Analysis
-
max time kernel
91s -
max time network
133s -
platform
linux_mipsel -
resource
debian9-mipsel-en-20211208 -
resource tags
arch:mipselimage:debian9-mipsel-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
31-05-2023 19:04
Static task
static1
Behavioral task
behavioral1
Sample
setup-lin.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral2
Sample
setup-lin.sh
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral3
Sample
setup-lin.sh
Resource
debian9-mipsbe-20221125-en
Behavioral task
behavioral4
Sample
setup-lin.sh
Resource
debian9-mipsel-en-20211208
General
-
Target
setup-lin.sh
-
Size
661B
-
MD5
d6e05568eb09e1a3c5a1bf7927f29356
-
SHA1
96c8beddd7326f09e606babd610d1931c44a38df
-
SHA256
9e2e1fc764629f265a64e874d63ed4b3ea6e44e4a205b09b116ab1baad850d34
-
SHA512
3924427ea4d1b143f9b0ea3b981fc3cfb1d67f87da6ee190bb243490681a66fabd29b7c5ea3b05b595baf22dd0a78ed261bb0f5f94793a5ea9c6e5390eeb7ea0
Malware Config
Signatures
-
Reads runtime system information 32 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems dpkg File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/sys/kernel/ngroups_max apt-get File opened for reading /proc/filesystems dpkg File opened for reading /proc/sys/kernel/ngroups_max apt-get File opened for reading /proc/self/stat sudo File opened for reading /proc/self/fd Process not Found File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/filesystems sudo File opened for reading /proc/filesystems sudo File opened for reading /proc/self/stat sudo File opened for reading /proc/self/stat sudo File opened for reading /proc/filesystems sudo File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/self/stat sudo File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/sys/kernel/ngroups_max sudo File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems dpkg File opened for reading /proc/self/stat sudo File opened for reading /proc/filesystems sudo File opened for reading /proc/self/stat sudo File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems sudo File opened for reading /proc/filesystems sudo File opened for reading /proc/self/stat sudo File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems sudo -
Writes file to tmp directory 14 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/fileutl.message.r7ii15 apt-get File opened for modification /tmp/fileutl.message.Y3QwMH apt-get File opened for modification /tmp/fileutl.message.MTKpQk apt-get File opened for modification /tmp/fileutl.message.XkruOF apt-get File opened for modification /tmp/fileutl.message.zo91HP apt-get File opened for modification /tmp/fileutl.message.s4qADl apt-get File opened for modification /tmp/fileutl.message.8koP6y apt-get File opened for modification /tmp/fileutl.message.2DBLPx apt-get File opened for modification /tmp/fileutl.message.5cvDpC apt-get File opened for modification /tmp/fileutl.message.y93zHr apt-get File opened for modification /tmp/fileutl.message.EBZO18 apt-get File opened for modification /tmp/fileutl.message.iUGlux apt-get File opened for modification /tmp/fileutl.message.9xru2n apt-get File opened for modification /tmp/fileutl.message.dsvMK7 apt-get
Processes
-
/tmp/setup-lin.sh/tmp/setup-lin.sh1⤵PID:335
-
/usr/local/sbin/bashbash /tmp/setup-lin.sh1⤵PID:335
-
/usr/local/bin/bashbash /tmp/setup-lin.sh1⤵PID:335
-
/usr/sbin/bashbash /tmp/setup-lin.sh1⤵PID:335
-
/usr/bin/bashbash /tmp/setup-lin.sh1⤵PID:335
-
/sbin/bashbash /tmp/setup-lin.sh1⤵PID:335
-
/bin/bashbash /tmp/setup-lin.sh1⤵PID:335
-
/bin/rmrm /var/lib/dpkg/lock2⤵PID:337
-
-
/bin/rmrm /var/cache/apt/archives/lock2⤵PID:339
-
-
/bin/rmrm /var/lib/apt/lists/lock2⤵PID:343
-
-
/usr/bin/sudosudo dpkg --add-architecture i3862⤵
- Reads runtime system information
PID:344 -
/usr/bin/dpkgdpkg --add-architecture i3863⤵
- Reads runtime system information
PID:345
-
-
-
/usr/bin/sudosudo apt-get update2⤵
- Reads runtime system information
PID:346 -
/usr/bin/apt-getapt-get update3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:347 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:348
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:349
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:350
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:351
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:352
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:356
-
-
-
-
/usr/bin/sudosudo apt-get install python3.9 -y2⤵
- Reads runtime system information
PID:357 -
/usr/bin/apt-getapt-get install python3.9 -y3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:358 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:359
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:360
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:361
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:362
-
-
-
-
/usr/bin/sudosudo apt-get install -y wine2⤵
- Reads runtime system information
PID:363 -
/usr/bin/apt-getapt-get install -y wine3⤵
- Writes file to tmp directory
PID:364 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:365
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:366
-
-
-
-
/usr/bin/sudosudo wget https://www.python.org/ftp/python/3.8.9/python-3.8.9.exe2⤵
- Reads runtime system information
PID:367 -
/usr/bin/wgetwget https://www.python.org/ftp/python/3.8.9/python-3.8.9.exe3⤵PID:368
-
-
-
/usr/bin/sudosudo wine cmd /c python-3.8.9.exe /quiet "InstallAllUsers=0"2⤵
- Reads runtime system information
PID:369
-
-
/usr/bin/sudosudo wine "/root/.wine/drive_c/users/root/Local Settings/Application Data/Programs/Python/Python38-32/python.exe" -m pip install "pyinstaller==4.2" "cryptography==36.0.1" discord_webhook pycryptodome pypiwin32 "cryptography==36.0.1"2⤵
- Reads runtime system information
PID:370
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5fee8870aaf64a1c58a01ce7d0173e9bf
SHA1af9ac661eda82cc2227a023f3f98762e60a74296
SHA256bca9413f03c61702820c8d577d1ca2e059b08f9c00ca0ea2d9e64632533dc6a0
SHA5124890acf2670ee315ac7450ee9620b032951c7e562b47eeac30c6914a934ce39af9f5428699f22c36b538338b7431f7e9ec434d632910106c121695e0080f69d0
-
Filesize
20KB
MD53a8da7f47c33423162f1f6e86e6b1f83
SHA1912b077399b9b6b2fc70f15b46a7054f809b4900
SHA25657e66b30d0d7db7a70518b34fa1787e10f8210b327e2a39f147ee3dbf41ace85
SHA5124d78a8a63289872205611af919d48938e0d825325cfca069dc875691e0e0ac62949b476f3e9a54001bebd327b98e44c4dc4ba96442299d2c65fdf2c3643e2c48
-
Filesize
12B
MD577a63c084c0aaef3ae6795eb98f75ab7
SHA124b11cacb3d1116a98777dfd09c2499548a14d73
SHA25614a7fbb88303776e397b5bdf386a386d4097ca898527203b65425ec17077b82e
SHA5124f2394ea36d2b4aa3040cfd40773f6cf60a6a615199df91c20e7b5e7dc8202fb26506a72a08949884234cbd0d3901876608cfab6cce354a0bf33d8848d9c1b04