General

  • Target

    0b44d94f8eede7b52a4f9465922baf36a4f119e12718b1dab0660fa53b56a4e2_JC.elf

  • Size

    104KB

  • MD5

    01814124e110aa06db97a6538c91697f

  • SHA1

    7c7deb0d14af9abd8a342502b741e936c8741005

  • SHA256

    0b44d94f8eede7b52a4f9465922baf36a4f119e12718b1dab0660fa53b56a4e2

  • SHA512

    4aa785be921cd7c85c74b3a3bd0c7f289ad22c9ce928a566cd49f39bc87aaec153efd22707e0734fd30fe65ed39bf3c2b7e663c2fd3971a31b5b0972096c55a6

  • SSDEEP

    3072:ksoH5GVt6YSU+a60nDRwYGAmvPqQphwxfZol:kUJSnp0nDLmvPqQphwxfZol

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

45.61.184.126:2782

Signatures

  • Contains strings common to LOLSquad DDoS tools 1 IoCs

    Resembles a range of public tools written in C intended for DDoS attacks.

  • Detected Gafgyt variant 1 IoCs
  • Gafgyt family

Files

  • 0b44d94f8eede7b52a4f9465922baf36a4f119e12718b1dab0660fa53b56a4e2_JC.elf
    .elf linux arm