Overview
overview
10Static
static
1script_mal...6c1.sh
ubuntu-18.04-amd64
9script_mal...6c1.sh
debian-9-armhf
9script_mal...6c1.sh
debian-9-mips
9script_mal...6c1.sh
debian-9-mipsel
9script_malware/1.sh
ubuntu-18.04-amd64
10script_malware/1.sh
debian-9-armhf
7script_malware/1.sh
debian-9-mips
7script_malware/1.sh
debian-9-mipsel
7script_mal...459.sh
ubuntu-18.04-amd64
7script_mal...459.sh
debian-9-armhf
7script_mal...459.sh
debian-9-mips
7script_mal...459.sh
debian-9-mipsel
7script_mal...ux.elf
ubuntu-22.04-amd64
3script_mal...da.elf
ubuntu-22.04-amd64
3script_malware/23.sh
ubuntu-18.04-amd64
3script_malware/23.sh
debian-9-armhf
3script_malware/23.sh
debian-9-mips
3script_malware/23.sh
debian-9-mipsel
3script_malware/404
ubuntu-18.04-amd64
script_malware/404
debian-9-armhf
script_malware/404
debian-9-mips
script_malware/404
debian-9-mipsel
script_mal...c5b.py
windows7-x64
3script_mal...c5b.py
windows10-2004-x64
3script_mal...006.sh
ubuntu-18.04-amd64
10script_mal...006.sh
debian-9-armhf
7script_mal...006.sh
debian-9-mips
7script_mal...006.sh
debian-9-mipsel
7script_mal...oPy.sh
ubuntu-18.04-amd64
7script_mal...oPy.sh
debian-9-armhf
7script_mal...oPy.sh
debian-9-mips
7script_mal...oPy.sh
debian-9-mipsel
7Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
script_malware/063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
script_malware/1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral6
Sample
script_malware/1.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral7
Sample
script_malware/1.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral8
Sample
script_malware/1.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral9
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral10
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral11
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral12
Sample
script_malware/10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral13
Sample
script_malware/164f8295_linux.elf
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral14
Sample
script_malware/21162bbd796ad2bf9954265276bfebea8741596e8fe9d86070245d9b5f9db6da.elf
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral15
Sample
script_malware/23.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral16
Sample
script_malware/23.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral17
Sample
script_malware/23.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
script_malware/23.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral19
Sample
script_malware/404
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral20
Sample
script_malware/404
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral21
Sample
script_malware/404
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral22
Sample
script_malware/404
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral23
Sample
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral26
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral27
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral28
Sample
script_malware/8e27b76b3903312cc5e93f250d7cf90b7b999592d70dcf2922bb450023014006.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral29
Sample
script_malware/SnOoPy.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral30
Sample
script_malware/SnOoPy.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral31
Sample
script_malware/SnOoPy.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral32
Sample
script_malware/SnOoPy.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
script_malware/864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py
-
Size
38KB
-
MD5
02e98c71545c8345d28920fbc4f99c28
-
SHA1
a09e2b273c4cb323d4ea424ae456d9dbc9fc43f0
-
SHA256
864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b
-
SHA512
62ca71f1028be36e9afa5d26c8f11471d6679658b8b3db7b2db696f093a2a9d5e616a7b3c336a18c143c5c73908259eb4ca2f4af66d3ee56a5dc4ee358d2f530
-
SSDEEP
768:Jkcso0KfNBqjxvcG4DRINIUBqKENI1gJkOpvUBL6GYJ5jHQES8Z80foQy2aCrhX:ueNB40xbUBqKEix2vLzwES8Z80foQ9X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2040 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\script_malware\864d7bcd96f8cf35b9e372b6508bc6ef1a704eaaa03c34bd79577b057aebec5b.py1⤵
- Modifies registry class
PID:4748
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2040