General

  • Target

    qkdjdjj22.sh

  • Size

    1KB

  • Sample

    240702-glxchsygnh

  • MD5

    536b6c9024361ab349363a6a55c2a2b8

  • SHA1

    d0aec54b19e3e9c9cd68dafe08c4cb6525d8435a

  • SHA256

    ac40e30ea6ab94b1102940d16c575f7c87dbe6335530e37f568c4ac2d967f53d

  • SHA512

    731b4d784a0b56464dba291fd0e43ee4f99cb2457c54cb91af21ee4c339aecc204c8a9dd592ba87017657752fdcbc6d4b6856f01dbbceefebcfc27affc673954

Malware Config

Extracted

Family

gafgyt

C2

195.85.205.47:777

Targets

    • Target

      qkdjdjj22.sh

    • Size

      1KB

    • MD5

      536b6c9024361ab349363a6a55c2a2b8

    • SHA1

      d0aec54b19e3e9c9cd68dafe08c4cb6525d8435a

    • SHA256

      ac40e30ea6ab94b1102940d16c575f7c87dbe6335530e37f568c4ac2d967f53d

    • SHA512

      731b4d784a0b56464dba291fd0e43ee4f99cb2457c54cb91af21ee4c339aecc204c8a9dd592ba87017657752fdcbc6d4b6856f01dbbceefebcfc27affc673954

    • Detected Gafgyt variant

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Hijack Execution Flow

1
T1574

Privilege Escalation

Scheduled Task/Job

1
T1053

Hijack Execution Flow

1
T1574

Defense Evasion

Hijack Execution Flow

1
T1574

Discovery

System Network Configuration Discovery

2
T1016

Tasks