Resubmissions
20/02/2025, 21:18
250220-z5zwvsvnbt 7General
-
Target
felka.sh
-
Size
2KB
-
Sample
250220-ypbcwsvrt3
-
MD5
5922ebab69b093d45bcfaf633ae691be
-
SHA1
7be49c2aaf8e6db8b1f1f04791cc9c81f7c9821c
-
SHA256
3b2320de1e6753a8a4d12b51a344b8cb4302f5e6494685d9eb9b068223e17e07
-
SHA512
38b19bb1ee69b0081b19b47416dd8e7e593fc641d9c44d64417b8e2cf7056dbd5ad933fa5c009f42324475b33b8d1edb9e809a86382112547bd58ff22a27ec77
Static task
static1
Behavioral task
behavioral1
Sample
felka.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
felka.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
felka.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
felka.sh
Resource
debian9-mipsel-20240729-en
Malware Config
Extracted
gafgyt
15.204.128.30:6140
Targets
-
-
Target
felka.sh
-
Size
2KB
-
MD5
5922ebab69b093d45bcfaf633ae691be
-
SHA1
7be49c2aaf8e6db8b1f1f04791cc9c81f7c9821c
-
SHA256
3b2320de1e6753a8a4d12b51a344b8cb4302f5e6494685d9eb9b068223e17e07
-
SHA512
38b19bb1ee69b0081b19b47416dd8e7e593fc641d9c44d64417b8e2cf7056dbd5ad933fa5c009f42324475b33b8d1edb9e809a86382112547bd58ff22a27ec77
Score10/10-
Detected Gafgyt variant
-
Gafgyt family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-