MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb6de9d21935d30876c9d62a4557b160854115af9b6dab8a781d4e192c8f3559. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: cb6de9d21935d30876c9d62a4557b160854115af9b6dab8a781d4e192c8f3559
SHA3-384 hash: 530f4142b90e62a7284bf15b75870423bd8b55ff8d9e141bc0714245b34084e2a39bbb7575e82191ac2c250e958dbab5
SHA1 hash: e76688f86ca670b0b1818029f94c9a52a891754d
MD5 hash: f52e1c48819abf04f1f22e0fc44cdc5d
humanhash: jig-magnesium-oven-yellow
File name:bot
Download: download sample
Signature Gafgyt
File size:1'164'680 bytes
First seen:2026-04-30 12:06:25 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 24576:qyCAK6yZQUGU9XoVuOxJ6wgKV4L/zVj+D:q5AfmQUGUZoQOxJ6wRm3
TLSH T1BD456C5AF2F370BCD067C030439BDB62A835F47501226E7B65C4DA352E66EA01B29F67
telfhash t1ddc148b04afa70b0a7d7d9217362f0756a761466a6e836f417226dc4df40f804da2c2f
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf gafgyt

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sets a written file as executable
Changes the time when the file was created, accessed, or modified
Receives data from a server
Creating a file
Locks files
Runs as daemon
Connection attempt
Changes access rights for a written file
Manages services
Kills processes
Creating a file in the %temp% directory
Creating a file in the %temp% subdirectories
Substitutes an application name
Creates or modifies files in /cron to set up autorun
Creates or modifies files in /init.d to set up autorun
Deleting of the original file
Creates or modifies files to set up autorun
Performs a bruteforce attack in the network
Creates or modifies symbolic links in /init.d to set up autorun
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
gafgyt gcc mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
95
Number of processes launched:
30
Processes remaning?
true
Remote TCP ports scanned:
23,2323
Behaviour
Persistence
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.64.le
First seen:
2026-04-30T10:12:00Z UTC
Last seen:
2026-04-30T12:58:00Z UTC
Hits:
~100
Status:
terminated
Behavior Graph:
%3 guuid=1cdc1a4d-1900-0000-9b73-5baba60a0000 pid=2726 /usr/bin/sudo guuid=7e4cdc4e-1900-0000-9b73-5babac0a0000 pid=2732 /tmp/sample.bin write-file guuid=1cdc1a4d-1900-0000-9b73-5baba60a0000 pid=2726->guuid=7e4cdc4e-1900-0000-9b73-5babac0a0000 pid=2732 execve guuid=481b0f4f-1900-0000-9b73-5babad0a0000 pid=2733 /tmp/sample.bin zombie guuid=7e4cdc4e-1900-0000-9b73-5babac0a0000 pid=2732->guuid=481b0f4f-1900-0000-9b73-5babad0a0000 pid=2733 clone guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734 /tmp/sample.bin delete-file net write-config write-file zombie guuid=481b0f4f-1900-0000-9b73-5babad0a0000 pid=2733->guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734 clone 817cd339-5552-5cb9-8f12-0c6f242c213a 5.231.230.158:1337 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->817cd339-5552-5cb9-8f12-0c6f242c213a con guuid=7b74534f-1900-0000-9b73-5babb00a0000 pid=2736 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=7b74534f-1900-0000-9b73-5babb00a0000 pid=2736 execve guuid=0522844f-1900-0000-9b73-5babb10a0000 pid=2737 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=0522844f-1900-0000-9b73-5babb10a0000 pid=2737 execve guuid=113f3150-1900-0000-9b73-5babb40a0000 pid=2740 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=113f3150-1900-0000-9b73-5babb40a0000 pid=2740 execve guuid=be638450-1900-0000-9b73-5babb60a0000 pid=2742 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=be638450-1900-0000-9b73-5babb60a0000 pid=2742 execve guuid=61ed1d51-1900-0000-9b73-5babb80a0000 pid=2744 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=61ed1d51-1900-0000-9b73-5babb80a0000 pid=2744 execve guuid=83177651-1900-0000-9b73-5babba0a0000 pid=2746 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=83177651-1900-0000-9b73-5babba0a0000 pid=2746 execve guuid=6f4e2052-1900-0000-9b73-5babbd0a0000 pid=2749 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=6f4e2052-1900-0000-9b73-5babbd0a0000 pid=2749 execve guuid=603b5d52-1900-0000-9b73-5babbf0a0000 pid=2751 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=603b5d52-1900-0000-9b73-5babbf0a0000 pid=2751 execve guuid=a26ede52-1900-0000-9b73-5babc20a0000 pid=2754 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=a26ede52-1900-0000-9b73-5babc20a0000 pid=2754 execve guuid=5a000f53-1900-0000-9b73-5babc30a0000 pid=2755 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=5a000f53-1900-0000-9b73-5babc30a0000 pid=2755 execve guuid=34b3d053-1900-0000-9b73-5babc70a0000 pid=2759 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=34b3d053-1900-0000-9b73-5babc70a0000 pid=2759 execve guuid=ce283454-1900-0000-9b73-5babc80a0000 pid=2760 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=ce283454-1900-0000-9b73-5babc80a0000 pid=2760 execve guuid=a282f754-1900-0000-9b73-5babcb0a0000 pid=2763 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=a282f754-1900-0000-9b73-5babcb0a0000 pid=2763 execve guuid=ecce2756-1900-0000-9b73-5babd00a0000 pid=2768 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=ecce2756-1900-0000-9b73-5babd00a0000 pid=2768 execve guuid=26ab2e57-1900-0000-9b73-5babd70a0000 pid=2775 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=26ab2e57-1900-0000-9b73-5babd70a0000 pid=2775 execve guuid=cef7c999-1900-0000-9b73-5bab5e0b0000 pid=2910 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=cef7c999-1900-0000-9b73-5bab5e0b0000 pid=2910 execve guuid=1a27c91d-1a00-0000-9b73-5babd40c0000 pid=3284 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=1a27c91d-1a00-0000-9b73-5babd40c0000 pid=3284 execve guuid=a7a12c51-1a00-0000-9b73-5bab250d0000 pid=3365 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=a7a12c51-1a00-0000-9b73-5bab250d0000 pid=3365 execve guuid=3a33e37f-1a00-0000-9b73-5baba00d0000 pid=3488 /usr/bin/dash guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=3a33e37f-1a00-0000-9b73-5baba00d0000 pid=3488 execve guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548 /tmp/sample.bin net zombie guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548 clone guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549 /tmp/sample.bin net zombie guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549 clone guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3550 /tmp/sample.bin guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=2734->guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3550 clone guuid=eaccae4f-1900-0000-9b73-5babb30a0000 pid=2739 /usr/bin/chattr guuid=0522844f-1900-0000-9b73-5babb10a0000 pid=2737->guuid=eaccae4f-1900-0000-9b73-5babb30a0000 pid=2739 execve guuid=78e9c350-1900-0000-9b73-5babb70a0000 pid=2743 /usr/bin/chattr guuid=be638450-1900-0000-9b73-5babb60a0000 pid=2742->guuid=78e9c350-1900-0000-9b73-5babb70a0000 pid=2743 execve guuid=7590b151-1900-0000-9b73-5babbb0a0000 pid=2747 /usr/bin/chattr guuid=83177651-1900-0000-9b73-5babba0a0000 pid=2746->guuid=7590b151-1900-0000-9b73-5babbb0a0000 pid=2747 execve guuid=a8298a52-1900-0000-9b73-5babc00a0000 pid=2752 /usr/bin/chattr guuid=603b5d52-1900-0000-9b73-5babbf0a0000 pid=2751->guuid=a8298a52-1900-0000-9b73-5babc00a0000 pid=2752 execve guuid=b1125753-1900-0000-9b73-5babc50a0000 pid=2757 /usr/bin/chattr guuid=5a000f53-1900-0000-9b73-5babc30a0000 pid=2755->guuid=b1125753-1900-0000-9b73-5babc50a0000 pid=2757 execve guuid=9f698054-1900-0000-9b73-5babc90a0000 pid=2761 /usr/bin/chattr guuid=ce283454-1900-0000-9b73-5babc80a0000 pid=2760->guuid=9f698054-1900-0000-9b73-5babc90a0000 pid=2761 execve guuid=83df4655-1900-0000-9b73-5babcc0a0000 pid=2764 /usr/bin/dash guuid=a282f754-1900-0000-9b73-5babcb0a0000 pid=2763->guuid=83df4655-1900-0000-9b73-5babcc0a0000 pid=2764 clone guuid=81105255-1900-0000-9b73-5babcd0a0000 pid=2765 /usr/bin/dash guuid=a282f754-1900-0000-9b73-5babcb0a0000 pid=2763->guuid=81105255-1900-0000-9b73-5babcd0a0000 pid=2765 clone guuid=97a75655-1900-0000-9b73-5babce0a0000 pid=2766 /usr/bin/dash guuid=83df4655-1900-0000-9b73-5babcc0a0000 pid=2764->guuid=97a75655-1900-0000-9b73-5babce0a0000 pid=2766 clone guuid=51306055-1900-0000-9b73-5babcf0a0000 pid=2767 /usr/bin/grep guuid=83df4655-1900-0000-9b73-5babcc0a0000 pid=2764->guuid=51306055-1900-0000-9b73-5babcf0a0000 pid=2767 execve guuid=bd328a56-1900-0000-9b73-5babd10a0000 pid=2769 /usr/bin/dash guuid=ecce2756-1900-0000-9b73-5babd00a0000 pid=2768->guuid=bd328a56-1900-0000-9b73-5babd10a0000 pid=2769 clone guuid=96079456-1900-0000-9b73-5babd20a0000 pid=2770 /usr/bin/dash guuid=ecce2756-1900-0000-9b73-5babd00a0000 pid=2768->guuid=96079456-1900-0000-9b73-5babd20a0000 pid=2770 clone guuid=ba679756-1900-0000-9b73-5babd30a0000 pid=2771 /usr/bin/dash guuid=bd328a56-1900-0000-9b73-5babd10a0000 pid=2769->guuid=ba679756-1900-0000-9b73-5babd30a0000 pid=2771 clone guuid=18bb9d56-1900-0000-9b73-5babd40a0000 pid=2772 /usr/bin/grep guuid=bd328a56-1900-0000-9b73-5babd10a0000 pid=2769->guuid=18bb9d56-1900-0000-9b73-5babd40a0000 pid=2772 execve guuid=4dc47257-1900-0000-9b73-5babd90a0000 pid=2777 /usr/sbin/update-rc.d guuid=26ab2e57-1900-0000-9b73-5babd70a0000 pid=2775->guuid=4dc47257-1900-0000-9b73-5babd90a0000 pid=2777 execve guuid=0e20945c-1900-0000-9b73-5babe40a0000 pid=2788 /usr/bin/systemctl guuid=4dc47257-1900-0000-9b73-5babd90a0000 pid=2777->guuid=0e20945c-1900-0000-9b73-5babe40a0000 pid=2788 execve guuid=40d3f399-1900-0000-9b73-5bab600b0000 pid=2912 /usr/bin/systemctl guuid=cef7c999-1900-0000-9b73-5bab5e0b0000 pid=2910->guuid=40d3f399-1900-0000-9b73-5bab600b0000 pid=2912 execve guuid=8654d79a-1900-0000-9b73-5bab640b0000 pid=2916 /usr/lib/systemd/systemd-sysv-install guuid=40d3f399-1900-0000-9b73-5bab600b0000 pid=2912->guuid=8654d79a-1900-0000-9b73-5bab640b0000 pid=2916 execve guuid=f998349b-1900-0000-9b73-5bab670b0000 pid=2919 /usr/bin/getopt guuid=8654d79a-1900-0000-9b73-5bab640b0000 pid=2916->guuid=f998349b-1900-0000-9b73-5bab670b0000 pid=2919 execve guuid=93787f9b-1900-0000-9b73-5bab690b0000 pid=2921 /usr/sbin/update-rc.d guuid=8654d79a-1900-0000-9b73-5bab640b0000 pid=2916->guuid=93787f9b-1900-0000-9b73-5bab690b0000 pid=2921 execve guuid=0096cad1-1900-0000-9b73-5babf20b0000 pid=3058 /usr/sbin/update-rc.d guuid=8654d79a-1900-0000-9b73-5bab640b0000 pid=2916->guuid=0096cad1-1900-0000-9b73-5babf20b0000 pid=3058 execve guuid=8c53019d-1900-0000-9b73-5bab710b0000 pid=2929 /usr/bin/systemctl guuid=93787f9b-1900-0000-9b73-5bab690b0000 pid=2921->guuid=8c53019d-1900-0000-9b73-5bab710b0000 pid=2929 execve guuid=c0f484d3-1900-0000-9b73-5babf80b0000 pid=3064 /usr/bin/systemctl guuid=0096cad1-1900-0000-9b73-5babf20b0000 pid=3058->guuid=c0f484d3-1900-0000-9b73-5babf80b0000 pid=3064 execve guuid=f2fbf11d-1a00-0000-9b73-5babd60c0000 pid=3286 /usr/bin/systemctl guuid=1a27c91d-1a00-0000-9b73-5babd40c0000 pid=3284->guuid=f2fbf11d-1a00-0000-9b73-5babd60c0000 pid=3286 execve guuid=f2985751-1a00-0000-9b73-5bab260d0000 pid=3366 /usr/bin/systemctl guuid=a7a12c51-1a00-0000-9b73-5bab250d0000 pid=3365->guuid=f2985751-1a00-0000-9b73-5bab260d0000 pid=3366 execve guuid=7a0b3080-1a00-0000-9b73-5baba10d0000 pid=3489 /usr/bin/systemctl guuid=3a33e37f-1a00-0000-9b73-5baba00d0000 pid=3488->guuid=7a0b3080-1a00-0000-9b73-5baba10d0000 pid=3489 execve guuid=cef6bd81-1a00-0000-9b73-5baba40d0000 pid=3492 /usr/bin/dash guuid=33e15d94-1a00-0000-9b73-5babd50d0000 pid=3541 /tmp/.d guuid=cef6bd81-1a00-0000-9b73-5baba40d0000 pid=3492->guuid=33e15d94-1a00-0000-9b73-5babd50d0000 pid=3541 execve bad03d18-b30a-55df-a1be-ca624ad1f5d3 27.80.164.90:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->bad03d18-b30a-55df-a1be-ca624ad1f5d3 con 2f52a0b6-b4d2-591c-b770-99704c7222ee 27.80.164.90:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->2f52a0b6-b4d2-591c-b770-99704c7222ee con 6f1a4935-7d8d-5495-aed2-ea8094b8b36e 125.240.89.79:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->6f1a4935-7d8d-5495-aed2-ea8094b8b36e con a54c9351-9e50-549b-a62f-92fd056f3582 125.240.89.79:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->a54c9351-9e50-549b-a62f-92fd056f3582 con 698a27f8-607b-53ba-8e84-45f6ef22eb05 182.116.227.209:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->698a27f8-607b-53ba-8e84-45f6ef22eb05 con 2886002e-7f87-571d-a797-a7af565eb9fa 182.116.227.209:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->2886002e-7f87-571d-a797-a7af565eb9fa con 51e40a06-4bc9-5ba2-abd9-b6b82cf1568b 19.238.128.47:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->51e40a06-4bc9-5ba2-abd9-b6b82cf1568b con e55ab414-fa38-5016-9a10-fe7a04c7bf59 19.238.128.47:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->e55ab414-fa38-5016-9a10-fe7a04c7bf59 con 42aa653a-c4e0-5138-84e0-6385c658ae3c 36.138.167.161:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->42aa653a-c4e0-5138-84e0-6385c658ae3c con acd83fec-4b0f-5b00-957e-8c4b660a95af 36.138.167.161:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->acd83fec-4b0f-5b00-957e-8c4b660a95af con 645e55df-c840-5606-b38b-fa09b8f7638e 97.118.176.80:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->645e55df-c840-5606-b38b-fa09b8f7638e con 005e17b1-833a-5d81-b028-61ce81082ade 97.118.176.80:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->005e17b1-833a-5d81-b028-61ce81082ade con e0f6748a-3ab4-5134-b492-860dc9f5089d 180.177.240.242:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->e0f6748a-3ab4-5134-b492-860dc9f5089d con 01d2e95f-2797-5cf9-9988-5e2708e39453 180.177.240.242:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->01d2e95f-2797-5cf9-9988-5e2708e39453 con 933df5f0-4b56-5327-8bf7-25c28dcef227 214.122.220.250:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->933df5f0-4b56-5327-8bf7-25c28dcef227 con 3c141266-5e8a-5eb0-8aa7-42ad7dacf7b0 214.122.220.250:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->3c141266-5e8a-5eb0-8aa7-42ad7dacf7b0 con f0e43f2f-5161-56c3-bc61-ee4b43aae97b 131.139.212.229:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->f0e43f2f-5161-56c3-bc61-ee4b43aae97b con 685718ae-43e7-5fd6-a37d-1d4b8922ebb0 131.139.212.229:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->685718ae-43e7-5fd6-a37d-1d4b8922ebb0 con 06c42638-e4c3-5e56-a4ac-38b50a3723a8 144.250.73.15:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->06c42638-e4c3-5e56-a4ac-38b50a3723a8 con f3f8dcec-f413-535e-a5fe-ba0cc57d760b 144.250.73.15:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->f3f8dcec-f413-535e-a5fe-ba0cc57d760b con d15be345-28df-5f4c-bae6-625691a3e5dd 96.112.17.20:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3548->d15be345-28df-5f4c-bae6-625691a3e5dd con c622e694-7af9-5248-99d8-68c6f4408ced 171.255.0.189:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->c622e694-7af9-5248-99d8-68c6f4408ced con 2a61a038-254a-5cb3-85be-ca9e1e2fcb72 171.255.0.189:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->2a61a038-254a-5cb3-85be-ca9e1e2fcb72 con 0aa0d625-9ec9-563e-b5e1-5bbf397e998a 220.97.134.89:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->0aa0d625-9ec9-563e-b5e1-5bbf397e998a con e236764e-f084-5381-80a0-95855624eb25 220.97.134.89:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->e236764e-f084-5381-80a0-95855624eb25 con be79c817-4792-550f-988e-1ff2e8364244 175.6.117.2:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->be79c817-4792-550f-988e-1ff2e8364244 con 9cadf0e3-661d-5f57-9925-cb616fad0a4e 175.6.117.2:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->9cadf0e3-661d-5f57-9925-cb616fad0a4e con 243b1448-2c34-5fa9-9a64-6d1ab2713e75 62.36.137.234:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->243b1448-2c34-5fa9-9a64-6d1ab2713e75 con 3ddcaacf-a577-5dd3-a83d-7fa4a0395a7f 62.36.137.234:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->3ddcaacf-a577-5dd3-a83d-7fa4a0395a7f con 7453c138-0d67-584e-8c48-420ee9800752 122.0.240.86:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->7453c138-0d67-584e-8c48-420ee9800752 con 487dc103-c093-5f5c-91fa-f848bf211b59 122.0.240.86:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->487dc103-c093-5f5c-91fa-f848bf211b59 con 1b704b9c-e0e6-559a-bfa3-7b83c3a6a08f 201.11.196.127:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->1b704b9c-e0e6-559a-bfa3-7b83c3a6a08f con 61122d03-ced6-5032-89af-d0342378999d 201.11.196.127:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->61122d03-ced6-5032-89af-d0342378999d con 007e0938-d103-5317-895a-ceb2a05b9f19 174.198.49.193:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->007e0938-d103-5317-895a-ceb2a05b9f19 con 66d73c20-e1af-5fd9-9593-be93af5e4c40 174.198.49.193:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->66d73c20-e1af-5fd9-9593-be93af5e4c40 con f45f21e2-2e58-5761-a6e6-96b773baa036 4.131.155.126:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->f45f21e2-2e58-5761-a6e6-96b773baa036 con 6078fd81-e040-589f-8c08-18f76e982d6a 4.131.155.126:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->6078fd81-e040-589f-8c08-18f76e982d6a con 3f22d8cf-fed7-5c15-87c4-ed1b21c74f1e 1.132.53.202:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->3f22d8cf-fed7-5c15-87c4-ed1b21c74f1e con 650adb15-0be5-54bd-a28a-4164c7314f7b 1.132.53.202:2323 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->650adb15-0be5-54bd-a28a-4164c7314f7b con e6caf0d9-edc2-51e2-9207-6af8c30d4ac1 162.154.62.80:23 guuid=0c583f4f-1900-0000-9b73-5babae0a0000 pid=3549->e6caf0d9-edc2-51e2-9207-6af8c30d4ac1 con
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.evad
Score:
92 / 100
Signature
Drops files in suspicious directories
Drops invisible ELF files
Executes the "crontab" command typically for achieving persistence
Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions
Multi AV Scanner detection for submitted file
Protects files from modification
Sample deletes itself
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1906785 Sample: bot.elf Startdate: 30/04/2026 Architecture: LINUX Score: 92 110 154.225.66.132, 23, 2323 ZAINUGASUG Uganda 2->110 112 82.95.62.69, 23, 2323 XS4ALL-NLAmsterdamNL Netherlands 2->112 114 47 other IPs or domains 2->114 116 Multi AV Scanner detection for submitted file 2->116 118 Uses known network protocols on non-standard ports 2->118 13 bot.elf 2->13         started        15 systemd sh 2->15         started        17 systemd sh 2->17         started        19 9 other processes 2->19 signatures3 process4 process5 21 bot.elf 13->21         started        23 sh wget 15->23         started        35 4 other processes 15->35 27 sh wget 17->27         started        29 sh chmod 17->29         started        31 sh .d 17->31         started        37 2 other processes 17->37 33 sh wget 19->33         started        39 4 other processes 19->39 file6 41 bot.elf 21->41         started        100 /tmp/.d, ELF 23->100 dropped 128 Drops invisible ELF files 23->128 signatures7 process8 file9 102 /root/.bashrc, ASCII 41->102 dropped 104 /etc/profile.d/locale.sh, POSIX 41->104 dropped 106 /etc/init.d/dbus-daemon, POSIX 41->106 dropped 108 /tmp/.cron_check, POSIX 41->108 dropped 132 Sample tries to set files in /etc globally writable 41->132 134 Sample tries to persist itself using /etc/profile 41->134 136 Drops files in suspicious directories 41->136 138 2 other signatures 41->138 45 bot.elf sh 41->45         started        47 bot.elf sh 41->47         started        49 bot.elf sh 41->49         started        51 16 other processes 41->51 signatures10 process11 process12 53 sh crontab 45->53         started        57 sh 45->57         started        59 sh crontab 47->59         started        61 sh 47->61         started        63 sh update-rc.d 49->63         started        65 sh chattr 51->65         started        67 sh chattr 51->67         started        69 sh chattr 51->69         started        71 7 other processes 51->71 file13 96 /var/spool/cron/crontabs/tmp.AQhulI, ASCII 53->96 dropped 120 Sample tries to persist itself using cron 53->120 122 Executes the "crontab" command typically for achieving persistence 53->122 73 sh crontab 57->73         started        76 sh grep 57->76         started        98 /var/spool/cron/crontabs/tmp.0gZCn3, ASCII 59->98 dropped 78 sh crontab 61->78         started        80 sh grep 61->80         started        124 Sample tries to persist itself using System V runlevels 63->124 82 update-rc.d systemctl 63->82         started        126 Protects files from modification 65->126 84 systemctl systemd-sysv-install 71->84         started        signatures14 process15 signatures16 130 Executes the "crontab" command typically for achieving persistence 73->130 86 systemd-sysv-install update-rc.d 84->86         started        88 systemd-sysv-install update-rc.d 84->88         started        90 systemd-sysv-install getopt 84->90         started        process17 process18 92 update-rc.d systemctl 86->92         started        94 update-rc.d systemctl 88->94         started       
Threat name:
Linux.Backdoor.Gafgyt
Status:
Malicious
First seen:
2026-04-30 12:07:39 UTC
File Type:
ELF64 Little (Exe)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery execution linux persistence privilege_escalation
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Modifies Bash startup script
Creates/modifies Cron job
Creates/modifies environment variables
Enumerates running processes
Modifies init.d
Modifies rc script
Modifies systemd
File and Directory Permissions Modification
Deletes itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:malwareelf55503
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

elf cb6de9d21935d30876c9d62a4557b160854115af9b6dab8a781d4e192c8f3559

(this sample)

Comments