General

  • Target

    a89e13562d26a569447d231492f82707463ccaa00b09a54668889ac35b61f1d8.elf

  • Size

    156KB

  • Sample

    241214-pk3rxatkhj

  • MD5

    f4e4ec698146a29e6a4dea6caee872a7

  • SHA1

    cc9116b147db92b9f688ac91348646d14ec300b9

  • SHA256

    a89e13562d26a569447d231492f82707463ccaa00b09a54668889ac35b61f1d8

  • SHA512

    2ccd22886ca48c407a35046082b653a16a1e7df3ffe23028a10a82a1bf758681cfc8effc3a8ab9b8d4012aed30d5c9c13148540baf0156333c635fad8d03d21e

  • SSDEEP

    3072:T1g2/eINNlzx2kkQCMOaQcvBGYnyLRM/9pSQomFwfBxKQodn:hg2hNNlzIkk/MOa/UYnydM/9LomFwfBC

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

154.213.187.62:1865

Targets

    • Target

      a89e13562d26a569447d231492f82707463ccaa00b09a54668889ac35b61f1d8.elf

    • Size

      156KB

    • MD5

      f4e4ec698146a29e6a4dea6caee872a7

    • SHA1

      cc9116b147db92b9f688ac91348646d14ec300b9

    • SHA256

      a89e13562d26a569447d231492f82707463ccaa00b09a54668889ac35b61f1d8

    • SHA512

      2ccd22886ca48c407a35046082b653a16a1e7df3ffe23028a10a82a1bf758681cfc8effc3a8ab9b8d4012aed30d5c9c13148540baf0156333c635fad8d03d21e

    • SSDEEP

      3072:T1g2/eINNlzx2kkQCMOaQcvBGYnyLRM/9pSQomFwfBxKQodn:hg2hNNlzIkk/MOa/UYnydM/9LomFwfBC

    Score
    6/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks