× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f24c10e0a5f3da544d8fbdffcf2c776d71916535d775022346240d634e8d8fce
File name: mal
Detection ratio: 7 / 58
Analysis date: 2018-12-28 08:30:33 UTC ( 3 months, 3 weeks ago )
Antivirus Result Update
DrWeb Linux.Mirai.27 20181228
ESET-NOD32 a variant of Linux/Mirai.A 20181228
Fortinet ELF/Mirai.IA!tr 20181228
Jiangmin Backdoor.Linux.bofe 20181228
Kaspersky HEUR:Backdoor.Linux.Mirai.b 20181228
Symantec Linux.Mirai 20181227
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.b 20181228
Acronis 20181227
Ad-Aware 20181228
AegisLab 20181228
AhnLab-V3 20181227
Alibaba 20180921
ALYac 20181228
Antiy-AVL 20181228
Arcabit 20181228
Avast 20181228
Avast-Mobile 20181227
AVG 20181228
Avira (no cloud) 20181228
Babable 20180918
Baidu 20181207
BitDefender 20181228
Bkav 20181227
CAT-QuickHeal 20181227
ClamAV 20181228
CMC 20181228
Comodo 20181228
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181228
Cyren 20181228
eGambit 20181228
Emsisoft 20181228
Endgame 20181108
F-Prot 20181228
F-Secure 20181228
GData 20181228
Ikarus 20181228
Sophos ML 20181128
K7AntiVirus 20181228
K7GW 20181228
Kingsoft 20181228
Malwarebytes 20181228
MAX 20181228
McAfee 20181228
McAfee-GW-Edition 20181228
Microsoft 20181228
eScan 20181228
NANO-Antivirus 20181228
Palo Alto Networks (Known Signatures) 20181228
Panda 20181227
Qihoo-360 20181228
Rising 20181228
SentinelOne (Static ML) 20181223
Sophos AV 20181228
SUPERAntiSpyware 20181226
Symantec Mobile Insight 20181225
TACHYON 20181228
Tencent 20181228
TheHacker 20181225
TotalDefense 20181227
Trapmine 20181205
TrendMicro 20181228
TrendMicro-HouseCall 20181228
Trustlook 20181228
VBA32 20181227
VIPRE None
ViRobot 20181227
Webroot 20181228
Yandex 20181227
Zillya 20181227
Zoner 20181228
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on ARM machines.
ELF Header
Class ELF32
Data 2's complement, little endian
Header version 1 (current)
OS ABI ARM
ABI version 0
Object file type EXEC (Executable file)
Required architecture ARM
Object file version 0x1
Program headers 3
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Unknown (40)

File identification
MD5 d2c5bb94255c05f1e7d6f4f904cf0529
SHA1 64289e60ab29097e6170b501c62254cc80202f6c
SHA256 f24c10e0a5f3da544d8fbdffcf2c776d71916535d775022346240d634e8d8fce
ssdeep
768:4RSa8ZS/L6rze3OXrFKg9KZrqoDuo+s3UozYF:eSjFJXZBCJDuczm

File size 25.7 KB ( 26292 bytes )
File type ELF
Magic literal
ELF 32-bit LSB executable, ARM, version 1, statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf upx

VirusTotal metadata
First submission 2018-12-28 08:30:33 UTC ( 3 months, 3 weeks ago )
Last submission 2018-12-28 08:30:33 UTC ( 3 months, 3 weeks ago )
File names xd.arm5
mal
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!