× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ef155bd2e6c5011dde2f36dd18a60866fb8ec898b3912af77b4a35e45c9a4a07
File name: socket
Detection ratio: 0 / 55
Analysis date: 2014-09-17 02:03:44 UTC ( 4 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20140917
AegisLab 20140917
Yandex 20140916
AhnLab-V3 20140916
Antiy-AVL 20140917
Avast 20140917
AVG 20140917
Avira (no cloud) 20140917
AVware 20140917
Baidu-International 20140916
BitDefender 20140917
Bkav 20140916
ByteHero 20140917
CAT-QuickHeal 20140916
ClamAV 20140917
CMC 20140916
Comodo 20140916
Cyren 20140917
DrWeb 20140917
Emsisoft 20140917
ESET-NOD32 20140916
F-Prot 20140917
F-Secure 20140917
Fortinet 20140917
GData 20140917
Ikarus 20140917
Jiangmin 20140916
K7AntiVirus 20140916
K7GW 20140916
Kaspersky 20140916
Kingsoft 20140917
Malwarebytes 20140917
McAfee 20140917
McAfee-GW-Edition 20140916
Microsoft 20140917
eScan 20140917
NANO-Antivirus 20140917
Norman 20140916
nProtect 20140916
Panda 20140916
Qihoo-360 20140917
Rising 20140916
Sophos AV 20140917
SUPERAntiSpyware 20140916
Symantec 20140917
Tencent 20140917
TheHacker 20140915
TotalDefense 20140916
TrendMicro 20140917
TrendMicro-HouseCall 20140917
VBA32 20140916
VIPRE 20140917
ViRobot 20140917
Zillya 20140916
Zoner 20140916
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Intel 80386 machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Intel 80386
Object file version 0x1
Program headers 8
Section headers 29
ELF sections
ELF Segments
Segment without sections
.interp
.interp
.note.ABI-tag
.gnu.hash
.dynsym
.dynstr
.gnu.version
.gnu.version_r
.rel.dyn
.rel.plt
.init
.plt
.text
.fini
.rodata
.eh_frame_hdr
.eh_frame
.ctors
.dtors
.jcr
.dynamic
.got
.got.plt
.data
.bss
.dynamic
.note.ABI-tag
.eh_frame_hdr
Segment without sections
Shared libraries
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
i386

Compressed bundles
File identification
MD5 5e3e925455a13b95ebfbac45707818b4
SHA1 2d2e0b64073dd5c8c6efc295df4fbbe3baa2bb85
SHA256 ef155bd2e6c5011dde2f36dd18a60866fb8ec898b3912af77b4a35e45c9a4a07
ssdeep
192:fzXD3WXUWwEnZuSBWwcHBb9mIzJ67kkkikkkkkskkkkSEcGBLm8X9Y7avEYiI4At:fzTG3w6ZuHHd9hw0iLmLs

File size 13.0 KB ( 13356 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.9, not stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf

VirusTotal metadata
First submission 2014-09-17 02:03:44 UTC ( 4 years, 8 months ago )
Last submission 2018-10-09 17:06:06 UTC ( 7 months, 1 week ago )
File names 5e3e925455a13b95ebfbac45707818b4
1.txt
socket
RFA3T1r9a.vcf
mv38awC.tar.bz2
VirusShare_5e3e925455a13b95ebfbac45707818b4
2d2e0b64073dd5c8c6efc295df4fbbe3baa2bb85_socket
VirusShare_5e3e925455a13b95ebfbac45707818b4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!