× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d2b4514b7122f8c839ecdc59add0cee4374332653ee6396c2a3bc1a9f64dd0a6
File name: arm(1)
Detection ratio: 7 / 56
Analysis date: 2019-01-11 13:29:29 UTC ( 1 month, 1 week ago )
Antivirus Result Update
Avast ELF:Svirtu-AA [Trj] 20190111
Avast-Mobile ELF:Svirtu-AA [Trj] 20190111
AVG ELF:Svirtu-AA [Trj] 20190111
DrWeb Linux.BackDoor.Fgt.1653 20190111
ESET-NOD32 a variant of Linux/Mirai.BC 20190111
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190111
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190111
Acronis 20190110
Ad-Aware 20190111
AegisLab 20190111
AhnLab-V3 20190111
Alibaba 20180921
ALYac 20190111
Antiy-AVL 20190111
Arcabit 20190111
Avira (no cloud) 20190111
Babable 20180918
Baidu 20190111
BitDefender 20190111
Bkav 20190108
CAT-QuickHeal 20190110
ClamAV 20190111
CMC 20190110
Comodo 20190111
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190111
Cyren 20190111
eGambit 20190111
Emsisoft 20190111
Endgame 20181108
F-Prot 20190111
F-Secure 20190111
Fortinet 20190111
GData 20190111
Ikarus 20190111
Sophos ML 20181128
Jiangmin 20190111
K7AntiVirus 20190111
K7GW 20190111
Kingsoft 20190111
Malwarebytes 20190111
MAX 20190111
McAfee 20190111
McAfee-GW-Edition 20190111
Microsoft 20190111
eScan 20190111
NANO-Antivirus 20190111
Palo Alto Networks (Known Signatures) 20190111
Panda 20190111
Qihoo-360 20190111
Rising 20190111
SentinelOne (Static ML) 20181223
Sophos AV 20190111
SUPERAntiSpyware 20190109
Symantec 20190111
TACHYON 20190111
Tencent 20190111
TheHacker 20190106
Trapmine 20190103
TrendMicro 20190111
TrendMicro-HouseCall 20190111
Trustlook 20190111
VBA32 20190110
ViRobot 20190111
Webroot 20190111
Yandex 20190110
Zillya 20190110
Zoner 20190111
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI ARM
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 3
Section headers 0
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

File identification
MD5 565da0112ce782090e63e5459360d9d7
SHA1 f21b67857f85de5f51fb39c6adf941b0e02bb929
SHA256 d2b4514b7122f8c839ecdc59add0cee4374332653ee6396c2a3bc1a9f64dd0a6
ssdeep
768:vD7PoQ86uP95lnhU4UWBBTyyPir0vhQCbs3UmFTAlYk/mj:vgV6uP9Xn7BBSrUm2Fej

File size 32.0 KB ( 32804 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1, statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf via-tor

VirusTotal metadata
First submission 2019-01-11 13:29:29 UTC ( 1 month, 1 week ago )
Last submission 2019-01-11 13:29:29 UTC ( 1 month, 1 week ago )
File names arm(1)
arm
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!