× Cookies被禁用! 本网站需要启用Cookie才能正常工作
SHA256: 1a279fb528f4e6bd392f733b71f78006d8a25616dbae211d621273429506d063
文件名: zbetcheckin_tracker_x86_64
检出率: 29 / 57
分析日期: 2019-01-01 07:55:53 UTC ( 4 月, 2 周 前 ) 查看最新
反病毒软件 结果 病毒库日期
Ad-Aware Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
ALYac Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
Arcabit Trojan.Backdoor.Linux.Tsunami.1 20190101
Avast ELF:Flooder-NL [Trj] 20190101
AVG ELF:Flooder-NL [Trj] 20190101
BitDefender Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
CAT-QuickHeal Backdoor.Linux.Tsunami.A 20181231
ClamAV Win.Trojan.Tsunami-5 20190101
DrWeb Linux.BackDoor.Tsunami.103 20190101
Emsisoft Gen:Variant.Backdoor.Linux.Tsunami.1 (B) 20190101
ESET-NOD32 a variant of Linux/Tsunami.NAL 20190101
F-Secure Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
Fortinet ELF/Tsunami.NBV!tr 20190101
GData Linux.Backdoor.Tsunami.A 20190101
Kaspersky HEUR:Backdoor.Linux.Tsunami.bh 20190101
MAX malware (ai score=87) 20190101
McAfee Linux64/DDoS-Kaiten.gen.a 20190101
McAfee-GW-Edition Linux64/DDoS-Kaiten.gen.a 20190101
Microsoft Backdoor:Linux/Tsunami 20181231
eScan Gen:Variant.Backdoor.Linux.Tsunami.1 20190101
Qihoo-360 virus.elf.tsunami.gen 20190101
Rising Backdoor.Tsunami!1.A1B2 (CLASSIC) 20190101
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Linux/Tsunami-A 20190101
Symantec Linux.Backdoor.Kaiten 20181231
Tencent Backdoor.Linux.Tsunami.x 20190101
TrendMicro ELF_KAITEN.SM 20190101
TrendMicro-HouseCall ELF_KAITEN.SM 20190101
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Tsunami.bh 20190101
Acronis 20181227
AegisLab 20190101
Alibaba 20180921
Antiy-AVL 20190101
Avast-Mobile 20181231
Avira (no cloud) 20181231
Babable 20180918
Baidu 20181207
Bkav 20181227
CMC 20181231
Comodo 20190101
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190101
Cyren 20190101
eGambit 20190101
Endgame 20181108
F-Prot 20190101
Ikarus 20181231
Sophos ML 20181128
Jiangmin 20190101
K7AntiVirus 20181231
K7GW 20181231
Kingsoft 20190101
Malwarebytes 20190101
NANO-Antivirus 20190101
Palo Alto Networks (Known Signatures) 20190101
Panda 20181231
SUPERAntiSpyware 20181226
TACHYON 20190101
TheHacker 20181230
TotalDefense 20181231
Trapmine 20181205
Trustlook 20190101
VBA32 20181229
ViRobot 20190101
Webroot 20190101
Yandex 20181229
Zillya 20181231
Zoner 20190101
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on Advanced Micro Devices X86-64 machines.
ELF Header
Class ELF64
Data 2's complement, little endian
Header version 1 (current)
OS ABI UNIX - System V
ABI version 0
Object file type EXEC (Executable file)
Required architecture Advanced Micro Devices X86-64
Object file version 0x1
Program headers 3
Section headers 15
ELF sections
ELF Segments
.init
.text
.fini
.rodata
.eh_frame
.ctors
.dtors
.jcr
.data
.bss
Segment without sections
Imported symbols
Exported symbols
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Little endian

CPUArchitecture
64 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
AMD x86-64

Execution parents
File identification
MD5 6db3df3aabefc16d5cd1fa4875233a66
SHA1 375503105e7fd43eb5aebfe2f1a418617deeeb8e
SHA256 1a279fb528f4e6bd392f733b71f78006d8a25616dbae211d621273429506d063
ssdeep
3072:SLvQhMo8ANnOPM0Q3r4lVazS65WH61slN1xMPg0lxeauoqo1s8NGQLSKBAI0fosr:tujQmES9AAT0lx1uoNfNGQLSKBAI0fog

File size 185.2 KB ( 189604 bytes )
File type ELF
Magic literal
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped

TrID ELF Executable and Linkable format (generic) (100.0%)
Tags
64bits elf

VirusTotal metadata
First submission 2019-01-01 07:55:53 UTC ( 4 月, 2 周 前 )
Last submission 2019-05-10 12:35:07 UTC ( 1 周, 1 天 前 )
文件名 369
x86_64
36
24
zbetcheckin_tracker_x86_64
32
171
56
44
214
284
43
29
x86_64
19
37
74
没有评论. 没有VirusTotal社区成员评论该项目,抢沙发!

发表评论

?
发表评论

您没有登录。只有注册用户可以发表评论,请登录后发表评论!

没有投票. 目前没有用户投票。