General

  • Target

    qkdjdjj22.x86.elf

  • Size

    163KB

  • Sample

    240702-glxnaaygpb

  • MD5

    6f344240f3686c40e24f9bb30af5bd93

  • SHA1

    f3b470c47d9a74c91097836be07f7fc51fd977d6

  • SHA256

    c1d8a7ed1e88ccc6ac4bd7002b2f9279031c82f45bf8e6f33aaa87602b1d8365

  • SHA512

    187ac80956d59e6d5ef0d5b43a4c6c2faf94a4734e834f475421da103b4542571d6928bbbf3a8da0349578985bfefd3175fc908d8a1778f2b6311bb1fe7a1c39

  • SSDEEP

    3072:62RHUL2FlZkJoC2gQXalWvRbfiphahpCn38nuVAlZl3nmBT38dAY4:6ILDvhiphabkBwXmBT38dAY4

Malware Config

Extracted

Family

gafgyt

C2

195.85.205.47:777

Targets

    • Target

      qkdjdjj22.x86.elf

    • Size

      163KB

    • MD5

      6f344240f3686c40e24f9bb30af5bd93

    • SHA1

      f3b470c47d9a74c91097836be07f7fc51fd977d6

    • SHA256

      c1d8a7ed1e88ccc6ac4bd7002b2f9279031c82f45bf8e6f33aaa87602b1d8365

    • SHA512

      187ac80956d59e6d5ef0d5b43a4c6c2faf94a4734e834f475421da103b4542571d6928bbbf3a8da0349578985bfefd3175fc908d8a1778f2b6311bb1fe7a1c39

    • SSDEEP

      3072:62RHUL2FlZkJoC2gQXalWvRbfiphahpCn38nuVAlZl3nmBT38dAY4:6ILDvhiphabkBwXmBT38dAY4

    • Detected Gafgyt variant

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Hijack Execution Flow

1
T1574

Privilege Escalation

Scheduled Task/Job

1
T1053

Hijack Execution Flow

1
T1574

Defense Evasion

Hijack Execution Flow

1
T1574

Tasks