General
-
Target
be0fe6a1344b052d4f61cca910f7d26ad02d283f280014eeca0d1cc729e6822a.zip
-
Size
10KB
-
Sample
240114-r58vrsceg5
-
MD5
b93f6725102b6d79ca24970df54eb963
-
SHA1
e985c8556967b9a14f0ddbe44f1181af8f4b0c14
-
SHA256
00092d44dfb2f709dd9a2a618ce43bae530a1f274bde4d18da57fc40f72d7f0e
-
SHA512
98c25a3947f2d00c9e6d58678a595924dfd5e3aa00e0fd68874b99c877178196bb52c3b73a000705c8f28aa1372b1a95b78c4675ccc80bc7f002f4757827ffaf
-
SSDEEP
192:vHHdrtJbvj/JB2jKzpxp/mo6JHqNIZsqt7bVysurilcfhT97XkWGWdMq87PJXdg:PHdXzaKzFmo6JEEdysuriKV5XUAjIJ6
Static task
static1
Behavioral task
behavioral1
Sample
be0fe6a1344b052d4f61cca910f7d26ad02d283f280014eeca0d1cc729e6822a.sh
Resource
ubuntu1804-amd64-20231221-en
Behavioral task
behavioral2
Sample
be0fe6a1344b052d4f61cca910f7d26ad02d283f280014eeca0d1cc729e6822a.sh
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral3
Sample
be0fe6a1344b052d4f61cca910f7d26ad02d283f280014eeca0d1cc729e6822a.sh
Resource
debian9-mipsbe-20231221-en
Behavioral task
behavioral4
Sample
be0fe6a1344b052d4f61cca910f7d26ad02d283f280014eeca0d1cc729e6822a.sh
Resource
debian9-mipsel-20231215-en
Malware Config
Targets
-
-
Target
be0fe6a1344b052d4f61cca910f7d26ad02d283f280014eeca0d1cc729e6822a.sh
-
Size
46KB
-
MD5
f0b071a68f96f23c329aa35145a6d405
-
SHA1
e80968b1833d4968da34d30ff49974bb69035535
-
SHA256
be0fe6a1344b052d4f61cca910f7d26ad02d283f280014eeca0d1cc729e6822a
-
SHA512
550093803f4931a1cd2d9c4f0e20dbfe4fcfd1170f04fcd0b76af9d508db18baa3131589c3caaf601509946a525ab731bdf00618fd03017056625d95969477d3
-
SSDEEP
768:bxlT2wDuWvWi7vFNcuFkc2zq0x3UKnicZuiR/amT8p:86F+Lc2/FicfSmT8p
Score10/10-
Adds new SSH keys
Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.
-
Changes its process name
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Executes dropped EXE
-
Flushes firewall rules
Flushes/ disables firewall rules inside the Linux kernel.
-
Writes DNS configuration
Writes data to DNS resolver config file.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Deletes log files
Deletes log files on the system.
-
Disables AppArmor
Disables AppArmor security module.
-
Disables SELinux
Disables SELinux security module.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes
-
Write file to user bin folder
-
Writes file to system bin folder
-