General
-
Target
185c3f97143aa08e42d31417a0801280
-
Size
154KB
-
Sample
231219-2jrdpsadak
-
MD5
185c3f97143aa08e42d31417a0801280
-
SHA1
603711cbe1795c67d79c2cfe063fb16d9d5b2edb
-
SHA256
8ff559677f083bac666a7c8ccf0674640f5a22811546a2436c113103fd375c16
-
SHA512
dc2ea8e21586168b7fc705edaecdfad1d20fab14be27637ed6ba50a3f611172a459d4c38f7210012d00b1306f748a8f9cfed1529d3235790d297d1b261c555c8
-
SSDEEP
3072:yZunGx0aWAGJh1IETovStE20ZP4RNCetJ8add9QzhsKWnlMW2fwDXLqCQSUfWvQI:ytvGE794aetJ8addQHWnlkwDXLqCQSUW
Behavioral task
behavioral1
Sample
185c3f97143aa08e42d31417a0801280
Resource
debian9-armhf-20231215-en
Malware Config
Extracted
gafgyt
206.189.205.246:666
Targets
-
-
Target
185c3f97143aa08e42d31417a0801280
-
Size
154KB
-
MD5
185c3f97143aa08e42d31417a0801280
-
SHA1
603711cbe1795c67d79c2cfe063fb16d9d5b2edb
-
SHA256
8ff559677f083bac666a7c8ccf0674640f5a22811546a2436c113103fd375c16
-
SHA512
dc2ea8e21586168b7fc705edaecdfad1d20fab14be27637ed6ba50a3f611172a459d4c38f7210012d00b1306f748a8f9cfed1529d3235790d297d1b261c555c8
-
SSDEEP
3072:yZunGx0aWAGJh1IETovStE20ZP4RNCetJ8add9QzhsKWnlMW2fwDXLqCQSUfWvQI:ytvGE794aetJ8addQHWnlkwDXLqCQSUW
Score7/10-
Changes its process name
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-