× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e666b7e6011ef065e94bc7573cc5bba85097a38b921d58f8e2ee1cc8cfc8f3a8
File name: E666B7E6011EF065E94BC7573CC5BBA85097A38B921D58F8E2EE1CC8CFC8F3A8
Detection ratio: 8 / 58
Analysis date: 2019-02-10 12:05:34 UTC ( 3 months, 2 weeks ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.29444.C 20190210
DrWeb Linux.Packed.53 20190210
ESET-NOD32 a variant of Linux/Mirai.A 20190210
Fortinet ELF/Mirai.AT!tr 20190210
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20190210
SentinelOne (Static ML) static engine - malicious 20190203
Tencent Backdoor.Linux.Mirai.wan 20190210
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20190210
Acronis 20190208
Ad-Aware 20190210
AegisLab 20190210
Alibaba 20180921
ALYac 20190210
Antiy-AVL 20190210
Arcabit 20190210
Avast 20190210
Avast-Mobile 20190210
AVG 20190210
Avira (no cloud) 20190210
Babable 20180918
Baidu 20190202
BitDefender 20190210
Bkav 20190201
CAT-QuickHeal 20190210
ClamAV 20190210
CMC 20190210
Comodo 20190210
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190210
Cyren 20190210
eGambit 20190210
Emsisoft 20190210
Endgame 20181108
F-Prot 20190210
F-Secure 20190210
GData 20190210
Ikarus 20190210
Sophos ML 20181128
Jiangmin 20190210
K7AntiVirus 20190210
K7GW 20190210
Kingsoft 20190210
Malwarebytes 20190210
MAX 20190210
McAfee 20190210
McAfee-GW-Edition 20190210
Microsoft 20190210
eScan 20190210
NANO-Antivirus 20190210
Palo Alto Networks (Known Signatures) 20190210
Panda 20190210
Qihoo-360 20190210
Rising 20190210
Sophos AV 20190210
SUPERAntiSpyware 20190206
Symantec 20190209
Symantec Mobile Insight 20190207
TACHYON 20190210
TheHacker 20190203
TotalDefense 20190206
Trapmine 20190123
TrendMicro 20190210
TrendMicro-HouseCall 20190210
Trustlook 20190210
VBA32 20190208
ViRobot 20190209
Webroot 20190210
Yandex 20190208
Zillya 20190208
Zoner 20190210
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - Linux
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 3
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

File identification
MD5 af23b6fecc9a8861b2ffcb3431295c0c
SHA1 aa4051b08d46f7927eb05b13702fd62be8a6d791
SHA256 e666b7e6011ef065e94bc7573cc5bba85097a38b921d58f8e2ee1cc8cfc8f3a8
ssdeep
768:RCG/rJv+tqC3Y+B4JmEGo3ZXelv3YmFAtM5inw91Fy:YGtv+tzMJmEGuUvhFzoAPy

File size 28.8 KB ( 29444 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf upx

VirusTotal metadata
First submission 2019-02-10 12:04:11 UTC ( 3 months, 2 weeks ago )
Last submission 2019-02-10 12:05:34 UTC ( 3 months, 2 weeks ago )
File names sora.x86
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!