MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 816c04db99daaed67f176316e702900572abf12b6b7eaf641ef52c38702da72a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 816c04db99daaed67f176316e702900572abf12b6b7eaf641ef52c38702da72a
SHA3-384 hash: 06aedabd4c6253adbe358bfd61b46df91d8f76dc25897ecd77867b7d0cffe3b70b5b9e122e2bf41385473ad6c1bbb767
SHA1 hash: 6ae964b56ed00f0d45c9b48a0bf2d655b672f88e
MD5 hash: f4b41148dbd6f582d5972a7b8e515439
humanhash: arkansas-july-texas-dakota
File name:Dior.i586
Download: download sample
Signature Gafgyt
File size:30'844 bytes
First seen:2026-03-17 20:20:45 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 384:MfATFuDLZfUD6pblo23FqFLHudv99/594IpTd0yw6jJVeNTolkimPMaOekc2K+ML:ht6pJomFqi19xi4Td0MjjhOkMj7
TLSH T1C2D2F1B0C1FF9201DF98C138838DAD5967E964495A47F9E41E8BCE9218A20399638FF5
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf gafgyt UPX
File size (compressed) :30'844 bytes
File size (de-compressed) :58'924 bytes
Format:linux/i386
Unpacked file: 42ae8f6b16c2db2b4fa0f66b3cc982202188b0cf9b383fb75c73fd3c9afcb383

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Removes directories from a subdirectory of a temporary directory
Deletes a file
Removes directories from a temporary directory
Sends data to a server
Launching a process
Removes directories
Substitutes an application name
Deleting of the original file
Gathering data
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
UPX
Botnet:
unknown
Number of open files:
1
Number of processes launched:
3
Processes remaning?
true
Remote TCP ports scanned:
not identified
Behaviour
Process Renaming
Botnet C2s
TCP botnet C2(s):
type:Gafgyt 172.245.11.31:282
UDP botnet C2(s):
not identified
Status:
terminated
Behavior Graph:
%3 guuid=05095b59-2300-0000-5f9e-b819030d0000 pid=3331 /usr/bin/sudo guuid=62da6f5b-2300-0000-5f9e-b819080d0000 pid=3336 /tmp/sample.bin delete-file net guuid=05095b59-2300-0000-5f9e-b819030d0000 pid=3331->guuid=62da6f5b-2300-0000-5f9e-b819080d0000 pid=3336 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=62da6f5b-2300-0000-5f9e-b819080d0000 pid=3336->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=f00d095d-2300-0000-5f9e-b8190e0d0000 pid=3342 /tmp/sample.bin guuid=62da6f5b-2300-0000-5f9e-b819080d0000 pid=3336->guuid=f00d095d-2300-0000-5f9e-b8190e0d0000 pid=3342 clone guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344 /tmp/sample.bin net send-data write-file zombie guuid=f00d095d-2300-0000-5f9e-b8190e0d0000 pid=3342->guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344 clone 02095176-0f84-5fb2-97a2-4a4dba5cf040 172.245.11.31:282 guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->02095176-0f84-5fb2-97a2-4a4dba5cf040 send: 165B guuid=a37e2c63-2300-0000-5f9e-b8191c0d0000 pid=3356 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=a37e2c63-2300-0000-5f9e-b8191c0d0000 pid=3356 execve guuid=62d28984-2300-0000-5f9e-b819760d0000 pid=3446 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=62d28984-2300-0000-5f9e-b819760d0000 pid=3446 execve guuid=fd441985-2300-0000-5f9e-b819790d0000 pid=3449 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=fd441985-2300-0000-5f9e-b819790d0000 pid=3449 execve guuid=453fbf85-2300-0000-5f9e-b8197c0d0000 pid=3452 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=453fbf85-2300-0000-5f9e-b8197c0d0000 pid=3452 execve guuid=c0a56586-2300-0000-5f9e-b819800d0000 pid=3456 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=c0a56586-2300-0000-5f9e-b819800d0000 pid=3456 execve guuid=0cba9290-2300-0000-5f9e-b8199a0d0000 pid=3482 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=0cba9290-2300-0000-5f9e-b8199a0d0000 pid=3482 execve guuid=25ab8e93-2300-0000-5f9e-b819a70d0000 pid=3495 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=25ab8e93-2300-0000-5f9e-b819a70d0000 pid=3495 execve guuid=3ea9cf96-2300-0000-5f9e-b819af0d0000 pid=3503 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=3ea9cf96-2300-0000-5f9e-b819af0d0000 pid=3503 execve guuid=76786e99-2300-0000-5f9e-b819b70d0000 pid=3511 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=76786e99-2300-0000-5f9e-b819b70d0000 pid=3511 execve guuid=32ed002c-2400-0000-5f9e-b819010f0000 pid=3841 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=32ed002c-2400-0000-5f9e-b819010f0000 pid=3841 execve guuid=c643112d-2400-0000-5f9e-b819090f0000 pid=3849 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=c643112d-2400-0000-5f9e-b819090f0000 pid=3849 execve guuid=f5a5c5bf-2400-0000-5f9e-b81928100000 pid=4136 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=f5a5c5bf-2400-0000-5f9e-b81928100000 pid=4136 execve guuid=b3b2aec0-2400-0000-5f9e-b8192a100000 pid=4138 /usr/bin/dash guuid=bd01125d-2300-0000-5f9e-b819100d0000 pid=3344->guuid=b3b2aec0-2400-0000-5f9e-b8192a100000 pid=4138 execve guuid=e9287c63-2300-0000-5f9e-b8191e0d0000 pid=3358 /usr/bin/rm delete-file guuid=a37e2c63-2300-0000-5f9e-b8191c0d0000 pid=3356->guuid=e9287c63-2300-0000-5f9e-b8191e0d0000 pid=3358 execve guuid=5c06be84-2300-0000-5f9e-b819770d0000 pid=3447 /usr/bin/rm guuid=62d28984-2300-0000-5f9e-b819760d0000 pid=3446->guuid=5c06be84-2300-0000-5f9e-b819770d0000 pid=3447 execve guuid=35986085-2300-0000-5f9e-b8197b0d0000 pid=3451 /usr/bin/rm guuid=fd441985-2300-0000-5f9e-b819790d0000 pid=3449->guuid=35986085-2300-0000-5f9e-b8197b0d0000 pid=3451 execve guuid=1e39f885-2300-0000-5f9e-b8197e0d0000 pid=3454 /usr/bin/rm guuid=453fbf85-2300-0000-5f9e-b8197c0d0000 pid=3452->guuid=1e39f885-2300-0000-5f9e-b8197e0d0000 pid=3454 execve guuid=fbc19a86-2300-0000-5f9e-b819810d0000 pid=3457 /usr/sbin/xtables-nft-multi guuid=c0a56586-2300-0000-5f9e-b819800d0000 pid=3456->guuid=fbc19a86-2300-0000-5f9e-b819810d0000 pid=3457 execve guuid=2feac190-2300-0000-5f9e-b8199c0d0000 pid=3484 /usr/bin/pgrep guuid=0cba9290-2300-0000-5f9e-b8199a0d0000 pid=3482->guuid=2feac190-2300-0000-5f9e-b8199c0d0000 pid=3484 execve guuid=c3ddb693-2300-0000-5f9e-b819a80d0000 pid=3496 /usr/bin/pgrep guuid=25ab8e93-2300-0000-5f9e-b819a70d0000 pid=3495->guuid=c3ddb693-2300-0000-5f9e-b819a80d0000 pid=3496 execve guuid=43c8fe96-2300-0000-5f9e-b819b10d0000 pid=3505 /usr/bin/pgrep guuid=3ea9cf96-2300-0000-5f9e-b819af0d0000 pid=3503->guuid=43c8fe96-2300-0000-5f9e-b819b10d0000 pid=3505 execve guuid=410a9e99-2300-0000-5f9e-b819b90d0000 pid=3513 /usr/bin/systemctl guuid=76786e99-2300-0000-5f9e-b819b70d0000 pid=3511->guuid=410a9e99-2300-0000-5f9e-b819b90d0000 pid=3513 execve guuid=4b46f799-2300-0000-5f9e-b819bb0d0000 pid=3515 /usr/bin/basename guuid=410a9e99-2300-0000-5f9e-b819b90d0000 pid=3513->guuid=4b46f799-2300-0000-5f9e-b819bb0d0000 pid=3515 execve guuid=c920669a-2300-0000-5f9e-b819bd0d0000 pid=3517 /usr/bin/basename guuid=410a9e99-2300-0000-5f9e-b819b90d0000 pid=3513->guuid=c920669a-2300-0000-5f9e-b819bd0d0000 pid=3517 execve guuid=fbcbd99a-2300-0000-5f9e-b819bf0d0000 pid=3519 /usr/bin/dash guuid=410a9e99-2300-0000-5f9e-b819b90d0000 pid=3513->guuid=fbcbd99a-2300-0000-5f9e-b819bf0d0000 pid=3519 clone guuid=2fbee49a-2300-0000-5f9e-b819c00d0000 pid=3520 /usr/bin/systemctl guuid=fbcbd99a-2300-0000-5f9e-b819bf0d0000 pid=3519->guuid=2fbee49a-2300-0000-5f9e-b819c00d0000 pid=3520 execve guuid=0c50ed9a-2300-0000-5f9e-b819c10d0000 pid=3521 /usr/bin/sed guuid=fbcbd99a-2300-0000-5f9e-b819bf0d0000 pid=3519->guuid=0c50ed9a-2300-0000-5f9e-b819c10d0000 pid=3521 execve guuid=0535332c-2400-0000-5f9e-b819030f0000 pid=3843 /usr/sbin/xtables-nft-multi guuid=32ed002c-2400-0000-5f9e-b819010f0000 pid=3841->guuid=0535332c-2400-0000-5f9e-b819030f0000 pid=3843 execve guuid=0e51ab2c-2400-0000-5f9e-b819060f0000 pid=3846 /usr/sbin/xtables-nft-multi guuid=32ed002c-2400-0000-5f9e-b819010f0000 pid=3841->guuid=0e51ab2c-2400-0000-5f9e-b819060f0000 pid=3846 execve guuid=161c662d-2400-0000-5f9e-b8190a0f0000 pid=3850 /usr/bin/systemctl guuid=c643112d-2400-0000-5f9e-b819090f0000 pid=3849->guuid=161c662d-2400-0000-5f9e-b8190a0f0000 pid=3850 execve guuid=80bdb12d-2400-0000-5f9e-b8190e0f0000 pid=3854 /usr/bin/basename guuid=161c662d-2400-0000-5f9e-b8190a0f0000 pid=3850->guuid=80bdb12d-2400-0000-5f9e-b8190e0f0000 pid=3854 execve guuid=60731f2e-2400-0000-5f9e-b8190f0f0000 pid=3855 /usr/bin/basename guuid=161c662d-2400-0000-5f9e-b8190a0f0000 pid=3850->guuid=60731f2e-2400-0000-5f9e-b8190f0f0000 pid=3855 execve guuid=1634902e-2400-0000-5f9e-b819130f0000 pid=3859 /usr/bin/dash guuid=161c662d-2400-0000-5f9e-b8190a0f0000 pid=3850->guuid=1634902e-2400-0000-5f9e-b819130f0000 pid=3859 clone guuid=028f9f2e-2400-0000-5f9e-b819140f0000 pid=3860 /usr/bin/systemctl guuid=1634902e-2400-0000-5f9e-b819130f0000 pid=3859->guuid=028f9f2e-2400-0000-5f9e-b819140f0000 pid=3860 execve guuid=4bafa82e-2400-0000-5f9e-b819150f0000 pid=3861 /usr/bin/sed guuid=1634902e-2400-0000-5f9e-b819130f0000 pid=3859->guuid=4bafa82e-2400-0000-5f9e-b819150f0000 pid=3861 execve guuid=7d5affbf-2400-0000-5f9e-b81929100000 pid=4137 /usr/bin/rm guuid=f5a5c5bf-2400-0000-5f9e-b81928100000 pid=4136->guuid=7d5affbf-2400-0000-5f9e-b81929100000 pid=4137 execve
Result
Threat name:
Mirai, Gafgyt
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Deletes all firewall rules
Detected Mirai
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Sample deletes itself
Sample is packed with UPX
Suricata IDS alerts for network traffic
Tries to stop the "iptables" service
Yara detected Gafgyt
Yara detected Mirai
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1885171 Sample: Dior.i586.elf Startdate: 17/03/2026 Architecture: LINUX Score: 100 70 172.245.11.31, 282, 56992 SERVER-MANIACA United States 2->70 72 109.202.202.202, 80 INIT7CH Switzerland 2->72 74 3 other IPs or domains 2->74 76 Suricata IDS alerts for network traffic 2->76 78 Found malware configuration 2->78 80 Malicious sample detected (through community Yara rule) 2->80 82 5 other signatures 2->82 12 Dior.i586.elf 2->12         started        15 dash rm 2->15         started        17 dash rm 2->17         started        signatures3 process4 signatures5 84 Opens /proc/net/* files useful for finding connected devices and routers 12->84 86 Sample deletes itself 12->86 19 Dior.i586.elf 12->19         started        process6 process7 21 Dior.i586.elf 19->21         started        process8 23 Dior.i586.elf sh 21->23         started        25 Dior.i586.elf sh 21->25         started        27 Dior.i586.elf sh 21->27         started        29 10 other processes 21->29 process9 31 sh service systemctl 23->31         started        34 sh iptables 25->34         started        36 sh service systemctl 27->36         started        38 sh rm 29->38         started        40 sh rm 29->40         started        42 sh rm 29->42         started        44 7 other processes 29->44 signatures10 88 Tries to stop the "iptables" service 31->88 46 service 31->46         started        48 service basename 31->48         started        50 service basename 31->50         started        52 service systemctl 31->52         started        90 Deletes all firewall rules 34->90 54 service 36->54         started        56 service basename 36->56         started        58 service basename 36->58         started        60 service systemctl 36->60         started        process11 process12 62 service systemctl 46->62         started        64 service sed 46->64         started        66 service systemctl 54->66         started        68 service sed 54->68         started       
Threat name:
Linux.Backdoor.Gafgyt
Status:
Malicious
First seen:
2026-03-17 20:16:10 UTC
File Type:
ELF32 Little (Exe)
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux privilege_escalation upx
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Reads CPU attributes
Reads system network configuration
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Deletes log files
Enumerates running processes
Reads system routing table
Deletes Audit logs
Deletes itself
Deletes journal logs
Deletes system logs
Flushes firewall rules
Writes DNS configuration
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

elf 816c04db99daaed67f176316e702900572abf12b6b7eaf641ef52c38702da72a

(this sample)

  
Delivery method
Distributed via web download

Comments