× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d7abb61a7a9387b8b8c4bcb546b6a1e39c9e26a57bf6a3a5eea0b006785a9437
File name: 229
Detection ratio: 18 / 46
Analysis date: 2019-01-12 05:21:59 UTC ( 3 months, 1 week ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen3 20190111
Avast ELF:Mirai-HU [Trj] 20190112
Avast-Mobile ELF:Mirai-ID [Trj] 20190111
AVG ELF:Mirai-HU [Trj] 20190112
Avira (no cloud) LINUX/Mirai.psvlv 20190112
Cyren ELF/Trojan.WIBW-5 20190112
DrWeb Linux.Mirai.20 20190112
Fortinet ELF/Mirai.AT!tr 20190112
Ikarus Trojan.Linux.Mirai 20190112
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20190112
McAfee Linux/mirai.d 20190112
McAfee-GW-Edition Linux/mirai.d 20190112
NANO-Antivirus Trojan.Mirai.flylux 20190112
Sophos AV Mal/Generic-S 20190112
Symantec Linux.Mirai 20190112
Tencent Backdoor.Linux.Mirai.vu 20190112
TrendMicro Possible_MIRAI.SMLBEM3 20190112
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20190111
Acronis 20190111
AegisLab 20190111
Alibaba 20180921
ALYac 20190112
Arcabit 20190112
Bkav 20190108
ClamAV 20190112
CMC 20190111
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190112
eGambit 20190112
Emsisoft 20190112
Endgame 20181108
F-Prot 20190112
F-Secure 20190111
Sophos ML 20181128
K7AntiVirus 20190111
K7GW 20190112
Kingsoft 20190112
MAX 20190112
Microsoft 20190112
eScan 20190112
Palo Alto Networks (Known Signatures) 20190112
Panda 20190111
Qihoo-360 20190112
Rising 20190112
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190109
TACHYON 20190112
TotalDefense 20190111
Trapmine 20190103
TrendMicro-HouseCall 20190112
Trustlook 20190112
VBA32 20190111
VIPRE 20190112
ViRobot 20190111
Webroot 20190112
Yandex 20190111
Zillya 20190111
Zoner 20190112
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MIPS R3000 machines.
ELF Header
Class ELF32
Data 2's complement, big endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MIPS R3000
Object file version 0x1
Program headers 3
Section headers 14
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data.rel.ro
.data
.got
.sbss
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Big endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
MIPS R3000

Execution parents
File identification
MD5 9331d069dfe939e45982cfc4a24a5ad7
SHA1 a2d195a674266966a3fe60672aeac7ecd0e1b885
SHA256 d7abb61a7a9387b8b8c4bcb546b6a1e39c9e26a57bf6a3a5eea0b006785a9437
ssdeep
1536:fONIacDuqM/00/BTjEDUvwGTJgK3z6sCqltSA3BkB4:WNItDv8ZEwvwGFz6sCqlUAd

File size 63.1 KB ( 64604 bytes )
File type ELF
Magic literal
ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-01-11 11:34:11 UTC ( 3 months, 1 week ago )
Last submission 2019-01-25 08:40:03 UTC ( 2 months, 4 weeks ago )
File names d7abb61a7a9387b8b8c4bcb546b6a1e39c9e26a57bf6a3a5eea0b006785a9437
69
50
unstable.mips
9331d069dfe939e45982cfc4a24a5ad7
unstable.mips
229
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!