× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e0ec3c6fb016813375bfdc5ac8ccc08af850a9ad18791c67df9593e8a8190708
File name: Tsunami.arm6
Detection ratio: 9 / 57
Analysis date: 2019-01-08 02:27:51 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Avast ELF:Mirai-GH [Trj] 20190107
Avast-Mobile ELF:Mirai-GH [Trj] 20190107
AVG ELF:Mirai-GH [Trj] 20190107
DrWeb Linux.Mirai.30 20190107
ESET-NOD32 a variant of Linux/Mirai.L 20190108
Fortinet ELF/Mirai.AE!tr 20190108
Kaspersky HEUR:Backdoor.Linux.Mirai.ad 20190108
Symantec Linux.Mirai 20190108
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ad 20190107
Acronis 20181227
Ad-Aware 20190107
AegisLab 20190107
AhnLab-V3 20190107
Alibaba 20180921
ALYac 20190107
Antiy-AVL 20190107
Arcabit 20190107
Avira (no cloud) 20190107
Baidu 20190107
BitDefender 20190107
Bkav 20190107
CAT-QuickHeal 20190107
ClamAV 20190107
CMC 20190107
Comodo 20190107
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190108
Cyren 20190107
eGambit 20190108
Emsisoft 20190107
Endgame 20181108
F-Prot 20190108
F-Secure 20190108
GData 20190108
Ikarus 20190108
Sophos ML 20181128
Jiangmin 20190107
K7AntiVirus 20190108
K7GW 20190108
Kingsoft 20190108
Malwarebytes 20190108
MAX 20190108
McAfee 20190108
McAfee-GW-Edition 20190108
Microsoft 20190108
eScan 20190108
NANO-Antivirus 20190108
Palo Alto Networks (Known Signatures) 20190108
Panda 20190107
Qihoo-360 20190108
Rising 20190108
SentinelOne (Static ML) 20181223
Sophos AV 20190108
SUPERAntiSpyware 20190102
TACHYON 20190108
Tencent 20190108
TheHacker 20190106
TotalDefense 20190107
Trapmine 20190103
TrendMicro 20190107
TrendMicro-HouseCall 20190107
Trustlook 20190108
VBA32 20190104
VIPRE 20190107
ViRobot 20190107
Webroot 20190108
Yandex 20181229
Zillya 20190105
Zoner 20190107
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - Linux
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 3
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

Execution parents
File identification
MD5 d4d9ca3ba0f7f0d951fa88c1282cccee
SHA1 a9fe5761aaf83db8c95a352ac46b5ebcea3d78db
SHA256 e0ec3c6fb016813375bfdc5ac8ccc08af850a9ad18791c67df9593e8a8190708
ssdeep
768:Q58LnB+cP5NB4CLu4gxyzQed3gpTmMjmV5Eum5uS+vPv43D9q3UELjfK:Q58LleIu4zhmmMC0T5uHn4SL2

File size 32.4 KB ( 33212 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1 (GNU/Linux), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf upx

VirusTotal metadata
First submission 2019-01-08 02:27:51 UTC ( 1 month, 1 week ago )
Last submission 2019-01-12 17:52:54 UTC ( 1 month ago )
File names 85
59
e0ec3c6fb016813375bfdc5ac8ccc08af850a9ad18791c67df9593e8a8190708
Tsunami.arm6
128
88
19
Tsunami.arm6
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!