General

  • Target

    0c41ca840aa2b6b375c2a03c73dbe4cd

  • Size

    160KB

  • Sample

    231219-2d4rvabfa2

  • MD5

    0c41ca840aa2b6b375c2a03c73dbe4cd

  • SHA1

    61a8967e5a7b31a1f0b6dd58128a321c59b347a9

  • SHA256

    1967f00f240c9365408700789866fbee7c0fdaedc8a9fafe84390b23b0e85d15

  • SHA512

    c3cd450a3f8f6ef6a7893a92a7acacf87a07294087b94a324503778a84b784ffac031dca8b3aa3850e1769f668fda970da0b9d4df8ff42f7cdcd8a958f1afaed

  • SSDEEP

    3072:pQrBzuvjgC/m/uND3wGiTagGFBhGzH/6f/etJ8add9QzhsfNjeQqjmyOQ0LOXDtZ:pTwG8a1FaL6f/etJ8addQWNjenjmyOQP

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

206.189.17.155:23

Targets

    • Target

      0c41ca840aa2b6b375c2a03c73dbe4cd

    • Size

      160KB

    • MD5

      0c41ca840aa2b6b375c2a03c73dbe4cd

    • SHA1

      61a8967e5a7b31a1f0b6dd58128a321c59b347a9

    • SHA256

      1967f00f240c9365408700789866fbee7c0fdaedc8a9fafe84390b23b0e85d15

    • SHA512

      c3cd450a3f8f6ef6a7893a92a7acacf87a07294087b94a324503778a84b784ffac031dca8b3aa3850e1769f668fda970da0b9d4df8ff42f7cdcd8a958f1afaed

    • SSDEEP

      3072:pQrBzuvjgC/m/uND3wGiTagGFBhGzH/6f/etJ8add9QzhsfNjeQqjmyOQ0LOXDtZ:pTwG8a1FaL6f/etJ8addQWNjenjmyOQP

    Score
    7/10
    • Changes its process name

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks