Overview
overview
10Static
static
10.bash_hist...utorun
ubuntu-18.04-amd64
7.bash_hist...utorun
debian-9-armhf
7.bash_hist...utorun
debian-9-mips
7.bash_hist...utorun
debian-9-mipsel
7.bash_history1/.kde/b
ubuntu-22.04-amd64
.bash_hist...kde/b2
ubuntu-22.04-amd64
.bash_hist.../crond
ubuntu-24.04-amd64
.bash_hist.../essyn
ubuntu-24.04-amd64
1.bash_history1/.kde/f
ubuntu-22.04-amd64
.bash_hist...kde/f4
ubuntu-24.04-amd64
.bash_history1/.kde/g
ubuntu-24.04-amd64
.bash_history1/.kde/j
ubuntu-24.04-amd64
.bash_hist...kde/j2
ubuntu-24.04-amd64
.bash_hist...killer
ubuntu-20.04-amd64
.bash_hist...ch.vbs
windows7-x64
1.bash_hist...ch.vbs
windows10-2004-x64
8.bash_hist...de/run
ubuntu-18.04-amd64
1.bash_hist...de/run
debian-9-armhf
1.bash_hist...de/run
debian-9-mips
1.bash_hist...de/run
debian-9-mipsel
1.bash_history1/.kde/s
ubuntu-20.04-amd64
.bash_hist...kde/sl
ubuntu-22.04-amd64
.bash_hist...e/ssyn
ubuntu-24.04-amd64
1.bash_hist...art.sh
windows7-x64
3.bash_hist...art.sh
windows10-2004-x64
8.bash_hist...de/std
ubuntu-24.04-amd64
.bash_hist...tealth
ubuntu-20.04-amd64
.bash_hist...stream
ubuntu-22.04-amd64
.bash_hist...e/talk
ubuntu-22.04-amd64
.bash_hist...de/tty
ubuntu-22.04-amd64
.bash_hist...update
ubuntu-18.04-amd64
1.bash_hist...update
debian-9-armhf
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12/02/2025, 07:54
Behavioral task
behavioral1
Sample
.bash_history1/.kde/autorun
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
.bash_history1/.kde/autorun
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
.bash_history1/.kde/autorun
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
.bash_history1/.kde/autorun
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral5
Sample
.bash_history1/.kde/b
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral6
Sample
.bash_history1/.kde/b2
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral7
Sample
.bash_history1/.kde/crond
Resource
ubuntu2404-amd64-20240729-en
Behavioral task
behavioral8
Sample
.bash_history1/.kde/essyn
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral9
Sample
.bash_history1/.kde/f
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral10
Sample
.bash_history1/.kde/f4
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral11
Sample
.bash_history1/.kde/g
Resource
ubuntu2404-amd64-20240729-en
Behavioral task
behavioral12
Sample
.bash_history1/.kde/j
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral13
Sample
.bash_history1/.kde/j2
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral14
Sample
.bash_history1/.kde/killer
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral15
Sample
.bash_history1/.kde/mech.vbs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
.bash_history1/.kde/mech.vbs
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
.bash_history1/.kde/run
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
.bash_history1/.kde/run
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral19
Sample
.bash_history1/.kde/run
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral20
Sample
.bash_history1/.kde/run
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral21
Sample
.bash_history1/.kde/s
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral22
Sample
.bash_history1/.kde/sl
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral23
Sample
.bash_history1/.kde/ssyn
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral24
Sample
.bash_history1/.kde/start.sh
Resource
win7-20241023-en
Behavioral task
behavioral25
Sample
.bash_history1/.kde/start.sh
Resource
win10v2004-20250207-en
Behavioral task
behavioral26
Sample
.bash_history1/.kde/std
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral27
Sample
.bash_history1/.kde/stealth
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral28
Sample
.bash_history1/.kde/stream
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral29
Sample
.bash_history1/.kde/talk
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral30
Sample
.bash_history1/.kde/tty
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral31
Sample
.bash_history1/.kde/update
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral32
Sample
.bash_history1/.kde/update
Resource
debian9-armhf-20240611-en
General
-
Target
.bash_history1/.kde/start.sh
-
Size
27B
-
MD5
a224cfe19f43953d06432c7b7d2f17db
-
SHA1
d09707b31621536a6641481980076c4a4a50f0e3
-
SHA256
0ce922c5886e74bd29daf323e46789392b6b8f171893b976c7753d404aaf35be
-
SHA512
d685ce6c3c455d5cdab347930d7b8e1b6823d231eed2502043393760df75e51b21d456ca1f8d6e288c7832d4a10c9fd10dedc24928a652a9d014fa97e3030495
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2940 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2940 AcroRd32.exe 2940 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2252 1460 cmd.exe 31 PID 1460 wrote to memory of 2252 1460 cmd.exe 31 PID 1460 wrote to memory of 2252 1460 cmd.exe 31 PID 2252 wrote to memory of 2940 2252 rundll32.exe 32 PID 2252 wrote to memory of 2940 2252 rundll32.exe 32 PID 2252 wrote to memory of 2940 2252 rundll32.exe 32 PID 2252 wrote to memory of 2940 2252 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.bash_history1\.kde\start.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.bash_history1\.kde\start.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.bash_history1\.kde\start.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD522c61f5935ed7420ba6f88d8445cfd26
SHA1fcab88d350573313cfe6874163e4cb4e807d544e
SHA256a4fc11e984e89e07c9e0c3012afb974dae84a30a4a8ad211a9b87a7c0fc7e77a
SHA51212d504bbad738e4484cfc32ac803ae64352975a76028982f7a051e936363888543505c95576b22c4e5eda620b86ae2474b293ff21f71e0e1834aaf7969d464a7