General

  • Target

    045a0e109d566f27021ab20aa6c7ceb29895a5b8512f5de0c4bdc4282971e5f9_JC.elf

  • Size

    129KB

  • MD5

    8d4ca7ee2e6b7933c6144c2b01e9c1ac

  • SHA1

    8a0ccdabcc401dace328c823641f998c75c39bf1

  • SHA256

    045a0e109d566f27021ab20aa6c7ceb29895a5b8512f5de0c4bdc4282971e5f9

  • SHA512

    ef7b684b4b5f9b9cc61590a1bc18a05ee2c2da84e33692d18840a13af31e03bf09c677e4a2fd619797fe48edc79f940a60f160070d6127d4533dae99861e46db

  • SSDEEP

    1536:Xv62u+4zrOy+D1X/n70Z2rKiEuWx72vdhOeksI6U/TontmV/mGo+hFCHhnfuel:fZ+Nx72vdhtJUcs/mG3hFCHZfuel

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

45.61.184.126:2782

Signatures

  • Contains strings common to LOLSquad DDoS tools 1 IoCs

    Resembles a range of public tools written in C intended for DDoS attacks.

  • Detected Gafgyt variant 1 IoCs
  • Gafgyt family

Files

  • 045a0e109d566f27021ab20aa6c7ceb29895a5b8512f5de0c4bdc4282971e5f9_JC.elf
    .elf linux mipsbe