MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 802b7746d22ab2b4d16639d205a5d826d6d0bdd6c3f7bc0059c6674d91f388bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 802b7746d22ab2b4d16639d205a5d826d6d0bdd6c3f7bc0059c6674d91f388bc
SHA3-384 hash: 958247a71f90993d11a7b1ace83fdf6f88afc141b84d492136a9a667e681bd01182da997260e41e4caf4d25d08c58269
SHA1 hash: 6f70fecd11e924f08016d09419c3a7d23947d638
MD5 hash: f641cda8243489f1ab3091941a20b5d5
humanhash: indigo-alanine-uncle-twenty
File name:armv5l
Download: download sample
Signature Gafgyt
File size:158'776 bytes
First seen:2025-08-03 00:08:32 UTC
Last seen:2025-08-03 15:45:30 UTC
File type: elf
MIME type:application/x-executable
ssdeep 3072:1OZDPY0I28zryZwYU+TTmaRk6n0FHJcn+pbD7fwuuEV0gRfPq0sTAEjQ:1mDPY0I28zr2pUcTm0CF6+hD7fwJEV0+
TLSH T16DF30755BC518F16CAD666BBFB4E428D372B0768D3EE72039D295F20378B85A0E37142
telfhash t10321be41df641c5c2fe19065825e70166adc30683f572c83ceae6b875d529d6b05c41f
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf gafgyt mirai

Intelligence


File Origin
# of uploads :
2
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
bash lolbin rust
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
arm
Packer:
not packed
Botnet:
unknown
Number of open files:
163
Number of processes launched:
5
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Persistence
Process Renaming
Information Gathering
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=821185c4-1800-0000-8afc-7a44b0090000 pid=2480 /usr/bin/sudo guuid=36282cc6-1800-0000-8afc-7a44b1090000 pid=2481 /tmp/sample.bin guuid=821185c4-1800-0000-8afc-7a44b0090000 pid=2480->guuid=36282cc6-1800-0000-8afc-7a44b1090000 pid=2481 execve
Result
Threat name:
Gafgyt, Mirai
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Drops files in suspicious directories
Found malware configuration
Multi AV Scanner detection for submitted file
Sample deletes itself
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to set files in /etc globally writable
Yara detected Gafgyt
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1749265 Sample: armv5l.elf Startdate: 03/08/2025 Architecture: LINUX Score: 100 169 92.113.21.114, 5060, 58268, 58270 UKRTELNETUA Ukraine 2->169 177 Found malware configuration 2->177 179 Antivirus detection for dropped file 2->179 181 Antivirus / Scanner detection for submitted sample 2->181 183 3 other signatures 2->183 13 systemd finalrd 2->13         started        15 armv5l.elf 2->15         started        17 systemd blkdeactivate 2->17         started        19 27 other processes 2->19 signatures3 process4 signatures5 22 finalrd run-parts 13->22         started        24 finalrd find 13->24         started        26 finalrd 13->26         started        36 141 other processes 13->36 28 armv5l.elf 15->28         started        30 blkdeactivate 17->30         started        32 blkdeactivate 17->32         started        34 blkdeactivate grep 17->34         started        38 3 other processes 17->38 185 Sample reads /proc/mounts (often used for finding a writable filesystem) 19->185 process6 process7 40 run-parts open-iscsi.finalrd 22->40         started        42 run-parts mdadm.finalrd 22->42         started        44 find cp 24->44         started        47 find cp 24->47         started        54 2 other processes 26->54 49 armv5l.elf 28->49         started        56 2 other processes 30->56 52 blkdeactivate multipathd 32->52         started        58 4 other processes 36->58 file8 60 open-iscsi.finalrd 40->60         started        62 open-iscsi.finalrd 40->62         started        64 open-iscsi.finalrd 40->64         started        74 65 other processes 40->74 66 mdadm.finalrd 42->66         started        68 mdadm.finalrd 42->68         started        70 mdadm.finalrd 42->70         started        77 24 other processes 42->77 161 /run/initramfs/usr...tdown/mdadm.finalrd, POSIX 44->161 dropped 163 /run/initramfs/usr.../open-iscsi.finalrd, POSIX 47->163 dropped 165 /var/main, ELF 49->165 dropped 167 /etc/init.d/xs.main, POSIX 49->167 dropped 171 Sample tries to set files in /etc globally writable 49->171 173 Drops files in suspicious directories 49->173 175 Sample deletes itself 49->175 72 armv5l.elf 49->72         started        signatures9 process10 file11 79 2 other processes 60->79 81 2 other processes 62->81 83 2 other processes 64->83 85 2 other processes 66->85 87 2 other processes 68->87 89 2 other processes 70->89 91 2 other processes 72->91 149 /run/initramfs/usr/sbin/iscsid, ELF 74->149 dropped 151 /run/initramfs/usr/sbin/iscsiadm, ELF 74->151 dropped 153 /run/initramfs/usr/bin/sleep, ELF 74->153 dropped 159 2 other malicious files 74->159 dropped 93 88 other processes 74->93 155 /run/initramfs/usr/sbin/mdmon, ELF 77->155 dropped 157 /run/initramfs/usr/sbin/mdadm, ELF 77->157 dropped 95 36 other processes 77->95 process12 process13 101 5 other processes 79->101 103 5 other processes 81->103 105 5 other processes 83->105 97 ldd 85->97         started        107 4 other processes 85->107 109 5 other processes 87->109 111 5 other processes 89->111 99 sh reboot 91->99         started        113 10 other processes 93->113 process14 115 ldd 97->115         started        119 3 other processes 101->119 121 3 other processes 103->121 123 3 other processes 105->123 125 2 other processes 107->125 117 ldd 109->117         started        127 2 other processes 109->127 129 3 other processes 111->129 131 6 other processes 113->131 process15 133 ldd ld-linux-x86-64.so.2 115->133         started        135 ldd ld-linux-x86-64.so.2 117->135         started        137 ldd ld-linux-x86-64.so.2 119->137         started        139 ldd ld-linux-x86-64.so.2 121->139         started        141 ldd ld-linux-x86-64.so.2 123->141         started        143 ldd ld-linux-x86-64.so.2 129->143         started        145 ldd ld-linux-x86-64.so.2 131->145         started        147 ldd ld-linux-x86-64.so.2 131->147         started       
Threat name:
Linux.Backdoor.Mirai
Status:
Malicious
First seen:
2025-08-03 00:09:10 UTC
File Type:
ELF32 Little (Exe)
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Generic_Threat_d94e1020
Author:Elastic Security
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

elf 802b7746d22ab2b4d16639d205a5d826d6d0bdd6c3f7bc0059c6674d91f388bc

(this sample)

  
Delivery method
Distributed via web download

Comments