General
-
Target
shell.sh
-
Size
327B
-
Sample
250103-h19rtswrek
-
MD5
be3860edd084c6394d9894627d926283
-
SHA1
0084acbf7a34fece5ee66fd63b64234d5d2238d8
-
SHA256
d1f89f4c630323b37a6f669903f2e617a0616052c4b900e33d0b9eb41084514f
-
SHA512
06440f218923e2062a940299d2386762eb228d87a5407430191733865e122a0cb4a5c076b07ff9b5547933b80653555cbfcfc4b7d31eedcc6f132372d6be105a
Static task
static1
Behavioral task
behavioral1
Sample
shell.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
shell.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
shell.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
shell.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
gafgyt
127.0.0.1:80
Targets
-
-
Target
shell.sh
-
Size
327B
-
MD5
be3860edd084c6394d9894627d926283
-
SHA1
0084acbf7a34fece5ee66fd63b64234d5d2238d8
-
SHA256
d1f89f4c630323b37a6f669903f2e617a0616052c4b900e33d0b9eb41084514f
-
SHA512
06440f218923e2062a940299d2386762eb228d87a5407430191733865e122a0cb4a5c076b07ff9b5547933b80653555cbfcfc4b7d31eedcc6f132372d6be105a
Score10/10-
Detected Gafgyt variant
-
Gafgyt family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-