General

  • Target

    bin.sh

  • Size

    300KB

  • Sample

    230401-16hjmsee3s

  • MD5

    d533e4a1985ee9df9eb60e8bc4e0904d

  • SHA1

    d99181ebfe5cd60f6cd0a938e78ae27d25fd182a

  • SHA256

    606d278b2e75119296bf48721ae72deec87912742ce4d9920bf565521de4dcb0

  • SHA512

    fff01d3339eb8604b325c3ee27eb10a2462bf06c5524281ef221ce7f034963a8186ea19a9a17cda471a15cc195cfdb0dc1cf25ae36bbae9162757d8ce83f03b1

  • SSDEEP

    6144:p3lOYoaja8xzx/0wsxzSiOabE5wKSDP99zBa77oNsKqqfPqOJ:p1CG/jsxzXOabEDSDP99zBa/HKqoPqOJ

Malware Config

Targets

    • Target

      bin.sh

    • Size

      300KB

    • MD5

      d533e4a1985ee9df9eb60e8bc4e0904d

    • SHA1

      d99181ebfe5cd60f6cd0a938e78ae27d25fd182a

    • SHA256

      606d278b2e75119296bf48721ae72deec87912742ce4d9920bf565521de4dcb0

    • SHA512

      fff01d3339eb8604b325c3ee27eb10a2462bf06c5524281ef221ce7f034963a8186ea19a9a17cda471a15cc195cfdb0dc1cf25ae36bbae9162757d8ce83f03b1

    • SSDEEP

      6144:p3lOYoaja8xzx/0wsxzSiOabE5wKSDP99zBa77oNsKqqfPqOJ:p1CG/jsxzXOabEDSDP99zBa/HKqoPqOJ

    • Contacts a large (13319) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • Writes DNS configuration

      Writes data to DNS resolver config file.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks