Behavioral task
behavioral1
Sample
e79f6fd8ea847e4051109a8e00088e5fd1f3ab371658691e96db888193dae3a1.elf
Resource
ubuntu1804-amd64-20230831-en
2 signatures
150 seconds
General
-
Target
6b245d02eb55a41bc881954f9ed415ac.bin
-
Size
39KB
-
MD5
5f7c3ef9776a347f3d3ff456fc715d14
-
SHA1
7335671787ab28344307f82e7800cc0efbdc8ff4
-
SHA256
a98fdc66ad7e9803502d02ba28528bda444c73547240f476b31afd9ad7e62df7
-
SHA512
faaac5c0840356b29760ce052a172af177998ee0bf4f94f33715922061dfeddd6c4004dd2af73b752f359b2a917a50cd1f84bc56a2035428556821c5994cc347
-
SSDEEP
768:vwTpeBCqZ5WKrjtT1+OUstX/BU3OnQKSMdMR9Iu9Q0oheB2wD6HwTmt7CUW:YTpeBxHrVustX/By3xMdWaLJheBR2H4p
Malware Config
Extracted
Family
gafgyt
C2
45.61.184.126:2782
Signatures
-
Contains strings common to LOLSquad DDoS tools 1 IoCs
Resembles a range of public tools written in C intended for DDoS attacks.
resource yara_rule static1/unpack001/e79f6fd8ea847e4051109a8e00088e5fd1f3ab371658691e96db888193dae3a1.elf lolsquad_ddos -
Detected Gafgyt variant 1 IoCs
resource yara_rule static1/unpack001/e79f6fd8ea847e4051109a8e00088e5fd1f3ab371658691e96db888193dae3a1.elf family_gafgyt -
Gafgyt family
Files
-
6b245d02eb55a41bc881954f9ed415ac.bin.zip
Password: infected
-
e79f6fd8ea847e4051109a8e00088e5fd1f3ab371658691e96db888193dae3a1.elf.elf linux x86