Malware Analysis Report

2025-08-11 05:11

Sample ID 240330-clgjvafe94
Target 4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf
SHA256 4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52
Tags
upx gafgyt
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52

Threat Level: Known bad

The file 4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf was found to be: Known bad.

Malicious Activity Summary

upx gafgyt

Gafgyt family

Detected Gafgyt variant

UPX packed file

Changes its process name

Reads system routing table

Reads system network configuration

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-30 02:09

Signatures

Detected Gafgyt variant

Description Indicator Process Target
N/A N/A N/A N/A

Gafgyt family

gafgyt

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-30 02:09

Reported

2024-03-30 02:12

Platform

debian9-mipsel-20240226-en

Max time kernel

147s

Max time network

150s

Command Line

[/tmp/4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf]

Signatures

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself sshd /tmp/4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf N/A

Reads system routing table

Description Indicator Process Target
File opened for reading /proc/net/route /tmp/4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf N/A

Reads system network configuration

Description Indicator Process Target
File opened for reading /proc/net/route /tmp/4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf N/A

Processes

/tmp/4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf

[/tmp/4e1b008eda17d2c057157e0c6d533d7948729d31e0d76c4cbfc8a565236e4d52.elf]

Network

Country Destination Domain Proto
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp

Files

N/A