Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12/10/2024, 09:52

General

  • Target

    packages/dmg/script/create.sh

  • Size

    552B

  • MD5

    9bbfc98a75fe99fb00b2c13615acc0a0

  • SHA1

    148ccc48b2466ed8ea1b9d74f3bc7f200b3ba159

  • SHA256

    9353a55c87f87b799a0c7c31c0cee3d0aa38afab9a71bc414d0da23936085494

  • SHA512

    23e41eaa3864d289254fd1a5fffc6036404b5faf6283afaf4d213464bf3227d1532b2273a9cb7066bb0e8447c468bc401043ebc47355c7b18978d4ff872ccb90

Malware Config

Signatures

  • Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs

    Abuse sudo or cached sudo credentials to execute code.

  • Reads runtime system information 3 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/packages/dmg/script/create.sh
    /tmp/packages/dmg/script/create.sh
    1⤵
    • System Network Configuration Discovery
    PID:693
    • /usr/bin/sudo
      sudo xattr -r -d com.apple.quarantine "@[email protected]"
      2⤵
      • Abuse Elevation Control Mechanism: Sudo and Sudo Caching
      • Reads runtime system information
      PID:695

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads