General

  • Target

    723c71e75b9b0fc8c05136b38ccd8d67

  • Size

    203KB

  • Sample

    231220-af98vsdhe8

  • MD5

    723c71e75b9b0fc8c05136b38ccd8d67

  • SHA1

    bb34144ae9c0a55c1ed8b3d0c9924caf7049575d

  • SHA256

    2c68d8328945653a501e61444aca29b9d1aba6942439ed73cfaa15c8623f5770

  • SHA512

    fa90b81b3d29f6b771101e82c98783290d9f6317b01547c0fad3f869abf870df78877751b74eeba1ff16c60a78f1cd628e286aa16ff548752c511631a768a3ef

  • SSDEEP

    3072:VykagYQ9ACfN+MIbkWX4dT6+IYuyrJWtT9raedxGz9KP9LKO4VmNZKh24FCtZp20:VykdxKOam/IAClM9MNlqZTmyN4942Yk

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

18.225.17.56:6464

Targets

    • Target

      723c71e75b9b0fc8c05136b38ccd8d67

    • Size

      203KB

    • MD5

      723c71e75b9b0fc8c05136b38ccd8d67

    • SHA1

      bb34144ae9c0a55c1ed8b3d0c9924caf7049575d

    • SHA256

      2c68d8328945653a501e61444aca29b9d1aba6942439ed73cfaa15c8623f5770

    • SHA512

      fa90b81b3d29f6b771101e82c98783290d9f6317b01547c0fad3f869abf870df78877751b74eeba1ff16c60a78f1cd628e286aa16ff548752c511631a768a3ef

    • SSDEEP

      3072:VykagYQ9ACfN+MIbkWX4dT6+IYuyrJWtT9raedxGz9KP9LKO4VmNZKh24FCtZp20:VykdxKOam/IAClM9MNlqZTmyN4942Yk

    Score
    7/10
    • Changes its process name

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks