General

  • Target

    35ade707e40b3adfff9d45e1b8889c26cc81673e132f9573096ca4016db59be2.elf

  • Size

    204KB

  • Sample

    240703-bldmhszbnb

  • MD5

    0df799f05c6d97e2b7d4b26c8e7246f7

  • SHA1

    90d775a7f3ebf3ff11b82a7646830bc2a330c932

  • SHA256

    35ade707e40b3adfff9d45e1b8889c26cc81673e132f9573096ca4016db59be2

  • SHA512

    6ec307ac15374d4323bd3decdc08ecd81d19e6e0446aa1cdc14877458d31229822a0d37e2936b516ad64e80d01dee5c1700bf9c6cc5f1684efff3dee12bef433

  • SSDEEP

    6144:FZzyacCwXJ4DbpW0vg5hbL6K2axVOcgym0wfB5RyAn:FZzyacCwXJ4gf5hbMylgym0mB5RyAn

Score
10/10

Malware Config

Extracted

Family

gafgyt

C2

62.72.191.203:777

Targets

    • Target

      35ade707e40b3adfff9d45e1b8889c26cc81673e132f9573096ca4016db59be2.elf

    • Size

      204KB

    • MD5

      0df799f05c6d97e2b7d4b26c8e7246f7

    • SHA1

      90d775a7f3ebf3ff11b82a7646830bc2a330c932

    • SHA256

      35ade707e40b3adfff9d45e1b8889c26cc81673e132f9573096ca4016db59be2

    • SHA512

      6ec307ac15374d4323bd3decdc08ecd81d19e6e0446aa1cdc14877458d31229822a0d37e2936b516ad64e80d01dee5c1700bf9c6cc5f1684efff3dee12bef433

    • SSDEEP

      6144:FZzyacCwXJ4DbpW0vg5hbL6K2axVOcgym0wfB5RyAn:FZzyacCwXJ4gf5hbMylgym0mB5RyAn

    Score
    6/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v13

Tasks