General

  • Target

    bins.sh

  • Size

    1KB

  • Sample

    241229-p3ah3ssjgm

  • MD5

    9d68e98f65d13deb163ddff8775e6790

  • SHA1

    f7d6f96e95f276c566c78d7d43231946f377e8fd

  • SHA256

    297d3e7c3baa68bca45a6802e9d1b7ff08a7125a60f409b4980403d2e64de79d

  • SHA512

    241b96ef4a8f162432f02791b13003aa31b9deb7d1c52976c7c4a4967c7611cf79976f9ecffb196b56fcf519e64b6b8dcc63819362a65d6a52ae17ee733117d5

Malware Config

Extracted

Family

gafgyt

C2

98.159.236.221:23

Targets

    • Target

      bins.sh

    • Size

      1KB

    • MD5

      9d68e98f65d13deb163ddff8775e6790

    • SHA1

      f7d6f96e95f276c566c78d7d43231946f377e8fd

    • SHA256

      297d3e7c3baa68bca45a6802e9d1b7ff08a7125a60f409b4980403d2e64de79d

    • SHA512

      241b96ef4a8f162432f02791b13003aa31b9deb7d1c52976c7c4a4967c7611cf79976f9ecffb196b56fcf519e64b6b8dcc63819362a65d6a52ae17ee733117d5

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Writes DNS configuration

      Writes data to DNS resolver config file.

MITRE ATT&CK Enterprise v15

Tasks