General
-
Target
48078197ccaf4f0f136aad740e87a3d4
-
Size
148KB
-
Sample
231219-24lc7aadcm
-
MD5
48078197ccaf4f0f136aad740e87a3d4
-
SHA1
f9bf4477287b2084f7fc97a194ac31510212626c
-
SHA256
5b7a98474d0dc338a480ccccd18a35d801c48bd1479d301dcbf333c1ef2d63f3
-
SHA512
e100a826fc6dc7942d0301e7ac9ebff4f2d8f71a5fc262912d8342b1ff5c3018b537d1d98ef599926414a32fe226854f197cccc9b6baf7a078bf09f684a4f7cc
-
SSDEEP
3072:16PAeP5TmnsFppXUBOnjArxt6cmNYo7Qs59Hf8GNb:6DJdjhUBeSxt6cmNYo7Qs59Hf8GNb
Behavioral task
behavioral1
Sample
48078197ccaf4f0f136aad740e87a3d4
Resource
debian9-armhf-20231215-en
Malware Config
Extracted
gafgyt
192.168.0.14:80
Targets
-
-
Target
48078197ccaf4f0f136aad740e87a3d4
-
Size
148KB
-
MD5
48078197ccaf4f0f136aad740e87a3d4
-
SHA1
f9bf4477287b2084f7fc97a194ac31510212626c
-
SHA256
5b7a98474d0dc338a480ccccd18a35d801c48bd1479d301dcbf333c1ef2d63f3
-
SHA512
e100a826fc6dc7942d0301e7ac9ebff4f2d8f71a5fc262912d8342b1ff5c3018b537d1d98ef599926414a32fe226854f197cccc9b6baf7a078bf09f684a4f7cc
-
SSDEEP
3072:16PAeP5TmnsFppXUBOnjArxt6cmNYo7Qs59Hf8GNb:6DJdjhUBeSxt6cmNYo7Qs59Hf8GNb
Score9/10-
Contacts a large (197619) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-