General
-
Target
8a3e395f9e92ee3c0b91f5ab40504d3f
-
Size
147KB
-
Sample
231220-gvsexsfack
-
MD5
8a3e395f9e92ee3c0b91f5ab40504d3f
-
SHA1
e48debc2d22dcee9334a998d546bde713b05d66f
-
SHA256
bdf4924b24a9da4e6f8b60b3db73c5590f94c24b1eedf17149baaa83da4de9bf
-
SHA512
b54e0637080eb82e3c1f64f6ac965ffe9346bc7dca6aa198beb5318afaa0641e64aff9fd8c810d69150d64c33447fa31e1747c6e14a99a4d25eb980f1c78b703
-
SSDEEP
3072:PDIIWvqZ54vyX9wc7qwzL/gXUzz3rMGVR7zIj1jr:nqqZ54KNL7qOzz3rMGVR7zIj1jr
Behavioral task
behavioral1
Sample
8a3e395f9e92ee3c0b91f5ab40504d3f
Resource
debian9-mipsbe-20231215-en
Malware Config
Extracted
gafgyt
46.29.163.200:871
Targets
-
-
Target
8a3e395f9e92ee3c0b91f5ab40504d3f
-
Size
147KB
-
MD5
8a3e395f9e92ee3c0b91f5ab40504d3f
-
SHA1
e48debc2d22dcee9334a998d546bde713b05d66f
-
SHA256
bdf4924b24a9da4e6f8b60b3db73c5590f94c24b1eedf17149baaa83da4de9bf
-
SHA512
b54e0637080eb82e3c1f64f6ac965ffe9346bc7dca6aa198beb5318afaa0641e64aff9fd8c810d69150d64c33447fa31e1747c6e14a99a4d25eb980f1c78b703
-
SSDEEP
3072:PDIIWvqZ54vyX9wc7qwzL/gXUzz3rMGVR7zIj1jr:nqqZ54KNL7qOzz3rMGVR7zIj1jr
Score7/10-
Changes its process name
-
Deletes itself
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-