× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fc688f26265ea507a7d303b198541de62248c4db591e73b3e2ce5237f88d9d56
File name: 21eee0821f90e712eccf7d1b3b9815a09b5147ec
Detection ratio: 19 / 56
Analysis date: 2018-12-21 07:37:02 UTC ( 4 months ago ) View latest
Antivirus Result Update
AhnLab-V3 Linux/Mirai.Gen3 20181220
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.ba 20181221
Avast ELF:Mirai-HU [Trj] 20181221
Avast-Mobile ELF:Mirai-ID [Trj] 20181220
AVG ELF:Mirai-HU [Trj] 20181221
DrWeb Linux.Mirai.629 20181221
ESET-NOD32 a variant of Linux/Mirai.AT 20181221
Fortinet ELF/Mirai.AT!tr 20181221
GData Linux.Trojan.Mirai.J 20181221
Jiangmin Backdoor.Linux.avfv 20181221
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20181221
McAfee Linux/mirai.d 20181221
McAfee-GW-Edition Linux/mirai.d 20181221
Sophos AV Mal/Generic-S 20181221
Symantec Linux.Mirai 20181221
Tencent Linux.Backdoor.Mirai.Huph 20181221
TrendMicro Possible_MIRAI.SMLBEM3 20181221
TrendMicro-HouseCall Possible_MIRAI.SMLBEM3 20181221
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20181221
Acronis 20180726
Ad-Aware 20181221
AegisLab 20181221
Alibaba 20180921
ALYac 20181221
Arcabit 20181221
Avira (no cloud) 20181220
Baidu 20181207
BitDefender 20181221
Bkav 20181220
CAT-QuickHeal 20181220
ClamAV 20181221
CMC 20181220
Comodo 20181220
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181221
Cyren 20181221
eGambit 20181221
Emsisoft 20181221
Endgame 20181108
F-Prot 20181221
F-Secure 20181221
Ikarus 20181221
Sophos ML 20181128
K7AntiVirus 20181221
K7GW 20181221
Kingsoft 20181221
Malwarebytes 20181221
MAX 20181221
Microsoft 20181221
eScan 20181221
NANO-Antivirus 20181221
Palo Alto Networks (Known Signatures) 20181221
Panda 20181220
Qihoo-360 20181221
Rising 20181221
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181215
TACHYON 20181221
TheHacker 20181220
TotalDefense 20181220
Trapmine 20181205
Trustlook 20181221
VBA32 20181220
ViRobot 20181220
Webroot 20181221
Yandex 20181220
Zillya 20181219
Zoner 20181221
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on MC68000 machines.
ELF Header
Class ELF32
Data 2's complement, big endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture MC68000
Object file version 0x1
Program headers 3
Section headers 10
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.ctors
.dtors
.data
.bss
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Big endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
Motorola 68000

File identification
MD5 988512141ad87d8d3ad09a2b0cf0def9
SHA1 21eee0821f90e712eccf7d1b3b9815a09b5147ec
SHA256 fc688f26265ea507a7d303b198541de62248c4db591e73b3e2ce5237f88d9d56
ssdeep
768:8CeKEfhe5XdrbejRIcfFMQ/5MdgFHj0iPuvWeffpqmUJTXr6Lu380DR:dsfIBZeRtJrFj0imvppqmUJP6Lc8Q

File size 51.8 KB ( 53052 bytes )
File type ELF
Magic literal
ELF 32-bit MSB executable, Motorola 68020, version 1 (SYSV), statically linked, stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
elf

VirusTotal metadata
First submission 2018-12-21 07:37:02 UTC ( 4 months ago )
Last submission 2019-01-18 07:38:38 UTC ( 3 months ago )
File names sora.m68k
988512141ad87d8d3ad09a2b0cf0def9
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!