General

  • Target

    update.sh

  • Size

    3KB

  • Sample

    241206-ql4w2ayrgt

  • MD5

    bd60ce22343af79a495628041c27c3a0

  • SHA1

    a7510aabe4465db8de01ca2bc535003eddea0d37

  • SHA256

    8c27365e971954012e6a2543904fbbcea00241a369fd37f1dca5143e9f8c4d0e

  • SHA512

    1f5016541e9654176198e0e926fec6e51095697faec6397c69f05bbb5438ab5b3edcddcbfcbb4acaa44347396dd4f9b0a31577cfb1ca5240f95fc80e546d700b

Malware Config

Extracted

Family

gafgyt

C2

185.91.127.27:87

Targets

    • Target

      update.sh

    • Size

      3KB

    • MD5

      bd60ce22343af79a495628041c27c3a0

    • SHA1

      a7510aabe4465db8de01ca2bc535003eddea0d37

    • SHA256

      8c27365e971954012e6a2543904fbbcea00241a369fd37f1dca5143e9f8c4d0e

    • SHA512

      1f5016541e9654176198e0e926fec6e51095697faec6397c69f05bbb5438ab5b3edcddcbfcbb4acaa44347396dd4f9b0a31577cfb1ca5240f95fc80e546d700b

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks