General

  • Target

    p-p.c.blaze.elf

  • Size

    109KB

  • MD5

    4182f47d9d7ed43d6cd3f2b0037f5ef4

  • SHA1

    4596826ade8585ab5d5d296a41c0dfd857136b0a

  • SHA256

    01624a4e07b1ea99636436b97f86621e1eae96a0334ac782a10fb7608c8ebfc8

  • SHA512

    928a784d55df00695a5ac8d4c7868125253a4f6bb2f48e5fa3df75e256b51626ed96f4cc3d936b5a92f017d4669e26696f69e2ff7864cab42195061ff73caaf7

  • SSDEEP

    3072:3go75GVOtFjFU32alD0CCLmcsrQPbV8fBul:3EEj42alDYLmcsrQPbV8fBul

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

45.61.184.126:2782

Signatures

  • Contains strings common to LOLSquad DDoS tools 1 IoCs

    Resembles a range of public tools written in C intended for DDoS attacks.

  • Detected Gafgyt variant 1 IoCs
  • Gafgyt family

Files

  • p-p.c.blaze.elf
    .elf linux arm