General

  • Target

    bins.sh

  • Size

    1KB

  • Sample

    250227-apseeayqw3

  • MD5

    ddd2066e9b68c51382870956a3c59979

  • SHA1

    ce1c982d1e45284c841358935022612c1708822c

  • SHA256

    0340ac49b3ffa9b62521f5d0ab751b8b1196e816d644317e7ae7a6166b08eb08

  • SHA512

    62c1588cc5a05de7b0b6c960ae65e6c9949e15ba7310344e90dc43cfd0fe2a277796bd167fc0eb8ddb0853c2ef556bb6bd648f672491249ccc26c85967e2182b

Malware Config

Extracted

Family

gafgyt

C2

162.0.214.70:1111

Targets

    • Target

      bins.sh

    • Size

      1KB

    • MD5

      ddd2066e9b68c51382870956a3c59979

    • SHA1

      ce1c982d1e45284c841358935022612c1708822c

    • SHA256

      0340ac49b3ffa9b62521f5d0ab751b8b1196e816d644317e7ae7a6166b08eb08

    • SHA512

      62c1588cc5a05de7b0b6c960ae65e6c9949e15ba7310344e90dc43cfd0fe2a277796bd167fc0eb8ddb0853c2ef556bb6bd648f672491249ccc26c85967e2182b

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks