× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: eebb2da8e644d3b21e1005c00eb5cfd3c6f1c682bda521bde32bec5ef39cd6ff
File name: e93496982869c12a29d779e13fe718f8.virus
Detection ratio: 1 / 53
Analysis date: 2019-02-25 11:20:50 UTC ( 2 months, 4 weeks ago )
Antivirus Result Update
Jiangmin Backdoor.Linux.ayjk 20190225
Acronis 20190222
Ad-Aware 20190225
AegisLab 20190225
AhnLab-V3 20190225
Alibaba 20180921
ALYac 20190225
Antiy-AVL 20190225
Arcabit 20190225
Avast 20190225
Avast-Mobile 20190225
AVG 20190225
Avira (no cloud) 20190224
Babable 20180917
Baidu 20190214
BitDefender 20190224
CAT-QuickHeal 20190224
ClamAV 20190224
CMC 20190224
Comodo 20190224
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190225
Cyren 20190224
DrWeb 20190225
eGambit 20190225
Emsisoft 20190224
Endgame 20190215
ESET-NOD32 20190225
F-Secure 20190224
Fortinet 20190225
GData 20190224
Ikarus 20190225
Sophos ML 20181128
K7AntiVirus 20190225
K7GW 20190225
Kaspersky 20190225
Kingsoft 20190225
Malwarebytes 20190225
MAX 20190225
McAfee 20190225
McAfee-GW-Edition 20190224
Microsoft 20190224
eScan 20190225
NANO-Antivirus 20190225
Palo Alto Networks (Known Signatures) 20190225
Panda 20190224
Qihoo-360 20190225
Rising 20190225
SentinelOne (Static ML) 20190203
Sophos AV 20190225
SUPERAntiSpyware 20190220
Symantec 20190224
Symantec Mobile Insight 20190220
TACHYON 20190224
Tencent 20190225
TheHacker 20190224
TotalDefense 20190224
Trapmine 20190123
Trustlook 20190225
VBA32 20190225
VIPRE 20190224
ViRobot 20190225
Webroot 20190225
Yandex 20190222
ZoneAlarm by Check Point 20190225
Zoner 20190224
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - Linux
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 2
Section headers 0
ELF Segments
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

File identification
MD5 e93496982869c12a29d779e13fe718f8
SHA1 84759f1506ae1ae8b390d03e20cd5d95817d1d0a
SHA256 eebb2da8e644d3b21e1005c00eb5cfd3c6f1c682bda521bde32bec5ef39cd6ff
ssdeep
192:KXs4Lyi82so2yzXtb1MQFGKVeKJRT6XXmBrdIQG2tdaOqGM5V6LsDdvrY6jdE7F+:yb2eX3zAKuiNPZRwwqdvrrduMl

File size 15.5 KB ( 15840 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1 (GNU/Linux), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2019-02-25 11:20:50 UTC ( 2 months, 4 weeks ago )
Last submission 2019-02-25 11:20:50 UTC ( 2 months, 4 weeks ago )
File names e93496982869c12a29d779e13fe718f8.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!