General

  • Target

    d76528b01567717b9087ea2e6e8406d0a495b705e5d988fa1c3e4a631a331878.elf

  • Size

    155KB

  • Sample

    240702-cj1jyawcrj

  • MD5

    ce593e30e5cd2fb038b00241ab016276

  • SHA1

    5c3265a8d49fcf3f7c81283a74c08c94c71f0d35

  • SHA256

    d76528b01567717b9087ea2e6e8406d0a495b705e5d988fa1c3e4a631a331878

  • SHA512

    1de276831be2e93de4377136193994022bac9b367df73f79ea7af6c71f639c95920837f1d4c080359e53156b3da2f203dbf0c9abf7fe454ff96084dd139d329e

  • SSDEEP

    3072:xUL2FlZkJoC2gQXalWvRbf4phahpCn38nuVAlZl3nmBT38dAY4:xDvh4phabkBwXmBT38dAY4

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

209.141.57.51:4444

Targets

    • Target

      d76528b01567717b9087ea2e6e8406d0a495b705e5d988fa1c3e4a631a331878.elf

    • Size

      155KB

    • MD5

      ce593e30e5cd2fb038b00241ab016276

    • SHA1

      5c3265a8d49fcf3f7c81283a74c08c94c71f0d35

    • SHA256

      d76528b01567717b9087ea2e6e8406d0a495b705e5d988fa1c3e4a631a331878

    • SHA512

      1de276831be2e93de4377136193994022bac9b367df73f79ea7af6c71f639c95920837f1d4c080359e53156b3da2f203dbf0c9abf7fe454ff96084dd139d329e

    • SSDEEP

      3072:xUL2FlZkJoC2gQXalWvRbf4phahpCn38nuVAlZl3nmBT38dAY4:xDvh4phabkBwXmBT38dAY4

    Score
    6/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks