General
-
Target
4df0ecaa4d792c905b9dc8477f818aac
-
Size
191KB
-
Sample
231219-26n7vseea6
-
MD5
4df0ecaa4d792c905b9dc8477f818aac
-
SHA1
d1214e3de6b37e7274944924cec73cfd7d9d8c04
-
SHA256
0377ea5adbba5b46daa1c12209af1965681df3591d2af57028b3842939d28f66
-
SHA512
f63f7eb04a27929fc7c3360cb92dbd4ab59654afb33b7f8a557b34d06609c1a3f132199fa70047eb5c7733b3a8ab17ddf02559cfe57c5177b8a4e735947b1f81
-
SSDEEP
3072:V6fn44GXq11zXqwL5SlNZf1t3aLUUGPN5ibtNf8eNgJs124hvc5PsEsEUxxQLyJi:VonUfLjih9jIPZbhcsoZCQ9gOS1SeX
Behavioral task
behavioral1
Sample
4df0ecaa4d792c905b9dc8477f818aac
Resource
debian9-armhf-20231215-en
Malware Config
Extracted
gafgyt
167.99.190.225:812
Targets
-
-
Target
4df0ecaa4d792c905b9dc8477f818aac
-
Size
191KB
-
MD5
4df0ecaa4d792c905b9dc8477f818aac
-
SHA1
d1214e3de6b37e7274944924cec73cfd7d9d8c04
-
SHA256
0377ea5adbba5b46daa1c12209af1965681df3591d2af57028b3842939d28f66
-
SHA512
f63f7eb04a27929fc7c3360cb92dbd4ab59654afb33b7f8a557b34d06609c1a3f132199fa70047eb5c7733b3a8ab17ddf02559cfe57c5177b8a4e735947b1f81
-
SSDEEP
3072:V6fn44GXq11zXqwL5SlNZf1t3aLUUGPN5ibtNf8eNgJs124hvc5PsEsEUxxQLyJi:VonUfLjih9jIPZbhcsoZCQ9gOS1SeX
Score7/10-
Changes its process name
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-