Analysis
-
max time kernel
43s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
03-12-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
Resource
debian9-mipsel-20240226-en
General
-
Target
3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
-
Size
1KB
-
MD5
51a900215c41691542f83df8cb053ef7
-
SHA1
efaca58b61cb70b87a075fad593c81beb757ad7e
-
SHA256
3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae
-
SHA512
15ff74bcc1f503f31cc8bff6fad446a1f5a7c774b13c623071ceb480bddef28d7a942f1e15b68a98eaa6e481a581c6792b734075011bd96a34fcbf0e256aa5b1
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 761 chmod 766 chmod 772 chmod 756 chmod -
Executes dropped EXE 4 IoCs
ioc pid Process /.redtail 757 .redtail /.redtail 763 .redtail /.redtail 768 .redtail /.redtail 773 .redtail -
description ioc Process File opened for reading /proc/mounts cat File opened for reading /proc/self/maps awk File opened for reading /proc/filesystems find File opened for reading /proc/filesystems cp
Processes
-
/tmp/3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae/tmp/3b15778595cef00d1a51035dd4fd65e6be97e73544cb1899f40aec4aaa0445ae1⤵PID:690
-
/bin/unameuname -mp2⤵PID:692
-
-
/bin/grepgrep -q x86_642⤵PID:699
-
-
/bin/grepgrep -q amd642⤵PID:703
-
-
/bin/grepgrep -q "i[3456]86"2⤵PID:706
-
-
/bin/grepgrep -q armv82⤵PID:709
-
-
/bin/grepgrep -q aarch642⤵PID:713
-
-
/bin/grepgrep -q armv72⤵PID:716
-
-
/bin/catcat /proc/mounts2⤵
- Reads runtime system information
PID:721
-
-
/bin/grepgrep noexec2⤵PID:722
-
-
/usr/bin/awkawk "{print \$2}"2⤵
- Reads runtime system information
PID:723
-
-
/usr/bin/whoamiwhoami2⤵PID:729
-
-
/usr/bin/findfind / -type d -user root -perm "-u=rwx" -not -path "/tmp/*" -not -path "/proc/*" -not -path /sys -not -path "/sys/*" -not -path /proc -not -path "/proc/*" -not -path /dev/pts -not -path "/dev/pts/*" -not -path /run -not -path "/run/*" -not -path /sys/kernel/security -not -path "/sys/kernel/security/*" -not -path /run/lock -not -path "/run/lock/*" -not -path /sys/fs/cgroup -not -path "/sys/fs/cgroup/*" -not -path /sys/fs/cgroup/systemd -not -path "/sys/fs/cgroup/systemd/*" -not -path /sys/fs/cgroup/freezer -not -path "/sys/fs/cgroup/freezer/*" -not -path /sys/fs/cgroup/devices -not -path "/sys/fs/cgroup/devices/*" -not -path /sys/fs/cgroup/blkio -not -path "/sys/fs/cgroup/blkio/*" -not -path "/sys/fs/cgroup/cpu,cpuacct" -not -path "/sys/fs/cgroup/cpu,cpuacct/*" -not -path /sys/fs/cgroup/pids -not -path "/sys/fs/cgroup/pids/*" -not -path /sys/fs/cgroup/perf_event -not -path "/sys/fs/cgroup/perf_event/*" -not -path "/sys/fs/cgroup/net_cls,net_prio" -not -path "/sys/fs/cgroup/net_cls,net_prio/*" -not -path /sys/fs/cgroup/cpuset -not -path "/sys/fs/cgroup/cpuset/*" -not -path /sys/fs/cgroup/memory -not -path "/sys/fs/cgroup/memory/*"2⤵
- Reads runtime system information
PID:730
-
-
/usr/bin/touchtouch .testfile2⤵PID:746
-
-
/bin/dddd "if=/dev/zero" "of=.testfile2" "bs=2M" "count=1"2⤵PID:749
-
-
/bin/rmrm -rf .testfile .testfile22⤵PID:750
-
-
/bin/cpcp -r "/tmp/redtail.*" /2⤵
- Reads runtime system information
PID:751
-
-
/bin/rmrm -rf .redtail2⤵PID:753
-
-
/bin/catcat redtail.x86_642⤵PID:755
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:756
-
-
/.redtail./.redtail ssh2⤵
- Executes dropped EXE
PID:757
-
-
/bin/catcat redtail.i6862⤵PID:760
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:761
-
-
/.redtail./.redtail ssh2⤵
- Executes dropped EXE
PID:763
-
-
/bin/catcat redtail.arm82⤵PID:765
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:766
-
-
/.redtail./.redtail ssh2⤵
- Executes dropped EXE
PID:768
-
-
/bin/catcat redtail.arm72⤵PID:770
-
-
/bin/chmodchmod +x .redtail2⤵
- File and Directory Permissions Modification
PID:772
-
-
/.redtail./.redtail ssh2⤵
- Executes dropped EXE
PID:773
-
-
/bin/rmrm -rf "redtail.*"2⤵PID:775
-
-
/bin/rmrm -rf "/tmp/redtail.*"2⤵PID:776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b2d1236c286a3c0704224fe4105eca49
SHA17d76d48d64d7ac5411d714a4bb83f37e3e5b8df6
SHA2565647f05ec18958947d32874eeb788fa396a05d0bab7c1b71f112ceb7e9b31eee
SHA512731859029215873fdac1c9f2f8bd25a334abf0f3a9e1b057cf2cacc2826d86b0c26a3fa920a936421401c0471f38857cb53ba905489ea46b185209fdff65b3b6