General

  • Target

    0a152100e296908bed608a26265749658d58d7e9913de932ad8f450ac77b15d2.elf

  • Size

    162KB

  • Sample

    240330-cfg87afd48

  • MD5

    35dabe2728a4bf848f7049df93ecb036

  • SHA1

    a57b2962d2d645482c84936f0a322bf09fcda04d

  • SHA256

    0a152100e296908bed608a26265749658d58d7e9913de932ad8f450ac77b15d2

  • SHA512

    b1eef7afe05f252132b19bc5ba1a2b7d14b8ff9912b36bc88d836ece847cf6e739535354f34ecd655e3c6d7d3b6e9f35f546df0c4da30ecd4842ca93092941b5

  • SSDEEP

    3072:EEz42nad2snP1yJShni71cvvK5SXeN+NV7sWmJhny2qAQYzc:znad2sn9yqi7mvvKcXeN+NV7sWmJhnyL

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

193.35.18.56:65490

Targets

    • Target

      0a152100e296908bed608a26265749658d58d7e9913de932ad8f450ac77b15d2.elf

    • Size

      162KB

    • MD5

      35dabe2728a4bf848f7049df93ecb036

    • SHA1

      a57b2962d2d645482c84936f0a322bf09fcda04d

    • SHA256

      0a152100e296908bed608a26265749658d58d7e9913de932ad8f450ac77b15d2

    • SHA512

      b1eef7afe05f252132b19bc5ba1a2b7d14b8ff9912b36bc88d836ece847cf6e739535354f34ecd655e3c6d7d3b6e9f35f546df0c4da30ecd4842ca93092941b5

    • SSDEEP

      3072:EEz42nad2snP1yJShni71cvvK5SXeN+NV7sWmJhny2qAQYzc:znad2sn9yqi7mvvKcXeN+NV7sWmJhnyL

    Score
    7/10
    • Changes its process name

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks