Malware Analysis Report

2025-08-10 11:58

Sample ID 240330-cwkn9afg99
Target f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf
SHA256 f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a
Tags
upx gafgyt
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a

Threat Level: Known bad

The file f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf was found to be: Known bad.

Malicious Activity Summary

upx gafgyt

Detected Gafgyt variant

Gafgyt family

UPX packed file

Changes its process name

Reads system routing table

Reads system network configuration

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-30 02:25

Signatures

Detected Gafgyt variant

Description Indicator Process Target
N/A N/A N/A N/A

Gafgyt family

gafgyt

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-30 02:25

Reported

2024-03-30 02:28

Platform

ubuntu1804-amd64-20240226-en

Max time kernel

146s

Max time network

147s

Command Line

[/tmp/f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf]

Signatures

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself sshd /tmp/f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf N/A

Reads system routing table

Description Indicator Process Target
File opened for reading /proc/net/route /tmp/f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf N/A

Reads system network configuration

Description Indicator Process Target
File opened for reading /proc/net/route /tmp/f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf N/A

Processes

/tmp/f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf

[/tmp/f38f46f448b43194170326bfbcc21ea13ec468a09c078c03e82a584143b0092a.elf]

Network

Country Destination Domain Proto
NL 193.35.18.56:65490 tcp
N/A 224.0.0.251:5353 udp
NL 193.35.18.56:65490 tcp
US 151.101.2.49:443 tcp
US 151.101.1.91:443 tcp
GB 195.181.164.20:443 tcp
GB 185.125.188.61:443 tcp
GB 185.125.188.61:443 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp
NL 193.35.18.56:65490 tcp

Files

N/A