General

  • Target

    sex.sh

  • Size

    1KB

  • Sample

    241214-seflzaxmep

  • MD5

    255decb3180bb0e03b43d0d6246c3977

  • SHA1

    c99637830a502bc731837adff300980a592e8316

  • SHA256

    2d718fdd5a61973c8c4c9bd4e7f40e5e424dd39d446597efc4cb79889211f875

  • SHA512

    0389441154ebc943637cecbd434c38567baf4eb068bc68184906ec5f1c61eee928b0a1b73f5de65fa8d02fedd686169d64519be2c4c75d45824da982247ee3fd

Malware Config

Extracted

Family

gafgyt

C2

84.200.24.7:666

Targets

    • Target

      sex.sh

    • Size

      1KB

    • MD5

      255decb3180bb0e03b43d0d6246c3977

    • SHA1

      c99637830a502bc731837adff300980a592e8316

    • SHA256

      2d718fdd5a61973c8c4c9bd4e7f40e5e424dd39d446597efc4cb79889211f875

    • SHA512

      0389441154ebc943637cecbd434c38567baf4eb068bc68184906ec5f1c61eee928b0a1b73f5de65fa8d02fedd686169d64519be2c4c75d45824da982247ee3fd

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks