Analysis

  • max time kernel
    0s
  • max time network
    126s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20221111-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20221111-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    25-11-2022 19:35

General

  • Target

    6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e

  • Size

    1KB

  • MD5

    6acfc27bf16bf39d7cd6618fc2b57137

  • SHA1

    3a3759c509e8ca578c504f162d2e1ee336193f3c

  • SHA256

    6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e

  • SHA512

    4d4ce060047d41364fd0a7a4c6e615af6657c46347abafe6e93bf8363dfa2648185c229699525397938c77ca4b802893cbffe39b572f534ddb5f7b9402f34bda

Score
7/10

Malware Config

Signatures

  • Modifies rc script 1 TTPs 1 IoCs

    Adding/modifying system rc scripts is a common persistence mechanism.

  • Reads CPU attributes 1 TTPs 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e
    /tmp/6637f76dce8486449059e817169f96e81992bd88ef686e094154036754d9556e
    1⤵
    • Writes file to tmp directory
    PID:331
    • /bin/cp
      cp -f /tmp/combinebmp.sh /apps/bzw/bin/kit/
      2⤵
        PID:333
      • /bin/rm
        rm -rf /apps/www/htdocs/nm/xDown.sh
        2⤵
          PID:348
        • /bin/rm
          rm -rf /apps/www/htdocs/nm/xDown_mon.sh
          2⤵
            PID:349
          • /bin/mkdir
            mkdir -p /apps/www/htdocs/nm
            2⤵
              PID:350
            • /bin/cp
              cp -f /tmp/xDown.sh /apps/www/htdocs/nm
              2⤵
                PID:352
              • /bin/cp
                cp -f /tmp/xDown_mon.sh /apps/www/htdocs/nm
                2⤵
                • Reads runtime system information
                PID:354
              • /bin/chmod
                chmod +x /apps/www/htdocs/nm/xDown.sh
                2⤵
                  PID:355
                • /bin/chmod
                  chmod +x /apps/www/htdocs/nm/xDown_mon.sh
                  2⤵
                    PID:356
                  • /bin/grep
                    grep -c /apps/www/htdocs/nm/xDown_mon.sh /etc/rc.local
                    2⤵
                    • Modifies rc script
                    PID:357
                  • /apps/www/htdocs/nm/xDown_mon.sh
                    /apps/www/htdocs/nm/xDown_mon.sh
                    2⤵
                      PID:358
                  • /bin/ps
                    ps aux
                    1⤵
                    • Reads CPU attributes
                    • Reads runtime system information
                    PID:336
                  • /bin/grep
                    grep xDown_mon.sh
                    1⤵
                      PID:337
                    • /bin/grep
                      grep -v grep
                      1⤵
                        PID:338
                      • /usr/bin/awk
                        awk "{print \$2}"
                        1⤵
                          PID:339
                        • /bin/ps
                          ps aux
                          1⤵
                          • Reads CPU attributes
                          • Reads runtime system information
                          PID:344
                        • /bin/grep
                          grep -v grep
                          1⤵
                            PID:346
                          • /bin/grep
                            grep xDown.sh
                            1⤵
                              PID:345
                            • /usr/bin/awk
                              awk "{print \$2}"
                              1⤵
                                PID:347

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Persistence

                              Boot or Logon Autostart Execution

                              1
                              T1547

                              Privilege Escalation

                              Boot or Logon Autostart Execution

                              1
                              T1547

                              Discovery

                              System Information Discovery

                              1
                              T1082

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads