Behavioral task
behavioral1
Sample
1e1407dc61d3ec7033a114ac3d7f40b31c766f3ea0d4c1ee39067e7c703b0a10.elf
Resource
debian9-armhf-20221111-en
2 signatures
150 seconds
General
-
Target
1e1407dc61d3ec7033a114ac3d7f40b31c766f3ea0d4c1ee39067e7c703b0a10.zip
-
Size
64KB
-
MD5
1fee868a77a108ebcd7686b3a57747d9
-
SHA1
c6304511bd1355131d05f9b8a9b57bba06ed64c7
-
SHA256
a043506afa651856512dcd8edcf31e096ec34a95f898f9b0464470dc818a3740
-
SHA512
38955b1e812d7c6aac992c2a1af4d587a1321e3e4d8a129463f3205be16808eaaa59534835296a9881b59157a6771b1ea638796af9c11c2da7e1aa08714b2f0c
-
SSDEEP
1536:y3zMTNy6vYyrgn6RmG07t4Wyx+XLIcpfPi6WZj+fU6claerVAnKRrEHW:wzMYDn6gZdX/wQlYhAnKRrE2
Score
10/10
Malware Config
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule static1/unpack001/1e1407dc61d3ec7033a114ac3d7f40b31c766f3ea0d4c1ee39067e7c703b0a10.elf family_gafgyt -
Gafgyt family
Files
-
1e1407dc61d3ec7033a114ac3d7f40b31c766f3ea0d4c1ee39067e7c703b0a10.zip.zip
Password: infected
-
1e1407dc61d3ec7033a114ac3d7f40b31c766f3ea0d4c1ee39067e7c703b0a10.elf.elf linux arm