General

  • Target

    930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh

  • Size

    1KB

  • Sample

    250306-e8cwaayrs7

  • MD5

    a23e61b3d2822d367944ad0bb171348e

  • SHA1

    024cfb180037b542aaad41dd8330f0d797d34bc3

  • SHA256

    930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b

  • SHA512

    ebc46985695c7fce429f8f4a30fc51f151724ef9114a172c240433d1baf85c49e81f505eb54039de0f835ee57a387b04cf2bd7f43ff02fc75336837bf093ce5b

Malware Config

Extracted

Family

gafgyt

C2

45.148.10.136:666

Targets

    • Target

      930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh

    • Size

      1KB

    • MD5

      a23e61b3d2822d367944ad0bb171348e

    • SHA1

      024cfb180037b542aaad41dd8330f0d797d34bc3

    • SHA256

      930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b

    • SHA512

      ebc46985695c7fce429f8f4a30fc51f151724ef9114a172c240433d1baf85c49e81f505eb54039de0f835ee57a387b04cf2bd7f43ff02fc75336837bf093ce5b

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks