Analysis

  • max time kernel
    2s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240418-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    28-06-2024 12:54

General

  • Target

    .rsync/a/stop

  • Size

    114B

  • MD5

    b726837db1e4d3a05a4749fdc7a4f9d5

  • SHA1

    793d9bb347cdc6bf99a1a6eeff2a210a6f149734

  • SHA256

    ad46ee339c92694f3d8b072b74eec325e416bbbf305803345d6fc4e787832af6

  • SHA512

    ce24fcc586b0172409352020c07bb49069fa8ffe7e4fb9c3f350c6b2f02c5a997b83dfb6ce6ac35db168434c7f68d0cd95f1ab198d25f2ee6ab9b13067a7ecc4

Score
6/10

Malware Config

Signatures

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads CPU attributes 1 TTPs 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/.rsync/a/stop
    /tmp/.rsync/a/stop
    1⤵
    • Writes file to tmp directory
    PID:724
    • /usr/bin/pkill
      pkill -9 cron
      2⤵
      • Reads CPU attributes
      • Reads runtime system information
      PID:725
    • /usr/bin/killall
      killall -9 cron
      2⤵
      • Reads runtime system information
      PID:728
    • /bin/ps
      ps x
      2⤵
      • Reads CPU attributes
      • Reads runtime system information
      PID:733
    • /bin/grep
      grep -v grep
      2⤵
        PID:735
      • /bin/grep
        grep cron
        2⤵
          PID:734
        • /usr/bin/awk
          awk "{print \$1}"
          2⤵
            PID:736
          • /bin/rm
            rm -rf .proc
            2⤵
              PID:737

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Replay Monitor

          Loading Replay Monitor...

          Downloads