General

  • Target

    wget.sh

  • Size

    1KB

  • Sample

    250105-gw2pzsvldx

  • MD5

    3556efaeedbc73136a9b2628ea6002b6

  • SHA1

    2c4795c1553f260dbb662b883dddaae6eee48f54

  • SHA256

    ad54fc11ccdbac99d10fd5c5b38eaaa680677ee3832425f35230fc9ac09b631f

  • SHA512

    7bab0772028c781d292d5676bf57e25f247bde34a4ddc4ac60585db666f7666ce1153eff5db289c85c62e791d3e31aed06d455ff02cae5cc35e9d08e5816117b

Malware Config

Targets

    • Target

      wget.sh

    • Size

      1KB

    • MD5

      3556efaeedbc73136a9b2628ea6002b6

    • SHA1

      2c4795c1553f260dbb662b883dddaae6eee48f54

    • SHA256

      ad54fc11ccdbac99d10fd5c5b38eaaa680677ee3832425f35230fc9ac09b631f

    • SHA512

      7bab0772028c781d292d5676bf57e25f247bde34a4ddc4ac60585db666f7666ce1153eff5db289c85c62e791d3e31aed06d455ff02cae5cc35e9d08e5816117b

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks