General

  • Target

    305c820716978e6f9852e6995960e71c

  • Size

    155KB

  • Sample

    231219-2tta2sechr

  • MD5

    305c820716978e6f9852e6995960e71c

  • SHA1

    913bf0de30e2f0fcda32c92b898ef3e0b4a90d3d

  • SHA256

    a659c57ae616d525bd90853cfaafcfa312b755b2911851d3c56194001a8d751a

  • SHA512

    11294348c43e1361ca027d53b9e5073a4f141647e83399bb3bb1831a6742b32930f3222031be6959e4622202dd99d851d9939f8f343a543738f3b2c19b79f790

  • SSDEEP

    3072:v8LtDtdDdGRDtetv8YVkHN/rPZTL/9qKuzSUlE1EvqC:hRhev83lrPZXlqKuzSUlE1EvqC

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

176.123.26.89:23

Targets

    • Target

      305c820716978e6f9852e6995960e71c

    • Size

      155KB

    • MD5

      305c820716978e6f9852e6995960e71c

    • SHA1

      913bf0de30e2f0fcda32c92b898ef3e0b4a90d3d

    • SHA256

      a659c57ae616d525bd90853cfaafcfa312b755b2911851d3c56194001a8d751a

    • SHA512

      11294348c43e1361ca027d53b9e5073a4f141647e83399bb3bb1831a6742b32930f3222031be6959e4622202dd99d851d9939f8f343a543738f3b2c19b79f790

    • SSDEEP

      3072:v8LtDtdDdGRDtetv8YVkHN/rPZTL/9qKuzSUlE1EvqC:hRhev83lrPZXlqKuzSUlE1EvqC

    Score
    9/10
    • Contacts a large (6921) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks