Analysis
-
max time kernel
149s -
max time network
132s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
10-11-2024 02:14
Behavioral task
behavioral1
Sample
33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf
-
Size
164KB
-
MD5
4ac062e7bafef554949de20763c54f7b
-
SHA1
24355a299d9aca3953a9fac256cdaf7be0249fda
-
SHA256
33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0
-
SHA512
b12f82c346dbe62b6a96e7c9d3185eb2fdca9cc29ba83e29a102fd746c93d72d919d8146840ab9338dc8a25a7fb2b400a0cd9d0ac2ea5a0471d283f81d115bb9
-
SSDEEP
3072:62RroorS3/kjk3GWOwnzuXr+wMxphaMpFncunTieFIMK0UpW2mBT38dAY4:6IrqnrVxphaM2SFcRmBT38dAY4
Malware Config
Extracted
gafgyt
31.172.80.237:706
Signatures
-
Detected Gafgyt variant 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_gafgyt behavioral1/files/fstream-4.dat family_gafgyt -
Gafgyt family
-
Executes dropped EXE 37 IoCs
ioc pid Process /tmp/filevSksCt 4073 filevSksCt /tmp/fileVpbtVW 4074 fileVpbtVW /tmp/fileyrffjH 4075 fileyrffjH /tmp/filev6Bjo1 4076 filev6Bjo1 /tmp/fileviGHrd 4077 fileviGHrd /tmp/fileNhSzDg 4078 fileNhSzDg /tmp/fileyQ7Nnr 4082 fileyQ7Nnr /tmp/fileXKXK3p 4083 fileXKXK3p /tmp/filewWVUUa 4084 filewWVUUa /tmp/fileQR9Sjw 4085 fileQR9Sjw /tmp/file6uyF1C 4086 file6uyF1C /tmp/filepy2ICU 4105 filepy2ICU /tmp/fileCUNdoc 4106 fileCUNdoc /tmp/fileajtDOW 4107 fileajtDOW /tmp/file5jCaPZ 4108 file5jCaPZ /tmp/fileuiEvYR 4109 fileuiEvYR /tmp/filen2mUTI 4110 filen2mUTI /tmp/fileowfIQt 4111 fileowfIQt /tmp/file5f428w 4112 file5f428w /tmp/fileyQm4Pn 4113 fileyQm4Pn /tmp/fileydgD6N 4114 fileydgD6N /tmp/filesm5nD7 4115 filesm5nD7 /tmp/fileyF0Djx 4116 fileyF0Djx /tmp/file3jegR0 4117 file3jegR0 /tmp/file5yWdDg 4118 file5yWdDg /tmp/filedsxFFi 4119 filedsxFFi /tmp/filePFl7l7 4120 filePFl7l7 /tmp/fileEI1B9A 4121 fileEI1B9A /tmp/filepqz03y 4122 filepqz03y /tmp/file2TWSoE 4123 file2TWSoE /tmp/fileIhIBFA 4124 fileIhIBFA /tmp/file2XsCf7 4125 file2XsCf7 /tmp/filepW2BDd 4126 filepW2BDd /tmp/filezzHgOZ 4127 filezzHgOZ /tmp/fileS2NJ2j 4128 fileS2NJ2j /tmp/fileRdjyvM 4130 fileRdjyvM /tmp/fileahwszY 4131 fileahwszY -
Creates/modifies Cron job 1 TTPs 38 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/cron.hourly/0 fileRdjyvM File opened for modification /etc/cron.hourly/0 filepy2ICU File opened for modification /etc/cron.hourly/0 filen2mUTI File opened for modification /etc/cron.hourly/0 file3jegR0 File opened for modification /etc/cron.hourly/0 filedsxFFi File opened for modification /etc/cron.hourly/0 fileyQ7Nnr File opened for modification /etc/cron.hourly/0 filewWVUUa File opened for modification /etc/cron.hourly/0 fileydgD6N File opened for modification /etc/cron.hourly/0 fileEI1B9A File opened for modification /etc/cron.hourly/0 file2XsCf7 File opened for modification /etc/cron.hourly/0 filezzHgOZ File opened for modification /etc/cron.hourly/0 fileXKXK3p File opened for modification /etc/cron.hourly/0 file6uyF1C File opened for modification /etc/cron.hourly/0 fileowfIQt File opened for modification /etc/cron.hourly/0 file5f428w File opened for modification /etc/cron.hourly/0 filevSksCt File opened for modification /etc/cron.hourly/0 fileQR9Sjw File opened for modification /etc/cron.hourly/0 file2TWSoE File opened for modification /etc/cron.hourly/0 fileyF0Djx File opened for modification /etc/cron.hourly/0 fileS2NJ2j File opened for modification /etc/cron.hourly/0 fileahwszY File opened for modification /etc/cron.hourly/0 fileuiEvYR File opened for modification /etc/cron.hourly/0 fileyQm4Pn File opened for modification /etc/cron.hourly/0 file5yWdDg File opened for modification /etc/cron.hourly/0 filepqz03y File opened for modification /etc/cron.hourly/0 33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf File opened for modification /etc/cron.hourly/0 fileVpbtVW File opened for modification /etc/cron.hourly/0 fileCUNdoc File opened for modification /etc/cron.hourly/0 file5jCaPZ File opened for modification /etc/cron.hourly/0 filev6Bjo1 File opened for modification /etc/cron.hourly/0 fileNhSzDg File opened for modification /etc/cron.hourly/0 filePFl7l7 File opened for modification /etc/cron.hourly/0 fileIhIBFA File opened for modification /etc/cron.hourly/0 filepW2BDd File opened for modification /etc/cron.hourly/0 fileyrffjH File opened for modification /etc/cron.hourly/0 fileviGHrd File opened for modification /etc/cron.hourly/0 fileajtDOW File opened for modification /etc/cron.hourly/0 filesm5nD7 -
Writes file to system bin folder 1 IoCs
description ioc Process File opened for modification /bin/ls 33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf -
description ioc Process File opened for reading /proc/self/exe 33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf File opened for reading /proc/self/exe fileyQ7Nnr File opened for reading /proc/self/exe filepy2ICU File opened for reading /proc/self/exe fileCUNdoc File opened for reading /proc/self/exe fileajtDOW File opened for reading /proc/self/exe fileowfIQt File opened for reading /proc/self/exe file5f428w File opened for reading /proc/self/exe fileEI1B9A File opened for reading /proc/self/exe filepqz03y File opened for reading /proc/self/exe file2TWSoE File opened for reading /proc/self/exe fileyrffjH File opened for reading /proc/self/exe filen2mUTI File opened for reading /proc/self/exe file5yWdDg File opened for reading /proc/self/exe filedsxFFi File opened for reading /proc/self/exe fileXKXK3p File opened for reading /proc/self/exe file5jCaPZ File opened for reading /proc/self/exe file3jegR0 File opened for reading /proc/self/exe fileIhIBFA File opened for reading /proc/self/exe filepW2BDd File opened for reading /proc/self/exe filezzHgOZ File opened for reading /proc/self/exe filevSksCt File opened for reading /proc/self/exe fileQR9Sjw File opened for reading /proc/self/exe fileyQm4Pn File opened for reading /proc/self/exe filesm5nD7 File opened for reading /proc/self/exe filePFl7l7 File opened for reading /proc/self/exe filev6Bjo1 File opened for reading /proc/self/exe fileydgD6N File opened for reading /proc/self/exe fileRdjyvM File opened for reading /proc/self/exe fileuiEvYR File opened for reading /proc/self/exe file2XsCf7 File opened for reading /proc/self/exe fileahwszY File opened for reading /proc/self/exe fileNhSzDg File opened for reading /proc/self/exe file6uyF1C File opened for reading /proc/self/exe fileyF0Djx File opened for reading /proc/self/exe fileVpbtVW File opened for reading /proc/self/exe fileviGHrd File opened for reading /proc/self/exe filewWVUUa File opened for reading /proc/self/exe fileS2NJ2j -
Writes file to tmp directory 38 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/filevSksCt 33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf File opened for modification /tmp/file2TWSoE filepqz03y File opened for modification /tmp/fileS2NJ2j filezzHgOZ File opened for modification /tmp/file3jegR0 fileyF0Djx File opened for modification /tmp/file2XsCf7 fileIhIBFA File opened for modification /tmp/fileviGHrd filev6Bjo1 File opened for modification /tmp/filen2mUTI fileuiEvYR File opened for modification /tmp/fileydgD6N fileyQm4Pn File opened for modification /tmp/file5yWdDg file3jegR0 File opened for modification /tmp/filepqz03y fileEI1B9A File opened for modification /tmp/filepy2ICU file6uyF1C File opened for modification /tmp/fileyQm4Pn file5f428w File opened for modification /tmp/filesm5nD7 fileydgD6N File opened for modification /tmp/filePFl7l7 filedsxFFi File opened for modification /tmp/fileEI1B9A filePFl7l7 File opened for modification /tmp/filev6Bjo1 fileyrffjH File opened for modification /tmp/fileQR9Sjw filewWVUUa File opened for modification /tmp/file6uyF1C fileQR9Sjw File opened for modification /tmp/fileCUNdoc filepy2ICU File opened for modification /tmp/fileyF0Djx filesm5nD7 File opened for modification /tmp/filedsxFFi file5yWdDg File opened for modification /tmp/filepW2BDd file2XsCf7 File opened for modification /tmp/filezzHgOZ filepW2BDd File opened for modification /tmp/fileNhSzDg fileviGHrd File opened for modification /tmp/fileyQ7Nnr fileNhSzDg File opened for modification /tmp/filewWVUUa fileXKXK3p File opened for modification /tmp/fileRdjyvM fileS2NJ2j File opened for modification /tmp/fileahwszY fileRdjyvM File opened for modification /tmp/fileXKXK3p fileyQ7Nnr File opened for modification /tmp/fileajtDOW fileCUNdoc File opened for modification /tmp/file5f428w fileowfIQt File opened for modification /tmp/file5jCaPZ fileajtDOW File opened for modification /tmp/fileowfIQt filen2mUTI File opened for modification /tmp/filen1ha21 fileahwszY File opened for modification /tmp/fileIhIBFA file2TWSoE File opened for modification /tmp/fileVpbtVW filevSksCt File opened for modification /tmp/fileyrffjH fileVpbtVW File opened for modification /tmp/fileuiEvYR file5jCaPZ
Processes
-
/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf1⤵
- Creates/modifies Cron job
- Writes file to system bin folder
- Reads runtime system information
- Writes file to tmp directory
PID:4045 -
/tmp/filevSksCt/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf2⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4073 -
/tmp/fileVpbtVW/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf3⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4074 -
/tmp/fileyrffjH/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf4⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4075 -
/tmp/filev6Bjo1/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf5⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4076 -
/tmp/fileviGHrd/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf6⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4077 -
/tmp/fileNhSzDg/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf7⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4078 -
/tmp/fileyQ7Nnr/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf8⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4082 -
/tmp/fileXKXK3p/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf9⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4083 -
/tmp/filewWVUUa/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf10⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4084 -
/tmp/fileQR9Sjw/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf11⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4085 -
/tmp/file6uyF1C/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf12⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4086 -
/tmp/filepy2ICU/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf13⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4105 -
/tmp/fileCUNdoc/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf14⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4106 -
/tmp/fileajtDOW/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf15⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4107 -
/tmp/file5jCaPZ/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf16⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4108 -
/tmp/fileuiEvYR/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf17⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4109 -
/tmp/filen2mUTI/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf18⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4110 -
/tmp/fileowfIQt/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf19⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4111 -
/tmp/file5f428w/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf20⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4112 -
/tmp/fileyQm4Pn/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf21⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4113 -
/tmp/fileydgD6N/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf22⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4114 -
/tmp/filesm5nD7/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf23⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4115 -
/tmp/fileyF0Djx/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf24⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4116 -
/tmp/file3jegR0/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf25⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4117 -
/tmp/file5yWdDg/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf26⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4118 -
/tmp/filedsxFFi/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf27⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4119 -
/tmp/filePFl7l7/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf28⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4120 -
/tmp/fileEI1B9A/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf29⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4121 -
/tmp/filepqz03y/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf30⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4122 -
/tmp/file2TWSoE/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf31⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4123 -
/tmp/fileIhIBFA/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf32⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4124 -
/tmp/file2XsCf7/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf33⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4125 -
/tmp/filepW2BDd/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf34⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4126 -
/tmp/filezzHgOZ/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf35⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4127 -
/tmp/fileS2NJ2j/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf36⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4128 -
/tmp/fileRdjyvM/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf37⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4130 -
/tmp/fileahwszY/tmp/33368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0.elf38⤵
- Executes dropped EXE
- Creates/modifies Cron job
- Reads runtime system information
- Writes file to tmp directory
PID:4131
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD53f006f7f81fc17be7f4a0d3da0fad5de
SHA197a94d3d0654c6551057af3809b52572bd7f9f5d
SHA256982f9e0f089b91ba79df723435099df15c72e1201a45010ee60226ab136c93bf
SHA51297d2ac0057427b940ada7c0fc805c1966e2535c3c3767ca85fef4a7e0fdc9d4ef9eb133530408b1e439df067881cb317e948ad9bfd487e958a04c97d9db978e0
-
Filesize
156KB
MD5a8a6992775589faecef1bc8cf38bdfc5
SHA1b6903301aecf34539654f309b8c12773461920dc
SHA256cae053bfac71081a19bd64ae66f3fc9a149bcbe492eeb46d33647e01ab18eb52
SHA512dd803894a1bb9caa2bb4d1da70d35a531a7f76718d23392ff7ee511f489f413f2c79e82a3d7432685a36f470b69c74d211d18d050bee1a5d261c75131ee58fb8
-
Filesize
164KB
MD54ac062e7bafef554949de20763c54f7b
SHA124355a299d9aca3953a9fac256cdaf7be0249fda
SHA25633368eb166229b262cb964cfa6412478278b2a23e5f0c3de24a56c28dac5eeb0
SHA512b12f82c346dbe62b6a96e7c9d3185eb2fdca9cc29ba83e29a102fd746c93d72d919d8146840ab9338dc8a25a7fb2b400a0cd9d0ac2ea5a0471d283f81d115bb9