General

  • Target

    opticus.sh

  • Size

    2KB

  • Sample

    250309-eq2rpaxnx4

  • MD5

    cce1f6633e5b8d3dcb896051af943a72

  • SHA1

    016e7193a2dd76f6bcaff3c51f479fd1e99ad3c7

  • SHA256

    6bc1fdcba425416e5c1986bc29d170befb5253f177ed08ee06701a943a3df8a4

  • SHA512

    374e49c79e9c4f01cae212788cf75988b5c0a6269e4a0786c7ed9b38c3a37e8003c77d68c81636990c74e199d4d524512b2132866cdba495f5c45c09a3d84bc2

Malware Config

Extracted

Family

gafgyt

C2

196.251.80.231:839

Targets

    • Target

      opticus.sh

    • Size

      2KB

    • MD5

      cce1f6633e5b8d3dcb896051af943a72

    • SHA1

      016e7193a2dd76f6bcaff3c51f479fd1e99ad3c7

    • SHA256

      6bc1fdcba425416e5c1986bc29d170befb5253f177ed08ee06701a943a3df8a4

    • SHA512

      374e49c79e9c4f01cae212788cf75988b5c0a6269e4a0786c7ed9b38c3a37e8003c77d68c81636990c74e199d4d524512b2132866cdba495f5c45c09a3d84bc2

    • Detected Gafgyt variant

    • Gafgyt family

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks