Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1.gosh/f
ubuntu-18.04-amd64
1.gosh/prg
ubuntu-18.04-amd64
1.gosh/ps
ubuntu-18.04-amd64
6.gosh/ps
debian-9-armhf
6.gosh/ps
debian-9-mips
6.gosh/ps
debian-9-mipsel
6.gosh/pscan2
ubuntu-18.04-amd64
1.gosh/randus
ubuntu-18.04-amd64
1.gosh/randus
debian-9-armhf
1.gosh/randus
debian-9-mips
1.gosh/randus
debian-9-mipsel
1Analysis
-
max time kernel
122s -
max time network
128s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231222-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22/12/2023, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
.gosh/f
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral2
Sample
.gosh/prg
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral3
Sample
.gosh/ps
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral4
Sample
.gosh/ps
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral5
Sample
.gosh/ps
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral6
Sample
.gosh/ps
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral7
Sample
.gosh/pscan2
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral8
Sample
.gosh/randus
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral9
Sample
.gosh/randus
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral10
Sample
.gosh/randus
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral11
Sample
.gosh/randus
Resource
debian9-mipsel-20231215-en
General
-
Target
.gosh/ps
-
Size
978B
-
MD5
0fb40555729b18c160840970b64efbd1
-
SHA1
fe0285a16a0af7e6e2b0517fedf33759a35f9815
-
SHA256
8cde776130ccffaa1e3147cec59c8b44e00634613395926ecb7c98d9cc21f983
-
SHA512
6c26ca3e36ada5884c383166b8b193bb6512456fe0c4447b7ebd2eb5829837f390500fa3a03555cb77a51cd0e721098699f4fb8fc938776c674616a0db9a4e17
Malware Config
Signatures
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 4 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/523/stat ps File opened for reading /proc/870/status ps File opened for reading /proc/1643/cmdline ps File opened for reading /proc/13/cmdline ps File opened for reading /proc/19/status ps File opened for reading /proc/503/stat ps File opened for reading /proc/403/status ps File opened for reading /proc/1146/status ps File opened for reading /proc/78/status ps File opened for reading /proc/89/cmdline ps File opened for reading /proc/1594/stat ps File opened for reading /proc/400/cmdline ps File opened for reading /proc/1029/cmdline ps File opened for reading /proc/1146/stat ps File opened for reading /proc/1592/stat ps File opened for reading /proc/89/stat ps File opened for reading /proc/1644/cmdline ps File opened for reading /proc/580/stat ps File opened for reading /proc/29/status ps File opened for reading /proc/327/status ps File opened for reading /proc/1374/cmdline ps File opened for reading /proc/1015/status ps File opened for reading /proc/1305/cmdline ps File opened for reading /proc/1316/cmdline ps File opened for reading /proc/1357/stat ps File opened for reading /proc/523/cmdline ps File opened for reading /proc/453/stat ps File opened for reading /proc/uptime ps File opened for reading /proc/162/status ps File opened for reading /proc/711/status ps File opened for reading /proc/31/stat ps File opened for reading /proc/89/stat ps File opened for reading /proc/1230/status ps File opened for reading /proc/443/stat ps File opened for reading /proc/1055/cmdline ps File opened for reading /proc/21/cmdline ps File opened for reading /proc/79/stat ps File opened for reading /proc/80/stat ps File opened for reading /proc/85/status ps File opened for reading /proc/6/cmdline ps File opened for reading /proc/517/cmdline ps File opened for reading /proc/698/status ps File opened for reading /proc/1035/stat ps File opened for reading /proc/1029/stat ps File opened for reading /proc/1615/stat ps File opened for reading /proc/558/cmdline ps File opened for reading /proc/422/status ps File opened for reading /proc/503/cmdline ps File opened for reading /proc/723/cmdline ps File opened for reading /proc/249/stat ps File opened for reading /proc/163/cmdline ps File opened for reading /proc/1171/status ps File opened for reading /proc/1179/status ps File opened for reading /proc/152/stat ps File opened for reading /proc/450/stat ps File opened for reading /proc/163/cmdline ps File opened for reading /proc/165/status ps File opened for reading /proc/27/stat ps File opened for reading /proc/1015/cmdline ps File opened for reading /proc/1131/stat ps File opened for reading /proc/1055/stat ps File opened for reading /proc/1165/cmdline ps File opened for reading /proc/81/stat ps File opened for reading /proc/1637/cmdline ps -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp/.gosh/mfu.txt File opened for modification /tmp/.gosh/eth File opened for modification /tmp/.gosh/xxx.txt
Processes
-
/tmp/.gosh/ps/tmp/.gosh/ps1⤵PID:1594
-
/usr/bin/awkawk "{ for (i=1;i<=NF;i++) print \$i }"2⤵PID:1601
-
-
/bin/grepgrep default2⤵PID:1600
-
-
/sbin/ipip route show2⤵PID:1599
-
-
/bin/rmrm -rf eth2⤵PID:1602
-
-
/bin/grepgrep -v ____2⤵PID:1605
-
-
/bin/grepgrep -v DUP2⤵PID:1604
-
-
/bin/catcat vuln.txt2⤵PID:1603
-
-
/bin/rmrm -rf vul1n.txt xxx1.txt bios.txt mfu.txt2⤵PID:1606
-
-
/tmp/.gosh/pscan2././pscan2 222⤵PID:1607
-
-
/usr/bin/sortsort2⤵PID:1609
-
-
/bin/catcat bios.txt2⤵PID:1608
-
-
/usr/bin/uniquniq2⤵PID:1610
-
-
/tmp/.gosh/prg./prg 4002⤵PID:1611
-
-
/bin/rmrm -rf bios.txt2⤵PID:1612
-
-
/bin/sleepsleep 302⤵PID:1613
-
-
/bin/sleepsleep 302⤵PID:1640
-
-
/bin/grepgrep -v ____2⤵PID:1647
-
-
/bin/grepgrep -v DUP2⤵PID:1646
-
-
/bin/catcat vuln.txt2⤵PID:1645
-
-
/bin/rmrm -rf vul1n.txt xxx1.txt bios.txt mfu.txt2⤵PID:1648
-
-
/tmp/.gosh/pscan2././pscan2 222⤵PID:1649
-
-
/usr/bin/uniquniq2⤵PID:1652
-
-
/usr/bin/sortsort2⤵PID:1651
-
-
/bin/catcat bios.txt2⤵PID:1650
-
-
/tmp/.gosh/prg./prg 4002⤵PID:1653
-
-
/bin/rmrm -rf bios.txt2⤵PID:1654
-
-
/bin/sleepsleep 302⤵PID:1655
-
-
/bin/sleepsleep 302⤵PID:1660
-
-
/bin/grepgrep -v DUP2⤵PID:1666
-
-
/bin/catcat vuln.txt2⤵PID:1665
-
-
/bin/grepgrep -v ____2⤵PID:1667
-
-
/bin/rmrm -rf vul1n.txt xxx1.txt bios.txt mfu.txt2⤵PID:1668
-
-
/tmp/.gosh/pscan2././pscan2 222⤵PID:1669
-
-
/usr/bin/uniquniq2⤵PID:1672
-
-
/usr/bin/sortsort2⤵PID:1671
-
-
/bin/catcat bios.txt2⤵PID:1670
-
-
/tmp/.gosh/prg./prg 4002⤵PID:1673
-
-
/bin/rmrm -rf bios.txt2⤵PID:1674
-
-
/bin/sleepsleep 302⤵PID:1675
-
-
/sbin/ipip route show1⤵PID:1596
-
/bin/grepgrep -v grep1⤵PID:1597
-
/bin/grepgrep -c default1⤵PID:1598
-
/bin/psps ax1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1637
-
/bin/grepgrep -v grep1⤵PID:1638
-
/bin/grepgrep -c "./prg 400"1⤵PID:1639
-
/bin/psps ax1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1642
-
/bin/grepgrep -v grep1⤵PID:1643
-
/bin/grepgrep -c "./prg 700"1⤵PID:1644
-
/bin/grepgrep -v grep1⤵PID:1658
-
/bin/grepgrep -c "./prg 400"1⤵PID:1659
-
/bin/psps ax1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1657
-
/bin/psps ax1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1662
-
/bin/grepgrep -v grep1⤵PID:1663
-
/bin/grepgrep -c "./prg 700"1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD59dd8d4524e3431f117056101b75ee137
SHA1a471b496de121e40af797b0ecd7e9ecc73dc10e1
SHA256987cbd09830379f7e6df90dde7dea0aaa6e673ac75aae2839d2ba203c20d4998
SHA512c61c25198aa7d7d32ab984ff187b07814001efe23901f54f482f9f4c70b9c6fdd3740bdcac33d101cf3ee7f3a57c72f023b45bbf766ce6ae65d0f0febf5e62fa