Analysis

  • max time kernel
    0s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    25-11-2022 19:35

General

  • Target

    6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e

  • Size

    1KB

  • MD5

    6acfc27bf16bf39d7cd6618fc2b57137

  • SHA1

    3a3759c509e8ca578c504f162d2e1ee336193f3c

  • SHA256

    6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e

  • SHA512

    4d4ce060047d41364fd0a7a4c6e615af6657c46347abafe6e93bf8363dfa2648185c229699525397938c77ca4b802893cbffe39b572f534ddb5f7b9402f34bda

Score
7/10

Malware Config

Signatures

  • Modifies rc script 1 TTPs 1 IoCs

    Adding/modifying system rc scripts is a common persistence mechanism.

  • Reads CPU attributes 1 TTPs 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e
    /tmp/6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e
    1⤵
    • Writes file to tmp directory
    PID:363
    • /bin/cp
      cp -f /tmp/combinebmp.sh /apps/bzw/bin/kit/
      2⤵
        PID:366
      • /bin/rm
        rm -rf /apps/www/htdocs/nm/xDown.sh
        2⤵
          PID:379
        • /bin/rm
          rm -rf /apps/www/htdocs/nm/xDown_mon.sh
          2⤵
            PID:380
          • /bin/mkdir
            mkdir -p /apps/www/htdocs/nm
            2⤵
            • Reads runtime system information
            PID:381
          • /bin/cp
            cp -f /tmp/xDown.sh /apps/www/htdocs/nm
            2⤵
            • Reads runtime system information
            PID:383
          • /bin/cp
            cp -f /tmp/xDown_mon.sh /apps/www/htdocs/nm
            2⤵
              PID:385
            • /bin/chmod
              chmod +x /apps/www/htdocs/nm/xDown.sh
              2⤵
                PID:386
              • /bin/chmod
                chmod +x /apps/www/htdocs/nm/xDown_mon.sh
                2⤵
                  PID:387
                • /bin/grep
                  grep -c /apps/www/htdocs/nm/xDown_mon.sh /etc/rc.local
                  2⤵
                  • Modifies rc script
                  PID:388
                • /apps/www/htdocs/nm/xDown_mon.sh
                  /apps/www/htdocs/nm/xDown_mon.sh
                  2⤵
                    PID:389
                • /bin/ps
                  ps aux
                  1⤵
                  • Reads CPU attributes
                  • Reads runtime system information
                  PID:370
                • /bin/grep
                  grep xDown_mon.sh
                  1⤵
                    PID:371
                  • /bin/grep
                    grep -v grep
                    1⤵
                      PID:372
                    • /usr/bin/awk
                      awk "{print \$2}"
                      1⤵
                        PID:373
                      • /bin/ps
                        ps aux
                        1⤵
                        • Reads CPU attributes
                        • Reads runtime system information
                        PID:375
                      • /bin/grep
                        grep xDown.sh
                        1⤵
                          PID:376
                        • /bin/grep
                          grep -v grep
                          1⤵
                            PID:377
                          • /usr/bin/awk
                            awk "{print \$2}"
                            1⤵
                              PID:378

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads