MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dfa2f76c20c39fbdd9d97f90fd9241f0635b3a0be6c238b0e11715e75c9c63ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gafgyt


Vendor detections: 11


Intelligence 11 IOCs YARA 12 File information Comments

SHA256 hash: dfa2f76c20c39fbdd9d97f90fd9241f0635b3a0be6c238b0e11715e75c9c63ca
SHA3-384 hash: e2e669e315bba7e91afc2da564d3f34a5b53798936b9f982cd0406b39f23df3740b446b5ae08ac09da7a476073bfd3fc
SHA1 hash: f61f89c73b11a00c2b2dad23b533a04bd10a11b4
MD5 hash: 6eb9168efa00189589f0682a201d78d5
humanhash: coffee-delaware-orange-july
File name:2.i686
Download: download sample
Signature Gafgyt
File size:99'228 bytes
First seen:2025-08-17 09:14:49 UTC
Last seen:2025-08-18 06:45:25 UTC
File type: elf
MIME type:application/x-executable
ssdeep 3072:X27zVSPtcVjRWLzIDW+MDfpcf03g5hpSbE37K812UrYn:X21SPtcVjRWLvaf03g5hpSbE37K812Ui
TLSH T1F1A34A41E123C3B3C8430AB121CF568A1522FA7A4BEB5DA5F7583EB4CB62AD53506FD1
telfhash t11f21f343a1b68a296fb39d646c7c46e116a1a62377407fb0ef1dc1849d37012b43dd8b
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf gafgyt

Intelligence


File Origin
# of uploads :
2
# of downloads :
36
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sends data to a server
Deletes a file
Removes directories from a subdirectory of a temporary directory
Launching a process
Removes directories
Connection attempt
Removes directories from a temporary directory
Substitutes an application name
Deleting of the original file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
gcc lolbin obfuscated remote
Status:
terminated
Behavior Graph:
%3 guuid=2d80b696-1900-0000-3ba1-aed4c20a0000 pid=2754 /usr/bin/sudo guuid=5c94a099-1900-0000-3ba1-aed4c80a0000 pid=2760 /tmp/sample.bin delete-file net guuid=2d80b696-1900-0000-3ba1-aed4c20a0000 pid=2754->guuid=5c94a099-1900-0000-3ba1-aed4c80a0000 pid=2760 execve 8b0a01dc-0728-52c1-8024-c4ba7801b8d6 8.8.8.8:53 guuid=5c94a099-1900-0000-3ba1-aed4c80a0000 pid=2760->8b0a01dc-0728-52c1-8024-c4ba7801b8d6 con guuid=efe8d99a-1900-0000-3ba1-aed4c90a0000 pid=2761 /tmp/sample.bin guuid=5c94a099-1900-0000-3ba1-aed4c80a0000 pid=2760->guuid=efe8d99a-1900-0000-3ba1-aed4c90a0000 pid=2761 clone guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762 /tmp/sample.bin net send-data write-file zombie guuid=efe8d99a-1900-0000-3ba1-aed4c90a0000 pid=2761->guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762 clone 0a51dcfe-12e0-5e73-a941-d38d027e2c8e 207.167.64.12:25545 guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->0a51dcfe-12e0-5e73-a941-d38d027e2c8e send: 164B guuid=41d4cba1-1900-0000-3ba1-aed4d50a0000 pid=2773 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=41d4cba1-1900-0000-3ba1-aed4d50a0000 pid=2773 execve guuid=e6875dc5-1900-0000-3ba1-aed4210b0000 pid=2849 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=e6875dc5-1900-0000-3ba1-aed4210b0000 pid=2849 execve guuid=5eaebec5-1900-0000-3ba1-aed4250b0000 pid=2853 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=5eaebec5-1900-0000-3ba1-aed4250b0000 pid=2853 execve guuid=015721c6-1900-0000-3ba1-aed4280b0000 pid=2856 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=015721c6-1900-0000-3ba1-aed4280b0000 pid=2856 execve guuid=2ce09dc6-1900-0000-3ba1-aed42b0b0000 pid=2859 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=2ce09dc6-1900-0000-3ba1-aed42b0b0000 pid=2859 execve guuid=1bbfbad8-1900-0000-3ba1-aed4570b0000 pid=2903 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=1bbfbad8-1900-0000-3ba1-aed4570b0000 pid=2903 execve guuid=38fa53dc-1900-0000-3ba1-aed4610b0000 pid=2913 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=38fa53dc-1900-0000-3ba1-aed4610b0000 pid=2913 execve guuid=0addfcde-1900-0000-3ba1-aed46a0b0000 pid=2922 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=0addfcde-1900-0000-3ba1-aed46a0b0000 pid=2922 execve guuid=fc64d6e1-1900-0000-3ba1-aed4740b0000 pid=2932 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=fc64d6e1-1900-0000-3ba1-aed4740b0000 pid=2932 execve guuid=b7976392-1a00-0000-3ba1-aed4c70c0000 pid=3271 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=b7976392-1a00-0000-3ba1-aed4c70c0000 pid=3271 execve guuid=46672c93-1a00-0000-3ba1-aed4cd0c0000 pid=3277 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=46672c93-1a00-0000-3ba1-aed4cd0c0000 pid=3277 execve guuid=149d6de6-1a00-0000-3ba1-aed45e0d0000 pid=3422 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=149d6de6-1a00-0000-3ba1-aed45e0d0000 pid=3422 execve guuid=b4590de7-1a00-0000-3ba1-aed4610d0000 pid=3425 /usr/bin/dash guuid=c252e09a-1900-0000-3ba1-aed4ca0a0000 pid=2762->guuid=b4590de7-1a00-0000-3ba1-aed4610d0000 pid=3425 execve guuid=52a602a2-1900-0000-3ba1-aed4d60a0000 pid=2774 /usr/bin/rm delete-file guuid=41d4cba1-1900-0000-3ba1-aed4d50a0000 pid=2773->guuid=52a602a2-1900-0000-3ba1-aed4d60a0000 pid=2774 execve guuid=18d483c5-1900-0000-3ba1-aed4230b0000 pid=2851 /usr/bin/rm guuid=e6875dc5-1900-0000-3ba1-aed4210b0000 pid=2849->guuid=18d483c5-1900-0000-3ba1-aed4230b0000 pid=2851 execve guuid=c018eac5-1900-0000-3ba1-aed4270b0000 pid=2855 /usr/bin/rm guuid=5eaebec5-1900-0000-3ba1-aed4250b0000 pid=2853->guuid=c018eac5-1900-0000-3ba1-aed4270b0000 pid=2855 execve guuid=b79364c6-1900-0000-3ba1-aed42a0b0000 pid=2858 /usr/bin/rm guuid=015721c6-1900-0000-3ba1-aed4280b0000 pid=2856->guuid=b79364c6-1900-0000-3ba1-aed42a0b0000 pid=2858 execve guuid=2faccac6-1900-0000-3ba1-aed42d0b0000 pid=2861 /usr/sbin/xtables-nft-multi guuid=2ce09dc6-1900-0000-3ba1-aed42b0b0000 pid=2859->guuid=2faccac6-1900-0000-3ba1-aed42d0b0000 pid=2861 execve guuid=f91afdd8-1900-0000-3ba1-aed4590b0000 pid=2905 /usr/bin/pgrep guuid=1bbfbad8-1900-0000-3ba1-aed4570b0000 pid=2903->guuid=f91afdd8-1900-0000-3ba1-aed4590b0000 pid=2905 execve guuid=f50a83dc-1900-0000-3ba1-aed4630b0000 pid=2915 /usr/bin/pgrep guuid=38fa53dc-1900-0000-3ba1-aed4610b0000 pid=2913->guuid=f50a83dc-1900-0000-3ba1-aed4630b0000 pid=2915 execve guuid=467e28df-1900-0000-3ba1-aed46c0b0000 pid=2924 /usr/bin/pgrep guuid=0addfcde-1900-0000-3ba1-aed46a0b0000 pid=2922->guuid=467e28df-1900-0000-3ba1-aed46c0b0000 pid=2924 execve guuid=efa513e2-1900-0000-3ba1-aed4760b0000 pid=2934 /usr/bin/systemctl guuid=fc64d6e1-1900-0000-3ba1-aed4740b0000 pid=2932->guuid=efa513e2-1900-0000-3ba1-aed4760b0000 pid=2934 execve guuid=a6f6cce2-1900-0000-3ba1-aed47a0b0000 pid=2938 /usr/bin/basename guuid=efa513e2-1900-0000-3ba1-aed4760b0000 pid=2934->guuid=a6f6cce2-1900-0000-3ba1-aed47a0b0000 pid=2938 execve guuid=893701e3-1900-0000-3ba1-aed47c0b0000 pid=2940 /usr/bin/basename guuid=efa513e2-1900-0000-3ba1-aed4760b0000 pid=2934->guuid=893701e3-1900-0000-3ba1-aed47c0b0000 pid=2940 execve guuid=6c164fe3-1900-0000-3ba1-aed47e0b0000 pid=2942 /usr/bin/dash guuid=efa513e2-1900-0000-3ba1-aed4760b0000 pid=2934->guuid=6c164fe3-1900-0000-3ba1-aed47e0b0000 pid=2942 clone guuid=81035ce3-1900-0000-3ba1-aed47f0b0000 pid=2943 /usr/bin/systemctl guuid=6c164fe3-1900-0000-3ba1-aed47e0b0000 pid=2942->guuid=81035ce3-1900-0000-3ba1-aed47f0b0000 pid=2943 execve guuid=a6c460e3-1900-0000-3ba1-aed4800b0000 pid=2944 /usr/bin/sed guuid=6c164fe3-1900-0000-3ba1-aed47e0b0000 pid=2942->guuid=a6c460e3-1900-0000-3ba1-aed4800b0000 pid=2944 execve guuid=81f68c92-1a00-0000-3ba1-aed4c90c0000 pid=3273 /usr/sbin/xtables-nft-multi guuid=b7976392-1a00-0000-3ba1-aed4c70c0000 pid=3271->guuid=81f68c92-1a00-0000-3ba1-aed4c90c0000 pid=3273 execve guuid=b4abda92-1a00-0000-3ba1-aed4cb0c0000 pid=3275 /usr/sbin/xtables-nft-multi guuid=b7976392-1a00-0000-3ba1-aed4c70c0000 pid=3271->guuid=b4abda92-1a00-0000-3ba1-aed4cb0c0000 pid=3275 execve guuid=55f86e93-1a00-0000-3ba1-aed4cf0c0000 pid=3279 /usr/bin/systemctl guuid=46672c93-1a00-0000-3ba1-aed4cd0c0000 pid=3277->guuid=55f86e93-1a00-0000-3ba1-aed4cf0c0000 pid=3279 execve guuid=05bdb593-1a00-0000-3ba1-aed4d10c0000 pid=3281 /usr/bin/basename guuid=55f86e93-1a00-0000-3ba1-aed4cf0c0000 pid=3279->guuid=05bdb593-1a00-0000-3ba1-aed4d10c0000 pid=3281 execve guuid=3def0b94-1a00-0000-3ba1-aed4d50c0000 pid=3285 /usr/bin/basename guuid=55f86e93-1a00-0000-3ba1-aed4cf0c0000 pid=3279->guuid=3def0b94-1a00-0000-3ba1-aed4d50c0000 pid=3285 execve guuid=9a4e4394-1a00-0000-3ba1-aed4d60c0000 pid=3286 /usr/bin/dash guuid=55f86e93-1a00-0000-3ba1-aed4cf0c0000 pid=3279->guuid=9a4e4394-1a00-0000-3ba1-aed4d60c0000 pid=3286 clone guuid=5fb84c94-1a00-0000-3ba1-aed4d70c0000 pid=3287 /usr/bin/systemctl guuid=9a4e4394-1a00-0000-3ba1-aed4d60c0000 pid=3286->guuid=5fb84c94-1a00-0000-3ba1-aed4d70c0000 pid=3287 execve guuid=5c0d5294-1a00-0000-3ba1-aed4d80c0000 pid=3288 /usr/bin/sed guuid=9a4e4394-1a00-0000-3ba1-aed4d60c0000 pid=3286->guuid=5c0d5294-1a00-0000-3ba1-aed4d80c0000 pid=3288 execve guuid=c6a2c1e6-1a00-0000-3ba1-aed4600d0000 pid=3424 /usr/bin/rm guuid=149d6de6-1a00-0000-3ba1-aed45e0d0000 pid=3422->guuid=c6a2c1e6-1a00-0000-3ba1-aed4600d0000 pid=3424 execve
Result
Threat name:
Mirai, Gafgyt
Detection:
malicious
Classification:
troj
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Detected Mirai
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Yara detected Mirai
Behaviour
Behavior Graph:
Threat name:
Linux.Trojan.Gafgyt
Status:
Malicious
First seen:
2025-08-17 07:03:43 UTC
File Type:
ELF32 Little (Exe)
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gafgyt defense_evasion discovery linux privilege_escalation
Behaviour
Reads runtime system information
System Network Configuration Discovery
Changes its process name
Reads CPU attributes
Reads system network configuration
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Deletes log files
Enumerates running processes
Reads system routing table
Deletes Audit logs
Deletes itself
Deletes journal logs
Deletes system logs
Flushes firewall rules
Writes DNS configuration
Malware Config
C2 Extraction:
207.167.64.12:25545
Verdict:
Malicious
Tags:
trojan gafgyt Unix.Trojan.Gafgyt-6981156-0
YARA:
Linux_Trojan_Gafgyt_28a2fe0c Linux_Trojan_Gafgyt_6122acdf Linux_Trojan_Gafgyt_1b2e2a3a Linux_Trojan_Gafgyt_9127f7be elf_bashlite_auto Linux_Gafgyt_May_2024
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:elf_bashlite_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects elf.bashlite.
Rule name:Linux_Gafgyt_Generic
Author:albertzsigovits
Description:Generic Approach to Mirai/Gafgyt samples
Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Linux_Trojan_Gafgyt_1b2e2a3a
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_28a2fe0c
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_6122acdf
Author:Elastic Security
Rule name:Linux_Trojan_Gafgyt_9127f7be
Author:Elastic Security
Rule name:Mal_LNX_Gafgyt_Botnet_ELF
Author:Phatcharadol Thangplub
Description:Use to detect Gafgyt botnet, and there variants.
Rule name:NET
Author:malware-lu
Rule name:setsockopt
Author:Tim Brown @timb_machine
Description:Hunts for setsockopt() red flags
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gafgyt

elf dfa2f76c20c39fbdd9d97f90fd9241f0635b3a0be6c238b0e11715e75c9c63ca

(this sample)

  
Delivery method
Distributed via web download

Comments