× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c532a79dd78230d88413d86ae9abfeefcb70f0b045c1638bdf8737ac0f022bd2
File name: 19
Detection ratio: 8 / 58
Analysis date: 2019-04-15 18:21:32 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
AegisLab Trojan.Linux.Mirai.K!c 20190415
ESET-NOD32 a variant of Linux/Mirai.A 20190415
Fortinet ELF/Mirai.AT!tr 20190415
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20190415
Sophos AV Mal/Generic-S 20190415
Tencent Trojan.Linux.Mirai.cj 20190415
TrendMicro-HouseCall TROJ_GEN.R002H0DDF19 20190415
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20190415
Acronis 20190415
Ad-Aware 20190415
AhnLab-V3 20190415
Alibaba 20190402
ALYac 20190415
Antiy-AVL 20190415
Arcabit 20190415
Avast 20190415
Avast-Mobile 20190415
AVG 20190415
Avira (no cloud) 20190415
Babable 20180918
Baidu 20190318
BitDefender 20190415
Bkav 20190412
CAT-QuickHeal 20190415
ClamAV 20190415
CMC 20190321
Comodo 20190415
CrowdStrike Falcon (ML) 20190212
Cybereason 20190403
Cyren 20190415
DrWeb 20190415
eGambit 20190415
Emsisoft 20190415
Endgame 20190403
F-Prot 20190415
F-Secure 20190415
FireEye 20190415
GData 20190415
Ikarus 20190415
Sophos ML 20190313
Jiangmin 20190415
K7AntiVirus 20190415
K7GW 20190415
Kingsoft 20190415
Malwarebytes 20190415
MAX 20190415
McAfee 20190415
McAfee-GW-Edition 20190415
Microsoft 20190415
eScan 20190415
NANO-Antivirus 20190415
Palo Alto Networks (Known Signatures) 20190415
Panda 20190415
Qihoo-360 20190415
Rising 20190415
SentinelOne (Static ML) 20190407
SUPERAntiSpyware 20190410
Symantec Mobile Insight 20190410
TACHYON 20190415
TheHacker 20190411
TotalDefense 20190413
Trapmine 20190325
Trustlook 20190415
VBA32 20190415
ViRobot 20190415
Yandex 20190412
Zillya 20190415
Zoner 20190415
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - Linux
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 3
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

Execution parents
File identification
MD5 97f417893f2a4a36cf1c439c693e0608
SHA1 45bc457a49f0fc7261d10b8a83c11050772d904e
SHA256 c532a79dd78230d88413d86ae9abfeefcb70f0b045c1638bdf8737ac0f022bd2
ssdeep
384:MqMzN8f05Rpjk5Yfo2xZUzKmQAHHOvgm0PtsgV9Jz8Uaux7+fqSB+tyXEFsZRu06:WN8fWlfowmQA3V9qFmSBivFWkEn0T

File size 29.2 KB ( 29944 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf upx

VirusTotal metadata
First submission 2019-04-15 14:07:05 UTC ( 1 month, 1 week ago )
Last submission 2019-04-17 19:38:12 UTC ( 1 month ago )
File names update_12e3d2d2qqwq_modules.x86
update_12e3d2d2qqwq_modules.x86
62
53
output.124025975.txt
73
19
124
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!