General

  • Target

    m-6.8-k.Logicnet.elf

  • Size

    156KB

  • Sample

    241122-w2e6ha1qcq

  • MD5

    19aeb425aa11510ba4d8f6bde0c2bebe

  • SHA1

    7cccba8567b084ba870dce88c7da597313264260

  • SHA256

    35c8622596f89014d9e44b634610c2f6940406aa45918a873e808f94af4e4913

  • SHA512

    dd68d5948d2e3c27526245ec4516883f4e64f209fcbfc322700029a05d991c43832f84b1ce0d1d1db9d16bdcb39199ecabd362a2dfb7046625e427bb5f3c859f

  • SSDEEP

    3072:T1g2/eINNlzx2kkQCMOaQcvBKYnyLRM/9pSQomFwfBxKQodn:hg2hNNlzIkk/MOa/UYnydM/9LomFwfBC

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

188.245.84.178:1865

Targets

    • Target

      m-6.8-k.Logicnet.elf

    • Size

      156KB

    • MD5

      19aeb425aa11510ba4d8f6bde0c2bebe

    • SHA1

      7cccba8567b084ba870dce88c7da597313264260

    • SHA256

      35c8622596f89014d9e44b634610c2f6940406aa45918a873e808f94af4e4913

    • SHA512

      dd68d5948d2e3c27526245ec4516883f4e64f209fcbfc322700029a05d991c43832f84b1ce0d1d1db9d16bdcb39199ecabd362a2dfb7046625e427bb5f3c859f

    • SSDEEP

      3072:T1g2/eINNlzx2kkQCMOaQcvBKYnyLRM/9pSQomFwfBxKQodn:hg2hNNlzIkk/MOa/UYnydM/9LomFwfBC

    Score
    6/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks