MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ce769e2a77acd5744c6c3cd846437f4b817213a5f03a080aeb8abc613fc41cf3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 8


Intelligence 8 IOCs YARA 5 File information Comments

SHA256 hash: ce769e2a77acd5744c6c3cd846437f4b817213a5f03a080aeb8abc613fc41cf3
SHA3-384 hash: ddbac1c1b1efe9f4f5cac98cab91876077faf4291a4bffae1b7e66e95b8ecae78fb73ecb095b1c5226e221eee9785bae
SHA1 hash: d4fe4b0b9c75d5e7288571d4a84e90c765d74316
MD5 hash: 97c97cad96d1b0775a191c164b4cba87
humanhash: lamp-william-mississippi-oscar
File name:x
Download: download sample
Signature Gafgyt
File size:1'160'584 bytes
First seen:2026-04-29 13:56:00 UTC
Last seen:2026-04-30 02:11:17 UTC
File type: elf
MIME type:application/x-executable
ssdeep 12288:88wfKBGEmoY6h8nP+Soc9qs29deskWfNQ5wUlmyiEZhCy4lE5k:88wfKBGEm2h8P+Soc9NGdfkWKlVZ0fl
TLSH T11C357D5AF2F370FCD067C030439BDB62A835F46501226E7B65C4DA352E66EA01B29F67
telfhash t19ec18c704af635b0b3e7de20b762f0b55932146a66e939f11a63adc5df00f905c6282f
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf gafgyt

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Result
Verdict:
Malware
Maliciousness:

Behaviour
Changes access rights for a written file
Connection attempt
Runs as daemon
Kills processes
Launching a process
Locks files
Creating a file
Creating a file in the %temp% directory
Manages services
Changes the time when the file was created, accessed, or modified
Receives data from a server
Sets a written file as executable
Creating a file in the %temp% subdirectories
Creates or modifies files in /cron to set up autorun
Substitutes an application name
Performs a bruteforce attack in the network
Creates or modifies files in /init.d to set up autorun
Deleting of the original file
Creates or modifies symbolic links in /init.d to set up autorun
Creates or modifies files to set up autorun
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
gafgyt gcc mirai
Verdict:
Malicious
Uses P2P?:
false
Uses anti-vm?:
false
Architecture:
x86
Packer:
not packed
Botnet:
unknown
Number of open files:
95
Number of processes launched:
30
Processes remaning?
true
Remote TCP ports scanned:
23,2323
Behaviour
Persistence
Process Renaming
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
not identified
Verdict:
Malicious
File Type:
elf.64.le
First seen:
2026-04-29T10:16:00Z UTC
Last seen:
2026-04-30T12:58:00Z UTC
Hits:
~100
Status:
terminated
Behavior Graph:
%3 guuid=4039fcee-1600-0000-f697-5e6c6b0e0000 pid=3691 /usr/bin/sudo guuid=8d2cb4f1-1600-0000-f697-5e6c760e0000 pid=3702 /tmp/sample.bin write-file guuid=4039fcee-1600-0000-f697-5e6c6b0e0000 pid=3691->guuid=8d2cb4f1-1600-0000-f697-5e6c760e0000 pid=3702 execve guuid=5d9ae4f1-1600-0000-f697-5e6c770e0000 pid=3703 /tmp/sample.bin zombie guuid=8d2cb4f1-1600-0000-f697-5e6c760e0000 pid=3702->guuid=5d9ae4f1-1600-0000-f697-5e6c770e0000 pid=3703 clone guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704 /tmp/sample.bin delete-file net write-config write-file zombie guuid=5d9ae4f1-1600-0000-f697-5e6c770e0000 pid=3703->guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704 clone 817cd339-5552-5cb9-8f12-0c6f242c213a 5.231.230.158:1337 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->817cd339-5552-5cb9-8f12-0c6f242c213a con guuid=bc8111f2-1600-0000-f697-5e6c7a0e0000 pid=3706 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=bc8111f2-1600-0000-f697-5e6c7a0e0000 pid=3706 execve guuid=138350f2-1600-0000-f697-5e6c7c0e0000 pid=3708 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=138350f2-1600-0000-f697-5e6c7c0e0000 pid=3708 execve guuid=fc74f7f2-1600-0000-f697-5e6c810e0000 pid=3713 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=fc74f7f2-1600-0000-f697-5e6c810e0000 pid=3713 execve guuid=18862bf3-1600-0000-f697-5e6c820e0000 pid=3714 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=18862bf3-1600-0000-f697-5e6c820e0000 pid=3714 execve guuid=65fc9df3-1600-0000-f697-5e6c870e0000 pid=3719 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=65fc9df3-1600-0000-f697-5e6c870e0000 pid=3719 execve guuid=3742c9f3-1600-0000-f697-5e6c880e0000 pid=3720 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=3742c9f3-1600-0000-f697-5e6c880e0000 pid=3720 execve guuid=6c443ef4-1600-0000-f697-5e6c8b0e0000 pid=3723 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=6c443ef4-1600-0000-f697-5e6c8b0e0000 pid=3723 execve guuid=8dd272f4-1600-0000-f697-5e6c8d0e0000 pid=3725 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=8dd272f4-1600-0000-f697-5e6c8d0e0000 pid=3725 execve guuid=4003dbf4-1600-0000-f697-5e6c920e0000 pid=3730 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=4003dbf4-1600-0000-f697-5e6c920e0000 pid=3730 execve guuid=f12b11f5-1600-0000-f697-5e6c960e0000 pid=3734 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=f12b11f5-1600-0000-f697-5e6c960e0000 pid=3734 execve guuid=a9cb7ef5-1600-0000-f697-5e6c990e0000 pid=3737 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=a9cb7ef5-1600-0000-f697-5e6c990e0000 pid=3737 execve guuid=9febacf5-1600-0000-f697-5e6c9b0e0000 pid=3739 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=9febacf5-1600-0000-f697-5e6c9b0e0000 pid=3739 execve guuid=0baa18f6-1600-0000-f697-5e6ca00e0000 pid=3744 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=0baa18f6-1600-0000-f697-5e6ca00e0000 pid=3744 execve guuid=49cbbbf6-1600-0000-f697-5e6ca80e0000 pid=3752 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=49cbbbf6-1600-0000-f697-5e6ca80e0000 pid=3752 execve guuid=4a485bf7-1600-0000-f697-5e6caf0e0000 pid=3759 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=4a485bf7-1600-0000-f697-5e6caf0e0000 pid=3759 execve guuid=3ecabd32-1700-0000-f697-5e6c7c0f0000 pid=3964 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=3ecabd32-1700-0000-f697-5e6c7c0f0000 pid=3964 execve guuid=a07d899a-1700-0000-f697-5e6c96110000 pid=4502 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=a07d899a-1700-0000-f697-5e6c96110000 pid=4502 execve guuid=f5fd8abb-1700-0000-f697-5e6c23120000 pid=4643 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=f5fd8abb-1700-0000-f697-5e6c23120000 pid=4643 execve guuid=214a9ae2-1700-0000-f697-5e6ccb120000 pid=4811 /usr/bin/dash guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=214a9ae2-1700-0000-f697-5e6ccb120000 pid=4811 execve guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913 /tmp/sample.bin net zombie guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913 clone guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914 /tmp/sample.bin net zombie guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914 clone guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4915 /tmp/sample.bin guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=3704->guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4915 clone guuid=612496f2-1600-0000-f697-5e6c7d0e0000 pid=3709 /usr/bin/chattr guuid=138350f2-1600-0000-f697-5e6c7c0e0000 pid=3708->guuid=612496f2-1600-0000-f697-5e6c7d0e0000 pid=3709 execve guuid=ff5e57f3-1600-0000-f697-5e6c830e0000 pid=3715 /usr/bin/chattr guuid=18862bf3-1600-0000-f697-5e6c820e0000 pid=3714->guuid=ff5e57f3-1600-0000-f697-5e6c830e0000 pid=3715 execve guuid=2c5ffcf3-1600-0000-f697-5e6c890e0000 pid=3721 /usr/bin/chattr guuid=3742c9f3-1600-0000-f697-5e6c880e0000 pid=3720->guuid=2c5ffcf3-1600-0000-f697-5e6c890e0000 pid=3721 execve guuid=1a649cf4-1600-0000-f697-5e6c910e0000 pid=3729 /usr/bin/chattr guuid=8dd272f4-1600-0000-f697-5e6c8d0e0000 pid=3725->guuid=1a649cf4-1600-0000-f697-5e6c910e0000 pid=3729 execve guuid=c4a439f5-1600-0000-f697-5e6c970e0000 pid=3735 /usr/bin/chattr guuid=f12b11f5-1600-0000-f697-5e6c960e0000 pid=3734->guuid=c4a439f5-1600-0000-f697-5e6c970e0000 pid=3735 execve guuid=b18ed4f5-1600-0000-f697-5e6c9c0e0000 pid=3740 /usr/bin/chattr guuid=9febacf5-1600-0000-f697-5e6c9b0e0000 pid=3739->guuid=b18ed4f5-1600-0000-f697-5e6c9c0e0000 pid=3740 execve guuid=849346f6-1600-0000-f697-5e6ca10e0000 pid=3745 /usr/bin/dash guuid=0baa18f6-1600-0000-f697-5e6ca00e0000 pid=3744->guuid=849346f6-1600-0000-f697-5e6ca10e0000 pid=3745 clone guuid=e6e54df6-1600-0000-f697-5e6ca20e0000 pid=3746 /usr/bin/dash guuid=0baa18f6-1600-0000-f697-5e6ca00e0000 pid=3744->guuid=e6e54df6-1600-0000-f697-5e6ca20e0000 pid=3746 clone guuid=128d50f6-1600-0000-f697-5e6ca30e0000 pid=3747 /usr/bin/dash guuid=849346f6-1600-0000-f697-5e6ca10e0000 pid=3745->guuid=128d50f6-1600-0000-f697-5e6ca30e0000 pid=3747 clone guuid=997257f6-1600-0000-f697-5e6ca40e0000 pid=3748 /usr/bin/grep guuid=849346f6-1600-0000-f697-5e6ca10e0000 pid=3745->guuid=997257f6-1600-0000-f697-5e6ca40e0000 pid=3748 execve guuid=882beaf6-1600-0000-f697-5e6ca90e0000 pid=3753 /usr/bin/dash guuid=49cbbbf6-1600-0000-f697-5e6ca80e0000 pid=3752->guuid=882beaf6-1600-0000-f697-5e6ca90e0000 pid=3753 clone guuid=9e28f4f6-1600-0000-f697-5e6cab0e0000 pid=3755 /usr/bin/dash guuid=49cbbbf6-1600-0000-f697-5e6ca80e0000 pid=3752->guuid=9e28f4f6-1600-0000-f697-5e6cab0e0000 pid=3755 clone guuid=94b7f4f6-1600-0000-f697-5e6cac0e0000 pid=3756 /usr/bin/dash guuid=882beaf6-1600-0000-f697-5e6ca90e0000 pid=3753->guuid=94b7f4f6-1600-0000-f697-5e6cac0e0000 pid=3756 clone guuid=a18ff8f6-1600-0000-f697-5e6cad0e0000 pid=3757 /usr/bin/grep guuid=882beaf6-1600-0000-f697-5e6ca90e0000 pid=3753->guuid=a18ff8f6-1600-0000-f697-5e6cad0e0000 pid=3757 execve guuid=d48f89f7-1600-0000-f697-5e6cb30e0000 pid=3763 /usr/sbin/update-rc.d guuid=4a485bf7-1600-0000-f697-5e6caf0e0000 pid=3759->guuid=d48f89f7-1600-0000-f697-5e6cb30e0000 pid=3763 execve guuid=806e2afb-1600-0000-f697-5e6cc00e0000 pid=3776 /usr/bin/systemctl guuid=d48f89f7-1600-0000-f697-5e6cb30e0000 pid=3763->guuid=806e2afb-1600-0000-f697-5e6cc00e0000 pid=3776 execve guuid=c76ce632-1700-0000-f697-5e6c7e0f0000 pid=3966 /usr/bin/systemctl guuid=3ecabd32-1700-0000-f697-5e6c7c0f0000 pid=3964->guuid=c76ce632-1700-0000-f697-5e6c7e0f0000 pid=3966 execve guuid=ba40cb33-1700-0000-f697-5e6c820f0000 pid=3970 /usr/lib/systemd/systemd-sysv-install guuid=c76ce632-1700-0000-f697-5e6c7e0f0000 pid=3966->guuid=ba40cb33-1700-0000-f697-5e6c820f0000 pid=3970 execve guuid=74521a34-1700-0000-f697-5e6c860f0000 pid=3974 /usr/bin/getopt guuid=ba40cb33-1700-0000-f697-5e6c820f0000 pid=3970->guuid=74521a34-1700-0000-f697-5e6c860f0000 pid=3974 execve guuid=5f876534-1700-0000-f697-5e6c8a0f0000 pid=3978 /usr/sbin/update-rc.d guuid=ba40cb33-1700-0000-f697-5e6c820f0000 pid=3970->guuid=5f876534-1700-0000-f697-5e6c8a0f0000 pid=3978 execve guuid=1a8cb253-1700-0000-f697-5e6c2b100000 pid=4139 /usr/sbin/update-rc.d guuid=ba40cb33-1700-0000-f697-5e6c820f0000 pid=3970->guuid=1a8cb253-1700-0000-f697-5e6c2b100000 pid=4139 execve guuid=cabbac35-1700-0000-f697-5e6c930f0000 pid=3987 /usr/bin/systemctl guuid=5f876534-1700-0000-f697-5e6c8a0f0000 pid=3978->guuid=cabbac35-1700-0000-f697-5e6c930f0000 pid=3987 execve guuid=ee35c954-1700-0000-f697-5e6c33100000 pid=4147 /usr/bin/systemctl guuid=1a8cb253-1700-0000-f697-5e6c2b100000 pid=4139->guuid=ee35c954-1700-0000-f697-5e6c33100000 pid=4147 execve guuid=2967b19a-1700-0000-f697-5e6c97110000 pid=4503 /usr/bin/systemctl guuid=a07d899a-1700-0000-f697-5e6c96110000 pid=4502->guuid=2967b19a-1700-0000-f697-5e6c97110000 pid=4503 execve guuid=a7c3b0bb-1700-0000-f697-5e6c25120000 pid=4645 /usr/bin/systemctl guuid=f5fd8abb-1700-0000-f697-5e6c23120000 pid=4643->guuid=a7c3b0bb-1700-0000-f697-5e6c25120000 pid=4645 execve guuid=ce86c5e2-1700-0000-f697-5e6ccd120000 pid=4813 /usr/bin/systemctl guuid=214a9ae2-1700-0000-f697-5e6ccb120000 pid=4811->guuid=ce86c5e2-1700-0000-f697-5e6ccd120000 pid=4813 execve guuid=87e713e4-1700-0000-f697-5e6cd4120000 pid=4820 /usr/bin/dash guuid=e3dbd5f6-1700-0000-f697-5e6c2a130000 pid=4906 /tmp/.d guuid=87e713e4-1700-0000-f697-5e6cd4120000 pid=4820->guuid=e3dbd5f6-1700-0000-f697-5e6c2a130000 pid=4906 execve 11ee4a4b-dd14-5d0d-8efc-d8a06e04f15c 119.176.216.64:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->11ee4a4b-dd14-5d0d-8efc-d8a06e04f15c con 44ec97c9-26b5-5b9c-956e-e88e36ca38e9 119.176.216.64:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->44ec97c9-26b5-5b9c-956e-e88e36ca38e9 con b5b5705a-3019-5b6e-bbca-ce25bb19bbaf 49.246.83.164:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->b5b5705a-3019-5b6e-bbca-ce25bb19bbaf con aed4792f-d03c-59fd-ac63-64012bb20d70 49.246.83.164:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->aed4792f-d03c-59fd-ac63-64012bb20d70 con 1529c340-1fa0-5b4d-b65e-f144abe3a797 34.142.195.16:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->1529c340-1fa0-5b4d-b65e-f144abe3a797 con 66c11e26-b89f-5bfb-b3c8-24e20f5ed0f1 34.142.195.16:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->66c11e26-b89f-5bfb-b3c8-24e20f5ed0f1 con 87e269e1-e201-5499-ae8b-e1942717fcef 155.208.75.19:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->87e269e1-e201-5499-ae8b-e1942717fcef con 82916184-b8da-5ce0-9c45-d56e0f312a77 155.208.75.19:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->82916184-b8da-5ce0-9c45-d56e0f312a77 con 7e26f446-210b-5e7c-9561-6a937dc65d0b 38.242.138.87:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->7e26f446-210b-5e7c-9561-6a937dc65d0b con b0c72e7b-f0a7-5d52-93d8-ecf31e2fabcb 38.242.138.87:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->b0c72e7b-f0a7-5d52-93d8-ecf31e2fabcb con 7810f28e-f9f9-523e-a86e-86e20afbc25e 125.36.135.181:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->7810f28e-f9f9-523e-a86e-86e20afbc25e con 2571f664-33a7-5f86-a3eb-54b30989a5d8 125.36.135.181:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->2571f664-33a7-5f86-a3eb-54b30989a5d8 con eda2004f-b351-561d-ac38-75f494dde0fb 165.143.109.65:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->eda2004f-b351-561d-ac38-75f494dde0fb con ceea7320-e29b-58c3-b2fd-d022f06037ce 165.143.109.65:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->ceea7320-e29b-58c3-b2fd-d022f06037ce con e791d263-e5e5-5646-863c-afe478017450 95.84.192.2:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->e791d263-e5e5-5646-863c-afe478017450 con 4364eaf0-2e24-5c60-aec8-b72719f72cda 95.84.192.2:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->4364eaf0-2e24-5c60-aec8-b72719f72cda con e47f5f19-7d88-556e-bc9c-98d34ed107d0 40.85.236.165:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->e47f5f19-7d88-556e-bc9c-98d34ed107d0 con 8d6b1dda-8d29-5abf-b21a-2608c5a0a4df 40.85.236.165:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->8d6b1dda-8d29-5abf-b21a-2608c5a0a4df con d9f3498b-ee92-57cc-98fb-3fda0118f385 121.115.90.89:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4913->d9f3498b-ee92-57cc-98fb-3fda0118f385 con 3faa686b-b68d-5f9d-8a73-0d24de49bd82 96.2.159.169:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->3faa686b-b68d-5f9d-8a73-0d24de49bd82 con 53b8d4c6-edcb-5650-9e0d-7c22e619aa72 96.2.159.169:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->53b8d4c6-edcb-5650-9e0d-7c22e619aa72 con 19acd6f9-1707-5d93-a09c-bb560deb3408 129.160.41.30:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->19acd6f9-1707-5d93-a09c-bb560deb3408 con d9379585-f788-5c8d-b93b-49e588d80134 129.160.41.30:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->d9379585-f788-5c8d-b93b-49e588d80134 con bef2bda2-c3ca-5f4b-97e8-b66f96a792cc 55.187.237.102:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->bef2bda2-c3ca-5f4b-97e8-b66f96a792cc con fce8b06a-11f0-503b-bef8-5e4ac3b4bed3 55.187.237.102:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->fce8b06a-11f0-503b-bef8-5e4ac3b4bed3 con 52a76def-241c-5345-8a35-9f120f1bb9b3 189.198.125.173:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->52a76def-241c-5345-8a35-9f120f1bb9b3 con 124752a8-d145-52cf-837e-9446f3f4746b 189.198.125.173:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->124752a8-d145-52cf-837e-9446f3f4746b con 996f376f-19a9-5e3a-81ae-8009a23dbd4d 128.36.83.224:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->996f376f-19a9-5e3a-81ae-8009a23dbd4d con 31f5a635-ff97-5bed-9cb5-6a2feb3356f1 128.36.83.224:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->31f5a635-ff97-5bed-9cb5-6a2feb3356f1 con 31db0f34-0b56-5067-bf91-46850e097d53 223.117.27.2:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->31db0f34-0b56-5067-bf91-46850e097d53 con b33982b5-f630-56d5-9f79-5ba64237a194 223.117.27.2:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->b33982b5-f630-56d5-9f79-5ba64237a194 con 2e431fe9-5993-5c4f-a803-cf8b3dd9e56d 3.223.18.192:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->2e431fe9-5993-5c4f-a803-cf8b3dd9e56d con 353945cc-87b3-5d03-8e00-76575d28db55 3.223.18.192:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->353945cc-87b3-5d03-8e00-76575d28db55 con b0fc716b-4f94-517a-903f-c50f46509722 184.224.220.167:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->b0fc716b-4f94-517a-903f-c50f46509722 con b39705ed-b257-51c9-a979-46f2268f0f74 184.224.220.167:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->b39705ed-b257-51c9-a979-46f2268f0f74 con 103ae717-8e9c-5f8d-9769-ec563069e857 154.74.89.130:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->103ae717-8e9c-5f8d-9769-ec563069e857 con 6117a5c6-6eca-5496-b49b-9e4ea37eae57 154.74.89.130:2323 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->6117a5c6-6eca-5496-b49b-9e4ea37eae57 con 21c07712-6e13-509e-8e44-148ea1f92b15 85.109.171.250:23 guuid=3d0ff0f1-1600-0000-f697-5e6c780e0000 pid=4914->21c07712-6e13-509e-8e44-148ea1f92b15 con
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.evad
Score:
92 / 100
Signature
Drops files in suspicious directories
Drops invisible ELF files
Executes the "crontab" command typically for achieving persistence
Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions
Multi AV Scanner detection for submitted file
Protects files from modification
Sample deletes itself
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1906271 Sample: x.elf Startdate: 29/04/2026 Architecture: LINUX Score: 92 110 105.175.34.181, 23, 2323 unitel-ASAO Angola 2->110 112 188.87.193.148, 23, 2323 VODAFONE_ESES Spain 2->112 114 50 other IPs or domains 2->114 116 Multi AV Scanner detection for submitted file 2->116 118 Uses known network protocols on non-standard ports 2->118 13 x.elf 2->13         started        15 systemd sh 2->15         started        17 systemd sh 2->17         started        19 9 other processes 2->19 signatures3 process4 process5 21 x.elf 13->21         started        23 sh wget 15->23         started        35 4 other processes 15->35 27 sh wget 17->27         started        29 sh chmod 17->29         started        31 sh .d 17->31         started        37 2 other processes 17->37 33 sh wget 19->33         started        39 4 other processes 19->39 file6 41 x.elf 21->41         started        100 /tmp/.d, ELF 23->100 dropped 128 Drops invisible ELF files 23->128 signatures7 process8 file9 102 /root/.bashrc, ASCII 41->102 dropped 104 /etc/profile.d/locale.sh, POSIX 41->104 dropped 106 /etc/init.d/dbus-daemon, POSIX 41->106 dropped 108 /tmp/.cron_check, POSIX 41->108 dropped 132 Sample tries to set files in /etc globally writable 41->132 134 Sample tries to persist itself using /etc/profile 41->134 136 Drops files in suspicious directories 41->136 138 2 other signatures 41->138 45 x.elf sh 41->45         started        47 x.elf sh 41->47         started        49 x.elf sh 41->49         started        51 16 other processes 41->51 signatures10 process11 process12 53 sh crontab 45->53         started        57 sh 45->57         started        59 sh crontab 47->59         started        61 sh 47->61         started        63 sh update-rc.d 49->63         started        65 sh chattr 51->65         started        67 sh chattr 51->67         started        69 sh chattr 51->69         started        71 7 other processes 51->71 file13 96 /var/spool/cron/crontabs/tmp.CC2lAg, ASCII 53->96 dropped 120 Sample tries to persist itself using cron 53->120 122 Executes the "crontab" command typically for achieving persistence 53->122 73 sh crontab 57->73         started        76 sh grep 57->76         started        98 /var/spool/cron/crontabs/tmp.JGqpcE, ASCII 59->98 dropped 78 sh crontab 61->78         started        80 sh grep 61->80         started        124 Sample tries to persist itself using System V runlevels 63->124 82 update-rc.d systemctl 63->82         started        126 Protects files from modification 65->126 84 systemctl systemd-sysv-install 71->84         started        signatures14 process15 signatures16 130 Executes the "crontab" command typically for achieving persistence 73->130 86 systemd-sysv-install update-rc.d 84->86         started        88 systemd-sysv-install update-rc.d 84->88         started        90 systemd-sysv-install getopt 84->90         started        process17 process18 92 update-rc.d systemctl 86->92         started        94 update-rc.d systemctl 88->94         started       
Threat name:
Linux.Backdoor.Gafgyt
Status:
Malicious
First seen:
2026-04-29 13:15:59 UTC
File Type:
ELF64 Little (Exe)
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery execution linux persistence privilege_escalation
Behaviour
Reads runtime system information
Writes file to tmp directory
Changes its process name
Modifies Bash startup script
Creates/modifies Cron job
Creates/modifies environment variables
Enumerates running processes
Modifies init.d
Modifies rc script
Modifies systemd
File and Directory Permissions Modification
Deletes itself
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:F01_s1ckrule
Author:s1ckb017
Rule name:malwareelf55503
Rule name:TH_Generic_MassHunt_Linux_Malware_2026_CYFARE
Author:CYFARE
Description:Generic Linux malware mass-hunt rule - 2026
Reference:https://cyfare.net/
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

elf ce769e2a77acd5744c6c3cd846437f4b817213a5f03a080aeb8abc613fc41cf3

(this sample)

  
Delivery method
Distributed via web download

Comments