

Multiple Google Chrome Vulnerabilities
February 5, 2025
Quasar RAT aka CinaRAT – Active IOCs
February 5, 2025
Multiple Google Chrome Vulnerabilities
February 5, 2025
Quasar RAT aka CinaRAT – Active IOCs
February 5, 2025Severity
High
Analysis Summary
Gafgyt is a type of malware that is used to conduct Distributed Denial of Service (DDoS) attacks. These attacks involve overwhelming a targeted website or server with a large amount of traffic to disrupt its normal functioning. Gafgyt malware is typically spread through phishing emails or by exploiting vulnerabilities in poorly secured Internet of Things (IoT) devices, such as routers and cameras. Once a device is infected, it can be controlled remotely by the attackers and used as part of a botnet to launch DDoS attacks. These botnets can be used to target websites or servers, and they have been used to disrupt a wide range of online services in the past. The TTPs (Tactics, Techniques, and Procedures) used by Gafgyt malware include:
- Exploiting vulnerabilities: Gafgyt malware is often spread by exploiting known vulnerabilities in IoT devices, such as routers and cameras.
- Phishing emails: Gafgyt malware can also be spread through phishing emails that contain malicious links or attachments.
- Botnet: Once a device is infected, it becomes part of a botnet controlled by the attackers, which is used to launch DDoS attacks.
- DDoS attacks: This malware is primarily used to conduct DDoS attacks, which involve overwhelming a targeted website or server with a large amount of traffic to disrupt its normal functioning.
- Evasion: The malware is also known to have an advanced evasion technique, which allows it to avoid detection by security software.
- Reconnaissance: Gafgyt malware also can scan the network and identify other vulnerable devices that can be infected and added to the botnet.
The malware is known to be modular, which allows attackers to add new capabilities to the malware as needed. This makes it a versatile threat that can be used for a wide range of attacks. Organizations should be aware of the threat posed by Gafgyt malware and take appropriate measures to protect their networks from DDoS attacks, such as implementing DDoS mitigation solutions.
Impact
- Server Outage
- Data Loss
- Website Downtime
Indicators of Compromise
MD5
48be25f4cc794c3d6f88dc3ad4cb1232
ac5e4d065c9a878211b80af6a72a884b
b6f651b3e102c3757dea1a34dd85c535
48b75f3f10063d5d0fc4a346e1258f34
558e051adb7490cc8fc6b921f311f5b3
e86561cd2810c301a82b437a48872c3a
SHA-256
acc75f2370c72d561f2e2c6abcd756d5bbb049616256e245833be2262e2511a5
5ff07a5cc2a875e5e45c3d395cd5dc97d554b6c5ca27f663cc0503be1dec9e52
b3bf3fcecd11a71336dcab4de0c7417f6f4e8ab74bec2186ff06330716896017
59c773763346604b770d0e374a862afabe64ffa06b29e93e14f585290bd7f47e
4ac39b25aadce1dd2f44c3029690ba41451a30adf4ac22237fb2ffdec241e9d6
772a1c38ad1ed8dbd5944111efd4b476c74e19b6b38f11c7f80470abff653894
SHA-1
1eee4c6dce4fe607fbef06476b055982b9d13910
8b1a0ac79eb367a49f0a2cb67a1a480d89d13fee
5f201855a63860f09e338a6ed871d6f44341c434
0d9f5c2fd4fa6853a255b496cb3d7dd806cb3ada
b31f230ad273a75f8e19996af8205b2340fe8c15
166906a87125fb0bd1c996a631bbf7d21c722d7b
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Upgrade your operating system.
- Don't open files and links from unknown sources.
- Install and run anti-virus scans.