× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: deefe93405d5dc62b8b8844981b9c2a4e8ab51614f930729f4830c7248c92d97
File name: strangeprogram
Detection ratio: 25 / 56
Analysis date: 2016-04-27 23:46:21 UTC ( 1 year, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware Backdoor.Linux.Gafgyt.N 20160427
ALYac Backdoor.Linux.Gafgyt.N 20160427
Arcabit Backdoor.Linux.Gafgyt.N 20160427
Avast ELF:Gafgyt-AG [Trj] 20160427
AVG Linux/Fgt 20160427
Avira (no cloud) LINUX/Gafgyt.vmyt 20160427
BitDefender Backdoor.Linux.Gafgyt.N 20160427
ClamAV Unix.Malware.Agent-1395674 20160427
DrWeb Linux.BackDoor.Fgt.44 20160427
Emsisoft Backdoor.Linux.Gafgyt.N (B) 20160427
ESET-NOD32 a variant of Linux/Gafgyt.N 20160427
F-Secure Backdoor.Linux.Gafgyt.N 20160427
Fortinet Malware_Generic.P0 20160427
GData Backdoor.Linux.Gafgyt.N 20160427
Ikarus Trojan.Linux.Gafgyt 20160427
Jiangmin Backdoor.Linux.bkp 20160427
K7AntiVirus Trojan ( 0001140e1 ) 20160427
K7GW Trojan ( 0001140e1 ) 20160427
Kaspersky HEUR:Backdoor.Linux.Gafgyt.d 20160427
eScan Backdoor.Linux.Gafgyt.N 20160427
nProtect Backdoor.Linux.Gafgyt.N 20160427
Sophos AV Mal/Generic-S 20160427
Tencent Linux.Backdoor.Gafgyt.Wpac 20160428
TrendMicro ELF_BASHLITE.DMA 20160428
TrendMicro-HouseCall ELF_BASHLITE.DMA 20160428
AegisLab 20160427
AhnLab-V3 20160427
Alibaba 20160427
Antiy-AVL 20160427
AVware 20160427
Baidu 20160427
Baidu-International 20160427
Bkav 20160427
CAT-QuickHeal 20160427
CMC 20160425
Comodo 20160427
Cyren 20160427
F-Prot 20160427
Kingsoft 20160428
Malwarebytes 20160427
McAfee 20160427
McAfee-GW-Edition 20160427
Microsoft 20160427
NANO-Antivirus 20160427
Panda 20160427
Qihoo-360 20160428
Rising 20160427
SUPERAntiSpyware 20160427
Symantec 20160428
TheHacker 20160426
VBA32 20160427
VIPRE 20160428
ViRobot 20160427
Yandex 20160427
Zillya 20160427
Zoner 20160427
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Advanced Micro Devices X86-64 machines.
ELF Header
Class ELF64
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Advanced Micro Devices X86-64
Object file version 0x1
Program headers 3
Section headers 13
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.eh_frame
.ctors
.dtors
.jcr
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
64 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
AMD x86-64

File identification
MD5 6d1e38a395147d323a18699715e7e5b0
SHA1 b036127fe40e99ef7b5bc421043f1cd505dba4db
SHA256 deefe93405d5dc62b8b8844981b9c2a4e8ab51614f930729f4830c7248c92d97
ssdeep
768:hqu1gepJuroCoH2WVtnOQVta6El5qy9iyoXlYA2A6j:Yu1gepJTWEnv6l5F4XlA9j

File size 43.8 KB ( 44888 bytes )
File type ELF
Magic literal
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
64bits elf

VirusTotal metadata
First submission 2016-04-09 15:03:53 UTC ( 1 year, 9 months ago )
Last submission 2016-04-27 23:46:21 UTC ( 1 year, 8 months ago )
File names x86_64
strangeprogram
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!