Analysis
-
max time kernel
149s -
max time network
129s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
25-05-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
sb.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
sb.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
sb.sh
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
sb.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
sb.sh
-
Size
24KB
-
MD5
48229751d9027c71a2f5dbbd269c3ddc
-
SHA1
85822c0da2ac34c28e19ee9253a64f96b92d115f
-
SHA256
0f3249d23486ac93ae197b12f57a1707b88328ba22337423b0f1c30646716081
-
SHA512
c393eeb7ea8d53af0e03f284156cd0b0c1be4abb0c585df121049adc52768481465d3631673c1c91fa50286994bc06bd229e6583eb554d45f89643de01fd1f14
-
SSDEEP
384:WTL6DnMCFltFfHGBL59IgoJ61kLxqx8UKT0PqG0Vz7hqeA+Q4pkHXeCprkSI2:cLRCFltFfHGBLMLcxAVGsz7llC+SI2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sb.shioc pid process /root/.cache/bztmpNddd37UDv/sb.sh 1526 sb.sh -
Checks hardware identifiers (DMI) 1 TTPs 2 IoCs
Checks DMI information which indicate if the system is a virtual machine.
Processes:
systemd-detect-virtdescription ioc process File opened for reading /sys/class/dmi/id/product_name systemd-detect-virt File opened for reading /sys/class/dmi/id/sys_vendor systemd-detect-virt -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
catdescription ioc process File opened for reading /proc/cpuinfo cat -
Enumerates kernel/hardware configuration 1 TTPs 4 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
snapsnapsnapsnapdescription ioc process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size snap -
Reads runtime system information 48 IoCs
Reads data from /proc virtual filesystem.
Processes:
systemctldpkgapt-getapt-getidsystemd-detect-virtawkapt-getawkdpkgsysctldpkgsnapsnapaptsnapaptidsnapdpkgdpkgdpkgdpkgdpkgdpkgawksysctldpkgdpkgdescription ioc process File opened for reading /proc/1/environ systemctl File opened for reading /proc/filesystems dpkg File opened for reading /proc/sys/kernel/ngroups_max apt-get File opened for reading /proc/sys/kernel/ngroups_max apt-get File opened for reading /proc/filesystems id File opened for reading /proc/filesystems systemd-detect-virt File opened for reading /proc/self/maps awk File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/self/fd apt-get File opened for reading /proc/sys/kernel/osrelease systemd-detect-virt File opened for reading /proc/self/maps awk File opened for reading /proc/self/fd apt-get File opened for reading /proc/filesystems dpkg File opened for reading /proc/sys/kernel/ngroups_max apt-get File opened for reading /proc/sys/net/ipv4/tcp_congestion_control sysctl File opened for reading /proc/filesystems dpkg File opened for reading /proc/cmdline snap File opened for reading /proc/cgroups snap File opened for reading /proc/filesystems systemctl File opened for reading /proc/sys/kernel/ngroups_max apt File opened for reading /proc/cgroups snap File opened for reading /proc/sys/kernel/ngroups_max apt File opened for reading /proc/self/stat systemd-detect-virt File opened for reading /proc/cmdline systemd-detect-virt File opened for reading /proc/self/fd apt File opened for reading /proc/filesystems id File opened for reading /proc/cmdline snap File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems dpkg File opened for reading /proc/1/sched systemctl File opened for reading /proc/cgroups snap File opened for reading /proc/filesystems dpkg File opened for reading /proc/cmdline snap File opened for reading /proc/filesystems dpkg File opened for reading /proc/self/fd apt-get File opened for reading /proc/filesystems dpkg File opened for reading /proc/filesystems dpkg File opened for reading /proc/cmdline snap File opened for reading /proc/self/maps awk File opened for reading /proc/1/environ systemd-detect-virt File opened for reading /proc/1/sched systemd-detect-virt File opened for reading /proc/sys/net/ipv4/tcp_congestion_control sysctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/filesystems dpkg File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems dpkg File opened for reading /proc/self/fd apt File opened for reading /proc/cgroups snap -
Writes file to tmp directory 64 IoCs
Malware often drops required files in the /tmp directory.
Processes:
aptapt-getaptapt-getapt-gettouchdescription ioc process File opened for modification /tmp/fileutl.message.JTX6lS apt File opened for modification /tmp/fileutl.message.p6Vq3L apt-get File opened for modification /tmp/fileutl.message.6iWkJE apt-get File opened for modification /tmp/fileutl.message.tFCaqx apt-get File opened for modification /tmp/fileutl.message.7GpZ9T apt File opened for modification /tmp/fileutl.message.n65zFQ apt File opened for modification /tmp/fileutl.message.TXlryV apt File opened for modification /tmp/fileutl.message.H08e4V apt File opened for modification /tmp/fileutl.message.UL4i7p apt-get File opened for modification /tmp/fileutl.message.vXdpHx apt File opened for modification /tmp/fileutl.message.OyshE8 apt File opened for modification /tmp/fileutl.message.EGO1kC apt File opened for modification /tmp/fileutl.message.cNQlc6 apt-get File opened for modification /tmp/fileutl.message.MIgIKk apt-get File opened for modification /tmp/fileutl.message.zTbMaB apt-get File opened for modification /tmp/fileutl.message.mmkZyk apt File opened for modification /tmp/fileutl.message.CrTeJU apt File opened for modification /tmp/fileutl.message.eXaUix apt-get File opened for modification /tmp/fileutl.message.ggg9lS apt-get File opened for modification /tmp/fileutl.message.2diIUt apt-get File opened for modification /tmp/fileutl.message.Z13mSk apt File opened for modification /tmp/fileutl.message.ptFZz6 apt-get File opened for modification /tmp/fileutl.message.ay25GW apt-get File opened for modification /tmp/fileutl.message.Cin8du apt-get File opened for modification /tmp/fileutl.message.sgZg0p apt-get File opened for modification /tmp/fileutl.message.FZKVK0 apt-get File opened for modification /tmp/fileutl.message.vo9dPi apt-get File opened for modification /tmp/fileutl.message.zSNn5a apt File opened for modification /tmp/fileutl.message.kyUDE1 apt-get File opened for modification /tmp/fileutl.message.hlUNYP apt-get File opened for modification /tmp/fileutl.message.Wwy3Yg apt-get File opened for modification /tmp/fileutl.message.CGjZHD apt-get File opened for modification /tmp/fileutl.message.xuVRiU apt File opened for modification /tmp/fileutl.message.Bs3E8E apt File opened for modification /tmp/fileutl.message.RKtUIl apt File opened for modification /tmp/fileutl.message.JrMHum apt File opened for modification /tmp/fileutl.message.Jn2s3I apt-get File opened for modification /tmp/fileutl.message.JAbOHA apt-get File opened for modification /tmp/fileutl.message.MBHoLy apt-get File opened for modification /tmp/fileutl.message.oHGoIf apt-get File opened for modification /tmp/fileutl.message.4TbZBI apt File opened for modification /tmp/fileutl.message.NCOrXH apt File opened for modification /tmp/fileutl.message.axPIO1 apt-get File opened for modification /tmp/fileutl.message.FQNWf4 apt-get File opened for modification /tmp/fileutl.message.2eTDR6 apt File opened for modification /tmp/fileutl.message.aUUzhb apt-get File opened for modification /tmp/fileutl.message.6MNrxb apt-get File opened for modification /tmp/fileutl.message.RhWsFj apt File opened for modification /tmp/fileutl.message.aDLVrz apt-get File opened for modification /tmp/fileutl.message.z9N8c9 apt File opened for modification /tmp/fileutl.message.NU8q3G apt File opened for modification /tmp/fileutl.message.sWGkOU apt-get File opened for modification /tmp/fileutl.message.lv6Kkd apt-get File opened for modification /tmp/fileutl.message.vnE0Ds apt-get File opened for modification /tmp/fileutl.message.uI2Jep apt-get File opened for modification /tmp/fileutl.message.Eh5Sjc apt File opened for modification /tmp/fileutl.message.LwdZzB apt File opened for modification /tmp/sbyg_update touch File opened for modification /tmp/fileutl.message.G0DaP9 apt-get File opened for modification /tmp/fileutl.message.e9KJYW apt-get File opened for modification /tmp/fileutl.message.udSdyw apt File opened for modification /tmp/fileutl.message.JbYKaU apt File opened for modification /tmp/fileutl.message.RkEvL5 apt File opened for modification /tmp/fileutl.message.1ujfq7 apt
Processes
-
/tmp/sb.sh/tmp/sb.sh1⤵PID:1511
-
/usr/bin/idid -u -n2⤵
- Reads runtime system information
PID:1512
-
-
/usr/bin/cutcut -d: -f62⤵PID:1515
-
-
/usr/bin/getentgetent passwd root2⤵PID:1514
-
-
/bin/mktempmktemp -d /root/.cache/bztmpXXXXXXXXX2⤵PID:1517
-
-
/usr/bin/basenamebasename /tmp/sb.sh2⤵PID:1518
-
-
/usr/bin/tailtail -n +12⤵PID:1521
-
-
/bin/bzip2bzip2 -cd2⤵PID:1523
-
-
/usr/bin/tailtail -n +752⤵PID:1522
-
-
/bin/chmodchmod 700 /root/.cache/bztmpNddd37UDv/sb.sh2⤵PID:1524
-
-
/root/.cache/bztmpNddd37UDv/sb.sh/root/.cache/bztmpNddd37UDv/sb.sh2⤵
- Executes dropped EXE
PID:1526 -
/bin/grepgrep -q -E -i debian3⤵PID:1529
-
-
/bin/catcat /etc/issue3⤵PID:1528
-
-
/bin/grepgrep -q -E -i ubuntu3⤵PID:1531
-
-
/bin/catcat /etc/issue3⤵PID:1530
-
-
/usr/bin/cutcut -d . -f13⤵PID:1535
-
-
/usr/bin/cutcut -d "\"" -f23⤵PID:1534
-
-
/bin/grepgrep -i version_id /etc/os-release3⤵PID:1533
-
-
/bin/catcat /etc/redhat-release3⤵PID:1537
-
-
/usr/bin/cutcut -d "\"" -f23⤵PID:1540
-
-
/bin/grepgrep -i pretty_name3⤵PID:1539
-
-
/bin/catcat /etc/os-release3⤵PID:1538
-
-
/bin/grepgrep -i -E "arch|alpine"3⤵PID:1543
-
-
/usr/bin/cutcut -d - -f13⤵PID:1546
-
-
/bin/unameuname -r3⤵PID:1545
-
-
/usr/bin/systemd-detect-virtsystemd-detect-virt3⤵
- Checks hardware identifiers (DMI)
- Reads runtime system information
PID:1548
-
-
/bin/unameuname -m3⤵PID:1549
-
-
/usr/bin/cutcut -d: -f23⤵PID:1554
-
-
/usr/bin/headhead -n 13⤵PID:1553
-
-
/bin/grepgrep flags3⤵PID:1552
-
-
/bin/catcat /proc/cpuinfo3⤵
- Checks CPU configuration
PID:1551
-
-
/usr/bin/awkawk -F " " "{print \$3}"3⤵
- Reads runtime system information
PID:1557
-
-
/sbin/sysctlsysctl net.ipv4.tcp_congestion_control3⤵
- Reads runtime system information
PID:1556
-
-
/usr/bin/awkawk -F " " "{print \$3}"3⤵
- Reads runtime system information
PID:1560
-
-
/sbin/sysctlsysctl net.ipv4.tcp_congestion_control3⤵
- Reads runtime system information
PID:1559
-
-
/bin/hostnamehostname3⤵PID:1561
-
-
/usr/bin/aptapt update -y3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1563 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1564
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1565
-
-
/usr/lib/apt/methods/https/usr/lib/apt/methods/https4⤵PID:1566
-
-
/bin/shsh -c "[ ! -e /run/systemd/system ] || [ \$(id -u) -ne 0 ] || systemctl start --no-block apt-news.service esm-cache.service || true"4⤵PID:1568
-
/usr/bin/idid -u5⤵
- Reads runtime system information
PID:1569
-
-
/bin/systemctlsystemctl start --no-block apt-news.service esm-cache.service5⤵
- Reads runtime system information
PID:1570
-
-
-
/usr/lib/apt/methods/https/usr/lib/apt/methods/https4⤵PID:1574
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1578
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1579
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1586
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1587
-
-
-
/usr/bin/aptapt install jq iptables-persistent -y3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1588 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1589
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1590
-
-
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1591
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1592
-
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1601
-
-
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1602
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1603
-
-
-
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1611
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1612
-
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1621
-
-
/bin/sh/bin/sh -c "[ ! -f /usr/bin/snap ] || /usr/bin/snap advise-snap --from-apt 2>/dev/null || true"4⤵PID:1622
-
/usr/bin/snap/usr/bin/snap advise-snap --from-apt5⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1623
-
-
-
-
/usr/bin/touchtouch sbyg_update3⤵
- Writes file to tmp directory
PID:1637
-
-
/usr/bin/apt-getapt-get install -y expect3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1639 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1640
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1641
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1642
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1643
-
-
-
/usr/bin/apt-getapt-get install -y qrencode3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1648 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1649
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1650
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1651
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1652
-
-
-
/usr/bin/apt-getapt-get install -y git3⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1657 -
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1658
-
-
/usr/bin/dpkg/usr/bin/dpkg --print-foreign-architectures4⤵
- Reads runtime system information
PID:1659
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1660
-
-
/usr/lib/apt/methods/http/usr/lib/apt/methods/http4⤵PID:1661
-
-
-
/usr/bin/clearclear3⤵PID:1665
-
-
/bin/catcat /etc/s-box/v3⤵PID:1667
-
-
/usr/bin/headhead -n 13⤵PID:1671
-
-
/usr/bin/awkawk -F 更新内容 "{print \$1}"3⤵
- Reads runtime system information
PID:1670
-
-
/usr/bin/curlcurl -sL https://raw.githubusercontent.com/yonggekkk/sing-box_hysteria2_tuic_argo_reality/main/version3⤵PID:1669
-
-
-
/bin/sleepsleep 52⤵PID:1527
-
-
/bin/rmrm -fr /root/.cache/bztmpNddd37UDv2⤵PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD5f1973953ae5fec498235b9b8c9a147a8
SHA1379a71b20e20d95ea0a88d46d0e915e9dd6bbcff
SHA25692869467d779529f7f8daffd9213fdfa8c153ebdb42c261b349da5ec76c363b5
SHA512340aaa1ab1f1b6753dab411967806e5d1ceba71224e676d25e95a644c8ff086397a750640b8f8958f54926a0eb37d0fbe72246e8f8f58af18b73db17d39c7e62
-
Filesize
235KB
MD5373fe2f2ef99005d2550a482f09a3e51
SHA168e6572b55b1e77f7d171ebac7b2579b7a6bd51d
SHA2567552d5ab0c3879756a860aaab8e7c2f8ffb9409ea9ff9e65fc046ba5c519ebe5
SHA512def9e854b824d2fddc6a15f898be73cfb679ac38563f5af854546f49c9d5d2316a40176dc41d6b360bda7b65de53863a53e4eedadf6336000b031b77a113607b