General
-
Target
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
-
Size
1KB
-
Sample
241123-c9bnhawndw
-
MD5
476467eba539be5db3022f1ebde08841
-
SHA1
6fc462604c405f96b0823e2baa077f150b1bb33f
-
SHA256
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b
-
SHA512
c6fe968567d3e60e8ecef1152c1a389c40245ce0b9a73880a2ff895443bc272000bf76b78c252c646a4a7f737a8564476740fa82792ca9847aa1071f28e47234
Static task
static1
Behavioral task
behavioral1
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
-
Size
1KB
-
MD5
476467eba539be5db3022f1ebde08841
-
SHA1
6fc462604c405f96b0823e2baa077f150b1bb33f
-
SHA256
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b
-
SHA512
c6fe968567d3e60e8ecef1152c1a389c40245ce0b9a73880a2ff895443bc272000bf76b78c252c646a4a7f737a8564476740fa82792ca9847aa1071f28e47234
Score9/10-
Contacts a large (98107) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1