General

  • Target

    curl.sh

  • Size

    1KB

  • Sample

    250111-anc84avkes

  • MD5

    d8d6be287e3428bc6eb16a3e05e8ab47

  • SHA1

    c6bba87f1258183e8e70b2ac18dee260c48eb04d

  • SHA256

    72f5f8ec4a91b6d69c3e3be588664aba1c2c511ecdfd8430dc0edf9d1af00353

  • SHA512

    a8a1f7d030459952f7523cdc2345844d3ce1f6da443a302c17b32fc053fe12a36aed91fa507f0575cce11459434224a54bd21bb814606bc964ec9476a549ceee

Malware Config

Targets

    • Target

      curl.sh

    • Size

      1KB

    • MD5

      d8d6be287e3428bc6eb16a3e05e8ab47

    • SHA1

      c6bba87f1258183e8e70b2ac18dee260c48eb04d

    • SHA256

      72f5f8ec4a91b6d69c3e3be588664aba1c2c511ecdfd8430dc0edf9d1af00353

    • SHA512

      a8a1f7d030459952f7523cdc2345844d3ce1f6da443a302c17b32fc053fe12a36aed91fa507f0575cce11459434224a54bd21bb814606bc964ec9476a549ceee

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks