General

  • Target

    b56a89db553d4d927f661f6ff268cd94bdcfe341fd75ba4e7c464946416ac309_JC.elf

  • Size

    93KB

  • MD5

    86acf9b7f8f74da678a9cdce3ddaa1f3

  • SHA1

    a1d103d3bbc9792a3fd2b95378e1009a2003ec5c

  • SHA256

    b56a89db553d4d927f661f6ff268cd94bdcfe341fd75ba4e7c464946416ac309

  • SHA512

    c03eb8662339158be606c19cec72d0c251c4baf7aee24ee2b26ef65ba169f271daf3eb3c987a69590258ba06e7ea7bab9b63cd759d4f60e7e21db43174cf7e71

  • SSDEEP

    1536:47aIPFobybZqHvyjZlf1hD6AdWZG87Hyr3i5bDWmSolWHrIeMXshl:eabybZqPyj71hD6A2G87HyDi5bDWmZl6

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

45.61.184.126:2782

Signatures

  • Contains strings common to LOLSquad DDoS tools 1 IoCs

    Resembles a range of public tools written in C intended for DDoS attacks.

  • Detected Gafgyt variant 1 IoCs
  • Gafgyt family

Files

  • b56a89db553d4d927f661f6ff268cd94bdcfe341fd75ba4e7c464946416ac309_JC.elf
    .elf linux x64