Analysis
-
max time kernel
152s -
max time network
155s -
platform
debian-9_armhf -
resource
debian9-armhf-20231215-en -
resource tags
arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
19-12-2023 22:32
Static task
static1
Behavioral task
behavioral1
Sample
121719543d8d5e1dda976200c619f82d
Resource
debian9-armhf-20231215-en
General
-
Target
121719543d8d5e1dda976200c619f82d
-
Size
576KB
-
MD5
121719543d8d5e1dda976200c619f82d
-
SHA1
ebdbdda19e76931a2f6154da160d1a6b597533e0
-
SHA256
b8e0d51884523ed4a8e79246faafff4a8c2f4070bec0cd9e526be36d9b0d4c0d
-
SHA512
81135dce29498d56c5110759a9712316af25e4992a9ce33ff2b86637aa011f50e231a9ac4fa146dab113ac011851c799a493909f263abb26467687436b2e11ec
-
SSDEEP
12288:gl7H+P4WdRE8+GEWQTQfeiUklkFeXfSYbMa9vJesJeGtq0iVv0Eun5PxLO:Y7H+gWEThEUklk8tbMatgWpCVv0EL
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/683-1-0x00008000-0x001bb7e0-memory.dmp family_kaiten2 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.olXI6Y crontab -
Reads runtime system information 4 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/version 121719543d8d5e1dda976200c619f82d File opened for reading /proc/filesystems crontab File opened for reading /proc/filesystems crontab File opened for reading /proc/1/cmdline 121719543d8d5e1dda976200c619f82d
Processes
-
/tmp/121719543d8d5e1dda976200c619f82d/tmp/121719543d8d5e1dda976200c619f82d1⤵
- Reads runtime system information
PID:683 -
/bin/shsh -c "chmod 700 /tmp/121719543d8d5e1dda976200c619f82d > /dev/null 2>&1 &"2⤵PID:689
-
-
/bin/shsh -c "touch -acmr /bin/ls /tmp/121719543d8d5e1dda976200c619f82d"2⤵PID:691
-
/usr/bin/touchtouch -acmr /bin/ls /tmp/121719543d8d5e1dda976200c619f82d3⤵PID:692
-
-
-
/bin/shsh -c "(crontab -l | grep -v \"/tmp/121719543d8d5e1dda976200c619f82d\" | grep -v \"no cron\" | grep -v \"lesshts/run.sh\" > /var/run/.x00846930886) > /dev/null 2>&1"2⤵PID:694
-
-
/bin/shsh -c "echo \"* * * * * /tmp/121719543d8d5e1dda976200c619f82d > /dev/null 2>&1 &\" >> /var/run/.x00846930886"2⤵PID:702
-
-
/bin/shsh -c "crontab /var/run/.x00846930886"2⤵PID:703
-
/usr/bin/crontabcrontab /var/run/.x008469308863⤵
- Creates/modifies Cron job
- Reads runtime system information
PID:704
-
-
-
/bin/shsh -c "rm -rf /var/run/.x00846930886"2⤵PID:706
-
/bin/rmrm -rf /var/run/.x008469308863⤵PID:707
-
-
-
/bin/shsh -c "cat /etc/inittab | grep -v \"/tmp/121719543d8d5e1dda976200c619f82d\" > /etc/inittab2"2⤵PID:708
-
/bin/catcat /etc/inittab3⤵PID:710
-
-
/bin/grepgrep -v /tmp/121719543d8d5e1dda976200c619f82d3⤵PID:711
-
-
-
/bin/shsh -c "echo \"0:2345:respawn:/tmp/121719543d8d5e1dda976200c619f82d\" >> /etc/inittab2"2⤵PID:712
-
-
/bin/shsh -c "cat /etc/inittab2 > /etc/inittab"2⤵PID:713
-
/bin/catcat /etc/inittab23⤵PID:714
-
-
-
/bin/shsh -c "rm -rf /etc/inittab2"2⤵PID:715
-
/bin/rmrm -rf /etc/inittab23⤵PID:716
-
-
-
/bin/shsh -c "touch -acmr /bin/ls /etc/inittab"2⤵PID:717
-
/usr/bin/touchtouch -acmr /bin/ls /etc/inittab3⤵PID:718
-
-
-
/bin/shsh -c "/bin/uname -n"2⤵PID:719
-
/bin/uname/bin/uname -n3⤵PID:720
-
-
-
/bin/shsh -c "/bin/uname -n"2⤵PID:721
-
/bin/uname/bin/uname -n3⤵PID:722
-
-
-
/bin/shsh -c "/bin/uname -n"2⤵PID:723
-
/bin/uname/bin/uname -n3⤵PID:724
-
-
-
/bin/chmodchmod 700 /tmp/121719543d8d5e1dda976200c619f82d1⤵PID:690
-
/usr/bin/crontabcrontab -l1⤵
- Reads runtime system information
PID:696
-
/bin/grepgrep -v /tmp/121719543d8d5e1dda976200c619f82d1⤵PID:697
-
/bin/grepgrep -v "no cron"1⤵PID:698
-
/bin/grepgrep -v lesshts/run.sh1⤵PID:699
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD52b493238a7273657a88690771ce555b4
SHA175ab0688836baf3f7f80b7871db2e81847ba348e
SHA25642574fe00b655bcf13301bcb2879cc67163094e25ce4fc0369cf7080cc14ce39
SHA5124c3a123f68e278787d947e01e8cbbb96429ed793cdb067565fbfd783fe4f35d1ffa74920948fea01b273bf6798e5f25f2671986eb67499804e9c8099b48a56d8
-
Filesize
67B
MD5753a965847b04998a76c170c5b324995
SHA1822b82d36cd8e5e97264a9e0cd20332828432758
SHA25694163432631c54e43f92118b9f8edc32e3782fda1be011891259a65b972a1f65
SHA512f05cce0eb97564090bd032f883e4cca6c8991d3372d74e9973a8cfc5242d2942a3b4e355a1b8bf979fdef38e893767ec0d3a0a08a8b1635d7d9dd01818dfbf31
-
Filesize
263B
MD5c1d79e11afca609a2d69ca16a4e32d4a
SHA1c1352ea0cdaf2e66a8e68a782681cffe3cbde628
SHA25689105693b4c503c39d518ba2e488bc469cd3d2d9f27bb5a84e7e1ecb6524797c
SHA51266d79e79d7cafcf271d3d2139c3e274e085194c5b637ddab6c3c19a87c5b98bb266fc85f2cc5e658a725fe8c0444e1da6210bac16c28bc8626c27155062dea57