General
-
Target
load.sh
-
Size
129B
-
Sample
250301-nk8gqazqz2
-
MD5
b165b7f155810af7139dd707d2e151c9
-
SHA1
a49fe736dd310d0a64f3628c744c590fd7c43bdc
-
SHA256
d21adb4e0938c18241d225748676e9f73c5a81210be881841b3b22c6e6abe9b4
-
SHA512
8256ac2815b643527aae2410fa26a4179c22b793d028b402b2077fd57031e48f2457f6a07a6a0f53e479a3781ac466f248e58114dd38e35793ac3364e07a177c
Static task
static1
Behavioral task
behavioral1
Sample
load.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
load.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
load.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
load.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
gafgyt
23.157.176.170:4258
Targets
-
-
Target
load.sh
-
Size
129B
-
MD5
b165b7f155810af7139dd707d2e151c9
-
SHA1
a49fe736dd310d0a64f3628c744c590fd7c43bdc
-
SHA256
d21adb4e0938c18241d225748676e9f73c5a81210be881841b3b22c6e6abe9b4
-
SHA512
8256ac2815b643527aae2410fa26a4179c22b793d028b402b2077fd57031e48f2457f6a07a6a0f53e479a3781ac466f248e58114dd38e35793ac3364e07a177c
Score10/10-
Detected Gafgyt variant
-
Gafgyt family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-