Overview
overview
3Static
static
1gosh/gen-pass.sh
ubuntu-18.04-amd64
1gosh/gen-pass.sh
debian-9-armhf
1gosh/gen-pass.sh
debian-9-mips
1gosh/gen-pass.sh
debian-9-mipsel
1gosh/go.sh
windows7-x64
3gosh/go.sh
windows10-2004-x64
3gosh/pscan2
ubuntu-18.04-amd64
gosh/secure
ubuntu-18.04-amd64
3gosh/secure
debian-9-armhf
1gosh/secure
debian-9-mips
3gosh/secure
debian-9-mipsel
3gosh/ss
ubuntu-18.04-amd64
1gosh/ssh-scan
ubuntu-18.04-amd64
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-12-2023 22:06
Static task
static1
Behavioral task
behavioral1
Sample
gosh/gen-pass.sh
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral2
Sample
gosh/gen-pass.sh
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral3
Sample
gosh/gen-pass.sh
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral4
Sample
gosh/gen-pass.sh
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral5
Sample
gosh/go.sh
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
gosh/go.sh
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
gosh/pscan2
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral8
Sample
gosh/secure
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral9
Sample
gosh/secure
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral10
Sample
gosh/secure
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral11
Sample
gosh/secure
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral12
Sample
gosh/ss
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral13
Sample
gosh/ssh-scan
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
gosh/go.sh
-
Size
94B
-
MD5
512381b87dad11281222c4a832c371e1
-
SHA1
7c3e074e30ef24dec651e1cae96dff36d0578585
-
SHA256
3b2eea3fe392c61923bdb4d9cfa8b2138408b035649e8959e04d4ca8e0a39503
-
SHA512
afd9be9b326b547c7978c753e73ccfe45c5a806d7bc30d40ed86e6e808b51e57e89de3d0cf3afcf36aead3d29dc213da067d4a8b4bd0e1fbdeadd694a082c127
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\sh_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2808 AcroRd32.exe 2808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3060 2512 cmd.exe 17 PID 2512 wrote to memory of 3060 2512 cmd.exe 17 PID 2512 wrote to memory of 3060 2512 cmd.exe 17 PID 3060 wrote to memory of 2808 3060 rundll32.exe 30 PID 3060 wrote to memory of 2808 3060 rundll32.exe 30 PID 3060 wrote to memory of 2808 3060 rundll32.exe 30 PID 3060 wrote to memory of 2808 3060 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gosh\go.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gosh\go.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\gosh\go.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52e116387436fceeb3f0d0bed7c9b025a
SHA1b86a50f784f1a518b07a23224679a388a459ac08
SHA256f169bf8b21139878c734caecd8cc7a62745e5ef6d90743bea3f05ef237960458
SHA512c5bb80c92a02e5d5084c495f40ec87b5b254df481298338471e47ba5e8f0cdd5e1ab3af10a1c52589b43d38cf0f35042db0f589f1367d1bc77668f6e91367e6b