× 쿠키가 비활성화 되어 있습니다! 이 사이트는 작업을 제대로 하려면 쿠키 활성화가 필요합니다.
SHA256: 1a279fb528f4e6bd392f733b71f78006d8a25616dbae211d621273429506d063
파일 이름: zbetcheckin_tracker_x86_64
탐지 비율: 29 / 57
분석 날짜: 2019-01-01 07:55:53 UTC ( 4개월, 3주 전 ) 최신 보기
안티바이러스 결과 업데이트
Ad-Aware Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
ALYac Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
Arcabit Trojan.Backdoor.Linux.Tsunami.1 20190101
Avast ELF:Flooder-NL [Trj] 20190101
AVG ELF:Flooder-NL [Trj] 20190101
BitDefender Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
CAT-QuickHeal Backdoor.Linux.Tsunami.A 20181231
ClamAV Win.Trojan.Tsunami-5 20190101
DrWeb Linux.BackDoor.Tsunami.103 20190101
Emsisoft Gen:Variant.Backdoor.Linux.Tsunami.1 (B) 20190101
ESET-NOD32 a variant of Linux/Tsunami.NAL 20190101
F-Secure Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
Fortinet ELF/Tsunami.NBV!tr 20190101
GData Linux.Backdoor.Tsunami.A 20190101
Kaspersky HEUR:Backdoor.Linux.Tsunami.bh 20190101
MAX malware (ai score=87) 20190101
McAfee Linux64/DDoS-Kaiten.gen.a 20190101
McAfee-GW-Edition Linux64/DDoS-Kaiten.gen.a 20190101
Microsoft Backdoor:Linux/Tsunami 20181231
eScan Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
Qihoo-360 virus.elf.tsunami.gen 20190101
Rising Backdoor.Tsunami!1.A1B2 (CLASSIC) 20190101
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Linux/Tsunami-A 20190101
Symantec Linux.Backdoor.Kaiten 20181231
Tencent Backdoor.Linux.Tsunami.x 20190101
TrendMicro ELF_KAITEN.SM 20190101
TrendMicro-HouseCall ELF_KAITEN.SM 20190101
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Tsunami.bh 20190101
Acronis 20181227
AegisLab 20190101
Alibaba 20180921
Antiy-AVL 20190101
Avast-Mobile 20181231
Avira (no cloud) 20181231
Babable 20180918
Baidu 20181207
Bkav 20181227
CMC 20181231
Comodo 20190101
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190101
Cyren 20190101
eGambit 20190101
Endgame 20181108
F-Prot 20190101
Ikarus 20181231
Sophos ML 20181128
Jiangmin 20190101
K7AntiVirus 20181231
K7GW 20181231
Kingsoft 20190101
Malwarebytes 20190101
NANO-Antivirus 20190101
Palo Alto Networks (Known Signatures) 20190101
Panda 20181231
SUPERAntiSpyware 20181226
TACHYON 20190101
TheHacker 20181230
TotalDefense 20181231
Trapmine 20181205
Trustlook 20190101
VBA32 20181229
ViRobot 20190101
Webroot 20190101
Yandex 20181229
Zillya 20181231
Zoner 20190101
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Advanced Micro Devices X86-64 machines.
ELF Header
Class ELF64
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Advanced Micro Devices X86-64
Object file version 0x1
Program headers 3
Section headers 15
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.eh_frame
.ctors
.dtors
.jcr
.data
.bss
Segment without sections
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
64 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
AMD x86-64

Execution parents
File identification
MD5 6db3df3aabefc16d5cd1fa4875233a66
SHA1 375503105e7fd43eb5aebfe2f1a418617deeeb8e
SHA256 1a279fb528f4e6bd392f733b71f78006d8a25616dbae211d621273429506d063
ssdeep
3072:SLvQhMo8ANnOPM0Q3r4lVazS65WH61slN1xMPg0lxeauoqo1s8NGQLSKBAI0fosr:tujQmES9AAT0lx1uoNfNGQLSKBAI0fog

File size 185.2 KB ( 189604 bytes )
File type ELF
Magic literal
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
64bits elf

VirusTotal metadata
First submission 2019-01-01 07:55:53 UTC ( 4개월, 3주 전 )
Last submission 2019-05-10 12:35:07 UTC ( 2주, 1일 전 )
파일 이름 369
x86_64
36
24
zbetcheckin_tracker_x86_64
32
171
56
44
214
284
43
29
x86_64
19
37
74
댓글이 없습니다.. 이 항목에 대해 댓글을 작성한 바이러스토탈 커뮤니티 회원이 아직 없습니다. 첫 번째로 댓글을 작성해 보십시오!

댓글 남기기...

?
댓글 달기

로그인 안됨. 등록된 사용자만 댓글을 남길 수 있습니다. 로그인하여 댓글을 남겨보십시오!

투표가 없습니다.. 아직 이 항목에 투표한 사람이 없습니다. 첫 번째로 투표해 보십시오!