General

  • Target

    cfe3adbbc9d09bc15a7e8be04c938ae2bb379489194075099eccc6e6d5d2b0f2_JC.elf

  • Size

    122KB

  • MD5

    e69ee3f7fd49ac99778c35dcac6e2fcd

  • SHA1

    68469e3a32d1727763ad12acde2195f44390e615

  • SHA256

    cfe3adbbc9d09bc15a7e8be04c938ae2bb379489194075099eccc6e6d5d2b0f2

  • SHA512

    06686b0ef69479e52588b8af539697509be3218dcb73410f2fcd5d14e48e7af8f30259661970c5f813f33237990152c2bb089bbfc498306e37c2e118d0d32cf5

  • SSDEEP

    3072:2gQPIVBtii0za/T7Yc1v5AuJgIOVfsnUmXQRshXqwQ:RNBtii0za/T7DJgIOFsnUmXQRs1qwQ

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

45.61.184.126:2782

Signatures

  • Contains strings common to LOLSquad DDoS tools 1 IoCs

    Resembles a range of public tools written in C intended for DDoS attacks.

  • Detected Gafgyt variant 1 IoCs
  • Gafgyt family

Files

  • cfe3adbbc9d09bc15a7e8be04c938ae2bb379489194075099eccc6e6d5d2b0f2_JC.elf
    .elf linux arm