Analysis
-
max time kernel
5s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20231026-en -
resource tags
arch:mipselimage:debian9-mipsel-20231026-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
12/12/2023, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c.sh
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral2
Sample
13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c.sh
Resource
debian9-armhf-20231130-en
Behavioral task
behavioral3
Sample
13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c.sh
Resource
debian9-mipsbe-20231026-en
Behavioral task
behavioral4
Sample
13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c.sh
Resource
debian9-mipsel-20231026-en
General
-
Target
13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c.sh
-
Size
1KB
-
MD5
43ed124cbae6ba73281afcddef9ed355
-
SHA1
7208b7bceb4e34c04f3e2dfc3b3cbddea66794f2
-
SHA256
13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c
-
SHA512
d97a34779e059948a7bf58cb17b466872cf60c262c29166f8621598ce438e877420765774735496bd4459d46ef12e7b2300c61dffe426f63c2ae70422caa0476
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
ioc pid Process /.redtail 746 .redtail /.redtail 750 .redtail /.redtail 755 .redtail /.redtail 759 .redtail -
Reads runtime system information 2 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems find File opened for reading /proc/filesystems mv
Processes
-
/tmp/13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c.sh/tmp/13de5805cd4d0148450543cddf723f20ef321ff2d8a1a461e80e8685321f1b4c.sh1⤵PID:711
-
/bin/unameuname -mp2⤵PID:715
-
-
/bin/grepgrep -q x86_642⤵PID:722
-
-
/bin/grepgrep -q i6862⤵PID:726
-
-
/bin/grepgrep -q armv82⤵PID:729
-
-
/bin/grepgrep -q aarch642⤵PID:731
-
-
/bin/grepgrep -q armv72⤵PID:734
-
-
/bin/mvmv "redtail.*" /2⤵
- Reads runtime system information
PID:742
-
-
/bin/catcat redtail.x86_642⤵PID:744
-
-
/bin/chmodchmod +x .redtail2⤵PID:745
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:746
-
-
/bin/catcat redtail.i6862⤵PID:748
-
-
/bin/chmodchmod +x .redtail2⤵PID:749
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:750
-
-
/bin/catcat redtail.arm82⤵PID:753
-
-
/bin/chmodchmod +x .redtail2⤵PID:754
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:755
-
-
/bin/catcat redtail.arm72⤵PID:757
-
-
/bin/chmodchmod +x .redtail2⤵PID:758
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:759
-
-
/bin/rmrm -rf "redtail.*"2⤵PID:761
-
-
/usr/bin/findfind / -writable -executable -readable -not -path "/proc/*"1⤵
- Reads runtime system information
PID:737
-
/usr/bin/headhead -n 11⤵PID:738