× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e81ec6e4d5a49190b9a89ad0e5ceb7ab92b1e88f4ccd48bd518e3781bc358121
File name: sora.arm7
Detection ratio: 11 / 56
Analysis date: 2019-01-04 18:21:18 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.53296 20190104
Avast ELF:Mirai-GH [Trj] 20190104
Avast-Mobile ELF:Mirai-GH [Trj] 20190104
AVG ELF:Mirai-GH [Trj] 20190104
DrWeb Linux.Packed.54 20190104
ESET-NOD32 a variant of Linux/Mirai.A 20190104
Fortinet ELF/Mirai.IA!tr 20190104
Jiangmin Backdoor.Linux.aveu 20190104
Kaspersky HEUR:Backdoor.Linux.Mirai.c 20190104
Symantec Linux.Mirai 20190104
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.c 20190104
Acronis 20181227
Ad-Aware 20190104
AegisLab 20190104
Alibaba 20180921
ALYac 20190104
Antiy-AVL 20190104
Arcabit 20190104
Avira (no cloud) 20190104
Baidu 20190104
BitDefender 20190104
Bkav 20190104
CAT-QuickHeal 20190104
ClamAV 20190104
CMC 20190103
Comodo 20190104
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190104
Cyren 20190104
eGambit 20190104
Emsisoft 20190104
Endgame 20181108
F-Prot 20190104
F-Secure 20190104
GData 20190104
Ikarus 20190104
Sophos ML 20181128
K7AntiVirus 20190104
K7GW 20190104
Kingsoft 20190104
Malwarebytes 20190104
MAX 20190104
McAfee 20190104
McAfee-GW-Edition 20190104
Microsoft 20190104
eScan 20190104
NANO-Antivirus 20190104
Palo Alto Networks (Known Signatures) 20190104
Panda 20190104
Qihoo-360 20190104
Rising 20190104
SentinelOne (Static ML) 20181223
Sophos AV 20190104
SUPERAntiSpyware 20190102
TACHYON 20190104
Tencent 20190104
TheHacker 20190104
TotalDefense 20190104
Trapmine 20190103
TrendMicro 20190104
TrendMicro-HouseCall 20190104
Trustlook 20190104
VBA32 20190104
ViRobot 20190104
Webroot 20190104
Yandex 20181229
Zillya 20190103
Zoner 20190104
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - Linux
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 3
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

File identification
MD5 31a70dc8319e0a9254a70c23762a2067
SHA1 1b41d20d376112326dbf280ce6168e0070c459ee
SHA256 e81ec6e4d5a49190b9a89ad0e5ceb7ab92b1e88f4ccd48bd518e3781bc358121
ssdeep
768:bJomkQ+czIzxisfjo9tBJM9IgNuIq8gARmVb5YUCj1cMX9q3UELgCV7tn1BdSFz9:impgDjo9tBbgNuejSDCj1LmLgChajyO

File size 52.0 KB ( 53296 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1 (GNU/Linux), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf upx

VirusTotal metadata
First submission 2019-01-04 18:21:18 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-06 04:33:12 UTC ( 1 month, 2 weeks ago )
File names sora.arm7
e81ec6e4d5a49190b9a89ad0e5ceb7ab92b1e88f4ccd48bd518e3781bc358121
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!