General
-
Target
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh
-
Size
816KB
-
Sample
241121-ks31esvnbp
-
MD5
0e1f041d4e0c23943e0b046520c9cd07
-
SHA1
d7d93deda88b8c0615eb45861d80a4f48525ab3a
-
SHA256
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34
-
SHA512
677f6b1268c8ed8f8f62b2149ea41c44df741bd44ba8dbcb987732049d2889676c6610d823350ace5d13d9a93c9a1b47021dde3bc4e9645cbfb9714b7fd7866e
-
SSDEEP
6144:aOtG23KlUK0LZqV8FxkZ5zPulEdHqZ7rhhVbGdQ3CPlHMpsgdce2Nkba/Jp5IsTj:WiLd5dawKnDTyw3psYEI
Static task
static1
Behavioral task
behavioral1
Sample
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh
-
Size
816KB
-
MD5
0e1f041d4e0c23943e0b046520c9cd07
-
SHA1
d7d93deda88b8c0615eb45861d80a4f48525ab3a
-
SHA256
f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34
-
SHA512
677f6b1268c8ed8f8f62b2149ea41c44df741bd44ba8dbcb987732049d2889676c6610d823350ace5d13d9a93c9a1b47021dde3bc4e9645cbfb9714b7fd7866e
-
SSDEEP
6144:aOtG23KlUK0LZqV8FxkZ5zPulEdHqZ7rhhVbGdQ3CPlHMpsgdce2Nkba/Jp5IsTj:WiLd5dawKnDTyw3psYEI
-
Looks for SUID binaries
Searches the filesystem for potential binaries to be used for privilege escalation (common during reconnaissance activity).
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads data from the clipboard
Attempts to collect data stored in the clipboard using xclip tool.
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Reads network interface configuration
Fetches information about one or more active network interfaces.
-
Virtualization/Sandbox Evasion: Time Based Evasion
Adversaries may detect and evade virtualized environments and sandboxes.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1Deobfuscate/Decode Files or Information
1Virtualization/Sandbox Evasion
3System Checks
2Time Based Evasion
1