Overview
overview
10Static
static
1script_mal...6c1.sh
ubuntu-20.04-amd64
9script_malware/1.sh
ubuntu-20.04-amd64
10script_mal...459.sh
ubuntu-20.04-amd64
7script_mal...ux.elf
ubuntu-20.04-amd64
1script_mal...da.elf
ubuntu-20.04-amd64
1script_malware/23.sh
ubuntu-20.04-amd64
10script_malware/404
ubuntu-20.04-amd64
script_mal...c5b.py
ubuntu-20.04-amd64
1script_mal...006.sh
ubuntu-20.04-amd64
10script_mal...oPy.sh
ubuntu-20.04-amd64
1script_mal...617.sh
ubuntu-20.04-amd64
script_mal...dc0.sh
ubuntu-20.04-amd64
9script_mal...e58.sh
ubuntu-20.04-amd64
7script_mal...d28.sh
ubuntu-20.04-amd64
7script_mal...ail.sh
ubuntu-20.04-amd64
script_malware/rs.sh
ubuntu-20.04-amd64
6script_mal...tup.sh
ubuntu-20.04-amd64
7script_mal...ll.elf
ubuntu-20.04-amd64
1script_malware/ta.sh
ubuntu-20.04-amd64
10Analysis
-
max time kernel
2s -
max time network
1681s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
25-02-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral2
Sample
script_malware/1.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral3
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral4
Sample
script_malware/164f8295_linux.elf
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral5
Sample
script_malware/21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da.elf
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral6
Sample
script_malware/23.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral7
Sample
script_malware/404
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral8
Sample
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral9
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral10
Sample
script_malware/SnOoPy.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral11
Sample
script_malware/a423a2a11c1904e42dc8630064e252ac4568220417a9ae072a557131e9386617.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral12
Sample
script_malware/a58fa03638110727f4a4a227f6ec2c0dceaeb39ccee89d12a4d727bb50d29dc0.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral13
Sample
script_malware/aa5a487db37ce176e17c7abbb2b1d460ba926344e46737f2f64b65bf5a4a3e58.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral14
Sample
script_malware/ae4b7284a9538c66432f02097c3de14e2253d16b6602c4694753468bc14d7d28.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral15
Sample
script_malware/redtail.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral16
Sample
script_malware/rs.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral17
Sample
script_malware/setup.sh
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral18
Sample
script_malware/shell.elf
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral19
Sample
script_malware/ta.sh
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
script_malware/setup.sh
-
Size
1KB
-
MD5
37d7c910159cf1d62dbcf5b7bff399ea
-
SHA1
90a783bc89f7fbfb52da193849d5d849b9a3a1e6
-
SHA256
29acfdc8b457d7b56d5eb443fe6d22f8169db3786605e37be0bdac9bfb1503fb
-
SHA512
dc78fbcfd58d8383842de7eb18b3f9f72b7255db8f670e93230916e98b8f6dbf77f8ba28cd93f9d3f740243adec500e9f245e4ebbb440aa882eff7907e9fe0c0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
.redtailioc pid process /.redtail 1497 .redtail -
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
description ioc File opened for reading /sys/devices/system/node -
Reads runtime system information 3 IoCs
Reads data from /proc virtual filesystem.
Processes:
findmvfinddescription ioc process File opened for reading /proc/filesystems find File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems find
Processes
-
/tmp/script_malware/setup.sh/tmp/script_malware/setup.sh1⤵PID:1474
-
/usr/bin/unameuname -mp2⤵PID:1475
-
-
/usr/bin/grepgrep -q x86_642⤵PID:1477
-
-
/usr/bin/nprocnproc2⤵PID:1478
-
-
/usr/sbin/sysctlsysctl -w "vm.nr_hugepages=1"2⤵PID:1479
-
-
/usr/bin/findfind /sys/devices/system/node/node0 -maxdepth 0 -type d2⤵
- Reads runtime system information
PID:1480
-
-
/usr/bin/mvmv redtail.sh /2⤵
- Reads runtime system information
PID:1492
-
-
/usr/bin/catcat redtail.x86_642⤵PID:1495
-
-
/usr/bin/chmodchmod +x .redtail2⤵PID:1496
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:1497
-
-
/usr/bin/rmrm -rf redtail.sh2⤵PID:1501
-
-
/usr/bin/headhead -n 11⤵PID:1483
-
/usr/bin/findfind / -writable -executable -readable -not -path "/proc/*"1⤵
- Reads runtime system information
PID:1482