Overview
overview
10Static
static
1script_mal...6c1.sh
ubuntu-18.04-amd64
9script_mal...6c1.sh
debian-9-armhf
9script_mal...6c1.sh
debian-9-mips
9script_mal...6c1.sh
debian-9-mipsel
9script_malware/1.sh
ubuntu-18.04-amd64
10script_malware/1.sh
debian-9-armhf
7script_malware/1.sh
debian-9-mips
7script_malware/1.sh
debian-9-mipsel
7script_mal...459.sh
ubuntu-18.04-amd64
7script_mal...459.sh
debian-9-armhf
7script_mal...459.sh
debian-9-mips
7script_mal...459.sh
debian-9-mipsel
7script_mal...ux.elf
ubuntu-22.04-amd64
3script_mal...da.elf
ubuntu-22.04-amd64
3script_malware/23.sh
ubuntu-18.04-amd64
3script_malware/23.sh
debian-9-armhf
3script_malware/23.sh
debian-9-mips
3script_malware/23.sh
debian-9-mipsel
3script_malware/404
ubuntu-18.04-amd64
script_malware/404
debian-9-armhf
script_malware/404
debian-9-mips
script_malware/404
debian-9-mipsel
script_mal...c5b.py
windows7-x64
3script_mal...c5b.py
windows10-2004-x64
3script_mal...006.sh
ubuntu-18.04-amd64
10script_mal...006.sh
debian-9-armhf
7script_mal...006.sh
debian-9-mips
7script_mal...006.sh
debian-9-mipsel
7script_mal...oPy.sh
ubuntu-18.04-amd64
7script_mal...oPy.sh
debian-9-armhf
7script_mal...oPy.sh
debian-9-mips
7script_mal...oPy.sh
debian-9-mipsel
7General
-
Target
script_malware.zip
-
Size
4.4MB
-
Sample
241206-rejsyswrgj
-
MD5
cabc07f288cc71b7447d6098ce3bb245
-
SHA1
2ff090c33470e3c8c2c10888ba0de5539c5126d1
-
SHA256
78276bd481a04c29109fbbd8313701e5b814165fa4b48515ec4489ccfda93107
-
SHA512
7aef8936dd1f734d20a9ab251ab46c22bcaa4c2a012387b7e9fce48e9d870926981c22cf3fac87c2b3bd0ae6f6efe084aaefd15fe229cd1bf085a55e0322dd80
-
SSDEEP
98304:OUCcwlITgiAybrbTWITgJbyvVqUCcwlITgiAybrbTWITgJbyvVvM:pCcCEgiAsTHsyPCcCEgiAsTHsyhM
Static task
static1
Behavioral task
behavioral1
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
script_malware/1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral6
Sample
script_malware/1.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral7
Sample
script_malware/1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral8
Sample
script_malware/1.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral9
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral10
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral11
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral12
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral13
Sample
script_malware/164f8295_linux.elf
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral14
Sample
script_malware/21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da.elf
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral15
Sample
script_malware/23.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral16
Sample
script_malware/23.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral17
Sample
script_malware/23.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
script_malware/23.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral19
Sample
script_malware/404
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral20
Sample
script_malware/404
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral21
Sample
script_malware/404
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral22
Sample
script_malware/404
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral23
Sample
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral26
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral27
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral28
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral29
Sample
script_malware/SnOoPy.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral30
Sample
script_malware/SnOoPy.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral31
Sample
script_malware/SnOoPy.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral32
Sample
script_malware/SnOoPy.sh
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
-
Size
11KB
-
MD5
07b7746b922cf7d7fa821123a226ed36
-
SHA1
bf2df8f2813ef4e2cf61ea193e091b808aa854c7
-
SHA256
063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1
-
SHA512
ad29993a88c996f96fdc5c01fda89400b1e27228c58445d181dc6af974a171ee36e014d90aa8e09de6d83e4bfd12d167eb361bd52b6d194af6f249a6812019cb
-
SSDEEP
192:Xws08k5tkd5DFPSV3n7/e867jNKvSbRXA8kWmk4lkCIkvUgoaES8DSWOlA+1esP:XQwL4/e867USbRXA8kWT4yCtvUgDjdWi
-
Modifies the dynamic linker configuration file
Malware can modify the configuration file of the dynamic linker to preload malicous libraries with every executed process.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
-
-
Target
script_malware/1.sh
-
Size
35KB
-
MD5
2550990d2d52581b213e7c9305c392d3
-
SHA1
f7f069915c9b97550dc1fb6cf631f6222416dcf5
-
SHA256
8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006
-
SHA512
a30d4a39203e6a98937e8670b7b3caaa63d2141fdf404bb28ca240d95cb7420bdfb8c695db81cc9c799e8818266600c137b8b0df2dfc69d7566bae64eee2ad50
-
SSDEEP
768:X87XzQ5VFNcDAFLcIwgnoYq0xFB6ytguz:X3VF+D6cIwgos/z
-
Xmrig_linux family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Executes dropped EXE
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Disables AppArmor
Disables AppArmor security module.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
-
Size
3KB
-
MD5
d0d36f169f1458806053aae482af5010
-
SHA1
e603944aceb5c0885a8627de12f36b159bbf2f05
-
SHA256
10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459
-
SHA512
982abe39731d8cc852c25650740ff73975c10d19027eccf610401260e2f508334f1de656f8dd332fa698dccc9f7d3bda610c8b9e84d276036a6e9408d826229a
Score7/10-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
script_malware/164f8295_linux.elf
-
Size
5.1MB
-
MD5
c850f6816459e3364b2a54239642101b
-
SHA1
30c60f18279ed5fd36e3ac2d3ba5ddbdc5d1f624
-
SHA256
21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da
-
SHA512
be7eaec0e4847a422ab7b52af7f0493e2390973077500f4faab38cb0dafd9d651346aee13bb9e5a4fb936e3cc3f83c7db598121df37be9ff6cda2dadf59ccb2f
-
SSDEEP
98304:nxygRxtJ8tcZe32l/+jMSXYTU4BcoPfa8/X:Stc0kbSXWJ
Score3/10 -
-
-
Target
script_malware/21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da.elf
-
Size
5.1MB
-
MD5
c850f6816459e3364b2a54239642101b
-
SHA1
30c60f18279ed5fd36e3ac2d3ba5ddbdc5d1f624
-
SHA256
21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da
-
SHA512
be7eaec0e4847a422ab7b52af7f0493e2390973077500f4faab38cb0dafd9d651346aee13bb9e5a4fb936e3cc3f83c7db598121df37be9ff6cda2dadf59ccb2f
-
SSDEEP
98304:nxygRxtJ8tcZe32l/+jMSXYTU4BcoPfa8/X:Stc0kbSXWJ
Score3/10 -
-
-
Target
script_malware/23.sh
-
Size
287B
-
MD5
aa0772cff70daa00d44a201b28ef6b08
-
SHA1
d129e51acd50ed4ff87672dca4975ed313ae9ad9
-
SHA256
a55e9eb1cb4dc2cb8d1a697d329b3a76e18b949308e16ef50aafca1e08123939
-
SHA512
9d2654a7c7634909117d65b0d60bee51e2b9f2de320c2dfc7a30b36f182e2a44b21be91c3dd73fabd4d0cbff7fbc6c18a712cfd41fdcf51cf06ef4a39fe846b1
Score3/10 -
-
-
Target
script_malware/404
-
Size
26KB
-
MD5
e53cf00cf16d5e645103a266959ce5b7
-
SHA1
d145edc39d2b5ab2392a989734ef28af77f74f7e
-
SHA256
0fb9eb96a08f9ad3400f89749d32f3e44362346ec7fca9bd5e9ba85022e5ebc1
-
SHA512
30b31e6b89f8f1eb92de62a2ba90ab299e060e11a91ef069927f045506dc73d0a276adf3966b4525164488bc8779b4a1a48f005513d9ba9f92916d04ec26f50a
-
SSDEEP
192:phe97oGORlRQ4CR1ydi5DAomxCdsjnbP19+9Uc3gHNgWW1kSNPWW0wnENfICSo4M:iWBLZCRwdkzzsjT1TtE1dIfICSoTx9k2
Score3/10 -
-
-
Target
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
-
Size
38KB
-
MD5
02e98c71545c8345d28920fbc4f99c28
-
SHA1
a09e2b273c4cb323d4ea424ae456d9dbc9fc43f0
-
SHA256
864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b
-
SHA512
62ca71f1028be36e9afa5d26c8f11471d6679658b8b3db7b2db696f093a2a9d5e616a7b3c336a18c143c5c73908259eb4ca2f4af66d3ee56a5dc4ee358d2f530
-
SSDEEP
768:Jkcso0KfNBqjxvcG4DRINIUBqKENI1gJkOpvUBL6GYJ5jHQES8Z80foQy2aCrhX:ueNB40xbUBqKEix2vLzwES8Z80foQ9X
Score3/10 -
-
-
Target
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
-
Size
35KB
-
MD5
2550990d2d52581b213e7c9305c392d3
-
SHA1
f7f069915c9b97550dc1fb6cf631f6222416dcf5
-
SHA256
8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006
-
SHA512
a30d4a39203e6a98937e8670b7b3caaa63d2141fdf404bb28ca240d95cb7420bdfb8c695db81cc9c799e8818266600c137b8b0df2dfc69d7566bae64eee2ad50
-
SSDEEP
768:X87XzQ5VFNcDAFLcIwgnoYq0xFB6ytguz:X3VF+D6cIwgos/z
-
Xmrig_linux family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Executes dropped EXE
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Disables AppArmor
Disables AppArmor security module.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
script_malware/SnOoPy.sh
-
Size
2KB
-
MD5
f0664749e65d26335de79a90c7074d00
-
SHA1
0deb03914ba232314b5214803dd97b94c1c9d9e5
-
SHA256
57ad07730428c1412ba43f4470c2074f4f0ef4e6eb5fcd24c9e19e49028e455a
-
SHA512
b605e84c23dad423a5e585c49957b0ade5f8764681f010fc1d192c81f677e4a849872db8afedd262e740f648aca18649a89420a54a02f1f1bd594c2125c2b6ff
Score7/10-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Hijack Execution Flow
1Dynamic Linker Hijacking
1Scheduled Task/Job
1Cron
1Privilege Escalation
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Hijack Execution Flow
1Dynamic Linker Hijacking
1Scheduled Task/Job
1Cron
1Defense Evasion
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hijack Execution Flow
1Dynamic Linker Hijacking
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
1Clear Linux or Mac System Logs
1Virtualization/Sandbox Evasion
1System Checks
1