General

  • Target

    6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh

  • Size

    6KB

  • Sample

    241208-cwhjwsspcn

  • MD5

    b853a7496951ffa293c154a1c2ab0cef

  • SHA1

    cd23d84bfa383cb3eef6b8a210a755323d278068

  • SHA256

    6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417

  • SHA512

    315201607fbfeb29173ced022cebb46a1c936377bb62407fdb73bb9a65426e24aff333c7e727e5fbb7351de6f71f919e1dcec3204b41d01d781dfcfc171bab18

  • SSDEEP

    96:vl0lolAlUlElAlwlclElElglUl6LlbzPnTjn37jjHTLXjTp+FH7RjdOMX+xj+wqd:oMVB3

Malware Config

Targets

    • Target

      6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417.sh

    • Size

      6KB

    • MD5

      b853a7496951ffa293c154a1c2ab0cef

    • SHA1

      cd23d84bfa383cb3eef6b8a210a755323d278068

    • SHA256

      6594875b01074eed48ca4021e4079aefb23565c88d5eccab3939241746347417

    • SHA512

      315201607fbfeb29173ced022cebb46a1c936377bb62407fdb73bb9a65426e24aff333c7e727e5fbb7351de6f71f919e1dcec3204b41d01d781dfcfc171bab18

    • SSDEEP

      96:vl0lolAlUlElAlwlclElElglUl6LlbzPnTjn37jjHTLXjTp+FH7RjdOMX+xj+wqd:oMVB3

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks