Analysis
-
max time kernel
148s -
max time network
62s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
27/02/2025, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
bins.sh
-
Size
1KB
-
MD5
ddd2066e9b68c51382870956a3c59979
-
SHA1
ce1c982d1e45284c841358935022612c1708822c
-
SHA256
0340ac49b3ffa9b62521f5d0ab751b8b1196e816d644317e7ae7a6166b08eb08
-
SHA512
62c1588cc5a05de7b0b6c960ae65e6c9949e15ba7310344e90dc43cfd0fe2a277796bd167fc0eb8ddb0853c2ef556bb6bd648f672491249ccc26c85967e2182b
Malware Config
Signatures
-
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 654 wget -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jackmymips wget
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5fdea2146459375451ec0995938915f80
SHA105599a13634dae963bf9ffc65cd5500e1be5b00e
SHA256233da4a2f4eeb0321c6307409eece83eb120d9085f7ad93237e9e13b1855abf7
SHA512d08da8c3344cda69ab2f70819d9c2b1a682bfa3ba4f3da2bbe7c2ac28d88125d1bd52a0ec5afd2a20318814ebf3d91fd351b0bc2db9194e5057d97c0fa515ca1