame
.ctors
.dtors
.jcr
.dynamic
.got
.got.plt
.data
.bss
.dynamic
.note.ABI-tag
.note.gnu.build-id
.eh_frame_hdr
Segment without sections
.ctors
.dtors
.jcr
.dynamic
.got
Shared libraries
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
64 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
AMD x86-64

Execution parents
Compressed bundles
PCAP parents
File identification
MD5 ff1e9d1fc459dd83333fd94dbe36229a
SHA1 0e76f4c72295fe851b775dac8c49ec53108f1df6
SHA256 bdcbe3391365cdff66b9084280eb9884df48bebf38295d2f4bd7273666d04fed
ssdeep
96:GoYFTWgbSw0rNlVYJzde7sa1Ip2/boYOqMvMpJ+JTfWPrSvdy00KDH8PhXNCM0zU:GlnLQl/7sa1h0HqM0sTfyrSc98r89R

File size 13.1 KB ( 13413 bytes )
File type ELF
Magic literal
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.15, not stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
64bits cve-2013-2094 exploit elf

VirusTotal metadata
First submission 2013-06-19 11:01:44 UTC ( 5 years, 11 months ago )
Last submission 2019-04-25 01:49:56 UTC ( 1 month ago )
File names VirusShare_ff1e9d1fc459dd83333fd94dbe36229a
20141226010232__tmp_5
62
20141231021128__tmp_5
64
200
20150102021818__tmp_5
362
pcp
160
33
169
37
2.6.32-2014.out
96017138.
ff1e9d1fc459dd83333fd94dbe36229a
20141231013445__tmp_5
42
40
2.6.32.out
20150105010624__tmp_5
ff1e9d1fc459dd83333fd94dbe36229a
54
55
58
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!