General
-
Target
7ce8e36a0fc6af3dd1c6b2dee1f9f1e2
-
Size
234KB
-
Sample
231220-cpngkagafl
-
MD5
7ce8e36a0fc6af3dd1c6b2dee1f9f1e2
-
SHA1
9ec52e8e39a41573c3809b0bc165e07dfa575c98
-
SHA256
3cf067e092f0b1758b594b683c4daaf107fed81e690498e09277d1124aec7bea
-
SHA512
11a20f9ab43c3dad1a9d16979f9e6740ea4fea3aed9b08372e9227904fd2745da879a28276d84d90e038c3abcbc63713203b604c5124b74097fda7752ce22bbb
-
SSDEEP
3072:n49P9kyRI1s1329FrvaQOEqR/49qHEkuOSX:n4Rn6q1G984qR/49qHEkuOSX
Behavioral task
behavioral1
Sample
7ce8e36a0fc6af3dd1c6b2dee1f9f1e2
Resource
debian9-mipsel-20231215-en
Malware Config
Extracted
gafgyt
80.211.61.21:23
Targets
-
-
Target
7ce8e36a0fc6af3dd1c6b2dee1f9f1e2
-
Size
234KB
-
MD5
7ce8e36a0fc6af3dd1c6b2dee1f9f1e2
-
SHA1
9ec52e8e39a41573c3809b0bc165e07dfa575c98
-
SHA256
3cf067e092f0b1758b594b683c4daaf107fed81e690498e09277d1124aec7bea
-
SHA512
11a20f9ab43c3dad1a9d16979f9e6740ea4fea3aed9b08372e9227904fd2745da879a28276d84d90e038c3abcbc63713203b604c5124b74097fda7752ce22bbb
-
SSDEEP
3072:n49P9kyRI1s1329FrvaQOEqR/49qHEkuOSX:n4Rn6q1G984qR/49qHEkuOSX
Score7/10-
Changes its process name
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-