General

  • Target

    bins.sh

  • Size

    1KB

  • Sample

    250203-kfcmpswmav

  • MD5

    202fafde5b2c6cd0b2548109a608c775

  • SHA1

    8872cccf4cfe65381ec53cebf811e1b8e7d11cd5

  • SHA256

    4968ba801674176e9d07c54ed20f199c123ece3c0c4082ee35a3ff4d7ee00471

  • SHA512

    3c3f2e2d23ce7e19840c7bfb03d1f105d226cda0e59eee1fd8350f1b91002ac785d79a168acb22e3bd99ef180ae0f6e79905804a120dd7b078601e5d24656413

Malware Config

Extracted

Family

gafgyt

C2

185.237.15.131:666

Targets

    • Target

      bins.sh

    • Size

      1KB

    • MD5

      202fafde5b2c6cd0b2548109a608c775

    • SHA1

      8872cccf4cfe65381ec53cebf811e1b8e7d11cd5

    • SHA256

      4968ba801674176e9d07c54ed20f199c123ece3c0c4082ee35a3ff4d7ee00471

    • SHA512

      3c3f2e2d23ce7e19840c7bfb03d1f105d226cda0e59eee1fd8350f1b91002ac785d79a168acb22e3bd99ef180ae0f6e79905804a120dd7b078601e5d24656413

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks