Overview
overview
10Static
static
10sh恶意�...14FEB1
ubuntu-18.04-amd64
sh恶意�...14FEB1
debian-9-armhf
sh恶意�...14FEB1
debian-9-mips
sh恶意�...14FEB1
debian-9-mipsel
sh恶意�...AA484D
ubuntu-18.04-amd64
sh恶意�...AA484D
debian-9-armhf
sh恶意�...AA484D
debian-9-mips
sh恶意�...AA484D
debian-9-mipsel
恶意软�...31ef1f
ubuntu-24.04-amd64
6挖矿程�...2C0CFB
ubuntu-20.04-amd64
10漏洞利�...F3E8C3
ubuntu-20.04-amd64
6Analysis
-
max time kernel
0s -
max time network
136s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20241127-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20241127-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
18-12-2024 11:41
Behavioral task
behavioral1
Sample
sh恶意脚本/955ABC9598BEFCA8025B806E9E14FEB1
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sh恶意脚本/955ABC9598BEFCA8025B806E9E14FEB1
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
sh恶意脚本/955ABC9598BEFCA8025B806E9E14FEB1
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
sh恶意脚本/955ABC9598BEFCA8025B806E9E14FEB1
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral5
Sample
sh恶意脚本/B954CBA4C2A5ED68CE8AC88BF4AA484D
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral6
Sample
sh恶意脚本/B954CBA4C2A5ED68CE8AC88BF4AA484D
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral7
Sample
sh恶意脚本/B954CBA4C2A5ED68CE8AC88BF4AA484D
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral8
Sample
sh恶意脚本/B954CBA4C2A5ED68CE8AC88BF4AA484D
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral9
Sample
恶意软件/f13e48658426307d9d1434b50fa0493f566ed1f31d6e88bb4ac2ae12ec31ef1f
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral10
Sample
挖矿程序/ED573E9B9087C650D06CFB76C62C0CFB
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral11
Sample
漏洞利用程序/8E3E276E650E6EA21BEA16C8C2F3E8C3
Resource
ubuntu2004-amd64-20241127-en
General
-
Target
漏洞利用程序/8E3E276E650E6EA21BEA16C8C2F3E8C3
-
Size
14KB
-
MD5
8e3e276e650e6ea21bea16c8c2f3e8c3
-
SHA1
e483074bbe5e41cacbe081f290d7e6b0c3184c7f
-
SHA256
4dcae1bddfc3e2cb98eae84e86fb58ec14ea6ef00778ac5974c4ec526d3da31f
-
SHA512
8b33a40fd39a06a85169f2e4c4172a4d44ec24d50c512db7231ab4575dbf4093bfdabc63dd1b36dda94ec87772469e659abf0650d8982a526d8623a96bf93e38
-
SSDEEP
384:ydtOQtZn0kc0sE8Xvn/3PHfXvn/3PHfXvnr70/i:SI00kc0sE8Xvn/3PHfXvn/3PHfXvnrr
Malware Config
Signatures
-
Uses Polkit to run commands 1 IoCs
Uses Polkit pkexec as a proxy to execute commands, possibly to bypass security restrictions.
pid Process 1420 pkexec -
description ioc Process File opened for reading /proc/filesystems pkexec -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/漏洞利用程序/.pkexec/gconv-modules 8E3E276E650E6EA21BEA16C8C2F3E8C3
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5b9509d5bee230341cacfed6bd6712bd3
SHA12dbad9dc54dfd6b14af012c54b3adbd939100fa6
SHA25650f2c869bb56ae55e7b42e02bdd757b10a4bbb5532157c46c0f3f32ab0ebabdd
SHA512d817b5d4cf294e18af8e029d5e82e693825c29d3164ed2bd5a0cb86a6fb68c5de3b8f30595bbf50ee0c7c98fa10601971c9aa98fc8cb96e7775f6306e0fddae6