General

  • Target

    1951ee3a215c962ead131c0a43debea3a8ddfa53988316eec3e5ea76eb511421_JC.elf

  • Size

    88KB

  • MD5

    2f604696bd8f002eba9b504b45167880

  • SHA1

    0acdf40b339e27edd9eec4d1859d05a71ac3afed

  • SHA256

    1951ee3a215c962ead131c0a43debea3a8ddfa53988316eec3e5ea76eb511421

  • SHA512

    d58377fe6bb7be37a75802b60da231f0f2c2cc60136ad720c470ed65bb10b8ac565adb7d9feb632bb7f55a81932eab702aec7e538afe07ab3c16a280ef18bfe5

  • SSDEEP

    1536:Do0U3IYoPyCPCTwQKDScoo41KhOQ4ZCN73mQEfVjywPsTLgx:G3SqCaTw3DN41FZuTmpfVjyCsTLgx

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

45.61.184.126:2782

Signatures

  • Contains strings common to LOLSquad DDoS tools 1 IoCs

    Resembles a range of public tools written in C intended for DDoS attacks.

  • Detected Gafgyt variant 1 IoCs
  • Gafgyt family

Files

  • 1951ee3a215c962ead131c0a43debea3a8ddfa53988316eec3e5ea76eb511421_JC.elf
    .elf linux sh