Analysis

  • max time kernel
    58s
  • max time network
    155s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    20-12-2023 05:14

General

  • Target

    ai.sh

  • Size

    831B

  • MD5

    b1a64a7afeda8fc66076eae49bdb6267

  • SHA1

    0d840e800c0dac1d51f8a243056e94ed385c3a98

  • SHA256

    9d5036d204e6598fd4c4ac93688c9acdec3d6a1e4d14018ec16db955f3ee8b24

  • SHA512

    619c55b6f6d222c8a831a441205b75359976d9d80ba01734640d81b96a32e2b263448e16be8d3dad9afb1c78ebcd717cbc8dbefe134fc593f079a931140c67fa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Checks hardware identifiers (DMI) 1 TTPs 4 IoCs

    Checks DMI information which indicate if the system is a virtual machine.

  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads CPU attributes 1 TTPs 47 IoCs
  • Reads hardware information 1 TTPs 14 IoCs

    Accesses system info like serial numbers, manufacturer names etc.

  • Enumerates kernel/hardware configuration 1 TTPs 21 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/ai.sh
    /tmp/ai.sh
    1⤵
    • Writes file to tmp directory
    PID:1562
    • /bin/grep
      grep EST
      2⤵
        PID:1567
      • /bin/grep
        grep 94.241.140.177
        2⤵
          PID:1568
        • /bin/grep
          grep 80
          2⤵
            PID:1569
          • /bin/mkdir
            mkdir -p /var/tmp/.22
            2⤵
              PID:1570
            • /bin/tar
              tar -xf xm.jpg
              2⤵
                PID:1576
                • /usr/local/sbin/gzip
                  gzip -d
                  3⤵
                    PID:1577
                  • /usr/local/bin/gzip
                    gzip -d
                    3⤵
                      PID:1577
                    • /usr/sbin/gzip
                      gzip -d
                      3⤵
                        PID:1577
                      • /usr/bin/gzip
                        gzip -d
                        3⤵
                          PID:1577
                        • /sbin/gzip
                          gzip -d
                          3⤵
                            PID:1577
                          • /bin/gzip
                            gzip -d
                            3⤵
                              PID:1577
                          • /bin/chmod
                            chmod +x start
                            2⤵
                              PID:1578
                            • /var/tmp/.22/start
                              ./start
                              2⤵
                              • Executes dropped EXE
                              PID:1579
                              • /bin/uname
                                uname -m
                                3⤵
                                  PID:1580
                                • /bin/cp
                                  cp x86_64 mine
                                  3⤵
                                    PID:1581
                                  • /var/tmp/.22/hide
                                    ./hide
                                    3⤵
                                    • Executes dropped EXE
                                    PID:1582
                              • /usr/bin/base64
                                base64 -d
                                1⤵
                                  PID:1565
                                • /bin/cat
                                  cat
                                  1⤵
                                    PID:1575
                                  • /var/tmp/.22/create
                                    ./create
                                    1⤵
                                    • Executes dropped EXE
                                    PID:1583
                                    • /bin/cat
                                      cat auto
                                      2⤵
                                        PID:1584
                                      • /usr/bin/crontab
                                        crontab cronjobs
                                        2⤵
                                        • Creates/modifies Cron job
                                        PID:1585
                                      • /bin/rm
                                        rm -f cronjobs
                                        2⤵
                                          PID:1586
                                        • /usr/bin/crontab
                                          crontab -l
                                          2⤵
                                            PID:1587
                                          • /bin/chmod
                                            chmod u+x auto init.d
                                            2⤵
                                              PID:1588
                                            • /bin/sh
                                              sh -c "./auto > /dev/null 2>&1 &"
                                              2⤵
                                                PID:1589
                                              • /bin/rm
                                                rm -f aarch64 x86_64 hide.c init.c start create
                                                2⤵
                                                  PID:1591
                                              • /var/tmp/.22/auto
                                                ./auto
                                                1⤵
                                                • Executes dropped EXE
                                                PID:1590
                                                • /var/tmp/.22/init.d
                                                  /var/tmp/.22/init.d
                                                  2⤵
                                                    PID:1592
                                                  • /bin/chmod
                                                    chmod 755 auto hide init init.d logs mine mining mkcfg xm.jpg
                                                    2⤵
                                                      PID:1594
                                                    • /usr/bin/pkill
                                                      pkill -9 init
                                                      2⤵
                                                      • Reads CPU attributes
                                                      • Reads runtime system information
                                                      PID:1596
                                                  • /var/tmp/.22/init
                                                    ./init
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:1593
                                                  • /var/tmp/.22/mining
                                                    ./mining
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:1597
                                                    • /var/tmp/.22/init
                                                      /var/tmp/.22/init
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:1599
                                                    • /bin/uname
                                                      uname -m
                                                      2⤵
                                                        PID:1601
                                                      • /var/tmp/.22/hide
                                                        ./hide -s "sendmail: accepting connections" ./mine
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:1602
                                                      • /var/tmp/.22/mine
                                                        "sendmail: accepting connections"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Checks CPU configuration
                                                        • Checks hardware identifiers (DMI)
                                                        • Reads CPU attributes
                                                        • Reads hardware information
                                                        • Enumerates kernel/hardware configuration
                                                        PID:1602
                                                      • /bin/ps
                                                        ps -ef
                                                        2⤵
                                                        • Reads CPU attributes
                                                        • Reads runtime system information
                                                        PID:1603
                                                      • /bin/grep
                                                        grep "sendmail: accepting connections"
                                                        2⤵
                                                          PID:1604
                                                        • /bin/grep
                                                          grep -v grep
                                                          2⤵
                                                            PID:1605
                                                          • /usr/bin/awk
                                                            awk "{print \$2}"
                                                            2⤵
                                                              PID:1606
                                                            • /usr/bin/head
                                                              head -1
                                                              2⤵
                                                                PID:1608

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • /tmp/sh-thd.SbPsNX

                                                              Filesize

                                                              34B

                                                              MD5

                                                              d73b6cacb30d623ccbb82cb8b3489476

                                                              SHA1

                                                              83a9395088a8885f45dfb4de5dc509aa74bb5164

                                                              SHA256

                                                              1a6177c310e4ddd1526252e4fcecfa3c78a440760f4adae90e4b2d60ad3000c5

                                                              SHA512

                                                              94e1949188ff086eec6dbc72dc01967f5c952928399db92656d65dc30f767e188f1a43f9558ffcf0fffaf38a522b335e6509228330780a97f09432c1b50f5941

                                                            • /var/tmp/.22/SOS

                                                              Filesize

                                                              5B

                                                              MD5

                                                              84c6777e57669bed8d3118a556db3d89

                                                              SHA1

                                                              21d26253e5f6c29db14d8f58861507640e74ef55

                                                              SHA256

                                                              345ebe25f0ac3f1104a2029fdf8f0885ccd9800e3ebcdbd03da014dad101a0b1

                                                              SHA512

                                                              1854cf3b740aa52969fed7dab64618eadd5f9a5b81a6b7b637274febcec5c409305c33fdb1f2290a8d90adb4fc997c16f428b22d914ac01f6e7320b95b88267e

                                                            • /var/tmp/.22/xm.jpg

                                                              Filesize

                                                              3.8MB

                                                              MD5

                                                              2b2e9861dd605cbe0d45194144b62f84

                                                              SHA1

                                                              10ba9a8f356c4a05a6f280a2a567478c63104302

                                                              SHA256

                                                              60bd7464df3181da18b03edb2273f4c4f85d711c1978c5a26c7a19164f13f08a

                                                              SHA512

                                                              c3e61fabf3102c4df068f0a50feca9c5f85528e56f1ac99384531fbead93fc2ce39e72658b6ed52eb28b620f00ab09747a11aaca0f98ba42b975e4ce595e51e5

                                                            • /var/tmp/.22/���_

                                                              Filesize

                                                              5B

                                                              MD5

                                                              497e3a7f6966b6167b7619c9b3c1049f

                                                              SHA1

                                                              843042004279112dadcc8c6e613c52b5c62df773

                                                              SHA256

                                                              d1506f9b33d16a9d93f8b6aa03d6b12739f1b4a2fcb7403546b53e8c03fcff26

                                                              SHA512

                                                              d044a590de65465b3b884c70a19450d2577114772ef92a514ba57256b6daa0f1a5ccae49916ff6d0eeb5496c2f0031d4991a66997f4cf275c1cf688612d2848b