General
-
Target
893c092c73eee4d4e6a353202c683ecb
-
Size
162KB
-
Sample
231220-gkz21shgg2
-
MD5
893c092c73eee4d4e6a353202c683ecb
-
SHA1
2cac34d1f613cb6e0c519caaab44235f89c10cfe
-
SHA256
a3ddadfec60cc60727a82d7a6b263f3a6e923b3b9351f823ca07933f09780e43
-
SHA512
aaaf5ec43d10ed4ab07c70d5a3b6aac0a48d952d1e61db7ba0e55bd5fe0b5da24d1a3cc49d99908d740e8c754c03304b974530ac112b258d649e57d635b75f32
-
SSDEEP
3072:QJ7YqnXli5bMiPletJ8au49Quhs1RNsM/rjfiW2nLsJiBeGW:u7JGbfletJ8au4lIRL/rjfiW2nLsEBe9
Behavioral task
behavioral1
Sample
893c092c73eee4d4e6a353202c683ecb
Resource
debian9-mipsbe-20231215-en
Malware Config
Extracted
gafgyt
138.68.238.104:1749
Targets
-
-
Target
893c092c73eee4d4e6a353202c683ecb
-
Size
162KB
-
MD5
893c092c73eee4d4e6a353202c683ecb
-
SHA1
2cac34d1f613cb6e0c519caaab44235f89c10cfe
-
SHA256
a3ddadfec60cc60727a82d7a6b263f3a6e923b3b9351f823ca07933f09780e43
-
SHA512
aaaf5ec43d10ed4ab07c70d5a3b6aac0a48d952d1e61db7ba0e55bd5fe0b5da24d1a3cc49d99908d740e8c754c03304b974530ac112b258d649e57d635b75f32
-
SSDEEP
3072:QJ7YqnXli5bMiPletJ8au49Quhs1RNsM/rjfiW2nLsJiBeGW:u7JGbfletJ8au4lIRL/rjfiW2nLsEBe9
Score7/10-
Changes its process name
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-