Overview
overview
10Static
static
1script_mal...6c1.sh
ubuntu-18.04-amd64
9script_mal...6c1.sh
debian-9-armhf
9script_mal...6c1.sh
debian-9-mips
9script_mal...6c1.sh
debian-9-mipsel
9script_malware/1.sh
ubuntu-18.04-amd64
10script_malware/1.sh
debian-9-armhf
7script_malware/1.sh
debian-9-mips
7script_malware/1.sh
debian-9-mipsel
7script_mal...459.sh
ubuntu-18.04-amd64
7script_mal...459.sh
debian-9-armhf
7script_mal...459.sh
debian-9-mips
7script_mal...459.sh
debian-9-mipsel
7script_mal...ux.elf
ubuntu-22.04-amd64
3script_mal...da.elf
ubuntu-22.04-amd64
3script_malware/23.sh
ubuntu-18.04-amd64
3script_malware/23.sh
debian-9-armhf
3script_malware/23.sh
debian-9-mips
3script_malware/23.sh
debian-9-mipsel
3script_malware/404
ubuntu-18.04-amd64
script_malware/404
debian-9-armhf
script_malware/404
debian-9-mips
script_malware/404
debian-9-mipsel
script_mal...c5b.py
windows7-x64
3script_mal...c5b.py
windows10-2004-x64
3script_mal...006.sh
ubuntu-18.04-amd64
10script_mal...006.sh
debian-9-armhf
7script_mal...006.sh
debian-9-mips
7script_mal...006.sh
debian-9-mipsel
7script_mal...oPy.sh
ubuntu-18.04-amd64
7script_mal...oPy.sh
debian-9-armhf
7script_mal...oPy.sh
debian-9-mips
7script_mal...oPy.sh
debian-9-mipsel
7Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
script_malware/1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral6
Sample
script_malware/1.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral7
Sample
script_malware/1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral8
Sample
script_malware/1.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral9
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral10
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral11
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral12
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral13
Sample
script_malware/164f8295_linux.elf
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral14
Sample
script_malware/21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da.elf
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral15
Sample
script_malware/23.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral16
Sample
script_malware/23.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral17
Sample
script_malware/23.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
script_malware/23.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral19
Sample
script_malware/404
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral20
Sample
script_malware/404
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral21
Sample
script_malware/404
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral22
Sample
script_malware/404
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral23
Sample
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral26
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral27
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral28
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral29
Sample
script_malware/SnOoPy.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral30
Sample
script_malware/SnOoPy.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral31
Sample
script_malware/SnOoPy.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral32
Sample
script_malware/SnOoPy.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
-
Size
38KB
-
MD5
02e98c71545c8345d28920fbc4f99c28
-
SHA1
a09e2b273c4cb323d4ea424ae456d9dbc9fc43f0
-
SHA256
864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b
-
SHA512
62ca71f1028be36e9afa5d26c8f11471d6679658b8b3db7b2db696f093a2a9d5e616a7b3c336a18c143c5c73908259eb4ca2f4af66d3ee56a5dc4ee358d2f530
-
SSDEEP
768:Jkcso0KfNBqjxvcG4DRINIUBqKENI1gJkOpvUBL6GYJ5jHQES8Z80foQy2aCrhX:ueNB40xbUBqKEix2vLzwES8Z80foQ9X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 AcroRd32.exe 2744 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2348 wrote to memory of 352 2348 cmd.exe 31 PID 2348 wrote to memory of 352 2348 cmd.exe 31 PID 2348 wrote to memory of 352 2348 cmd.exe 31 PID 352 wrote to memory of 2744 352 rundll32.exe 32 PID 352 wrote to memory of 2744 352 rundll32.exe 32 PID 352 wrote to memory of 2744 352 rundll32.exe 32 PID 352 wrote to memory of 2744 352 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\script_malware\864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\script_malware\864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\script_malware\864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56af8c02916809a90bd871467a58a5764
SHA12a7ce5d60dc259a1bdc11b099b19e5502e1a7fc5
SHA256628a0158e2027c4119e27d563a79acd618439784fc528d80745dd54334d0cc2f
SHA5120f6728f72b7dfba08f17f8e753ad06005995de2381b0953a196e224a39a7b0b624f9a7802cbe806cf44b067df5729fd79ff43da3f8cb421dbe2d24ec98a7f7f2