Overview
overview
10Static
static
10Malware-ma...er.hta
windows7-x64
3Malware-ma...er.hta
windows10-2004-x64
8Malware-ma...075.js
windows7-x64
1Malware-ma...075.js
windows10-2004-x64
1Malware-ma...jan.js
windows7-x64
1Malware-ma...jan.js
windows10-2004-x64
1Malware-ma...Mozi.m
debian-9-armhf
9Malware-ma...Mozi.a
debian-9-mips
8Malware-ma...Mozi.m
debian-9-mipsel
1Malware-ma...us.arm
debian-9-armhf
9Malware-ma.../ELF/e
ubuntu-18.04-amd64
Malware-ma.../ELF/f
ubuntu-18.04-amd64
1Malware-ma...rmfile
ubuntu-18.04-amd64
10Malware-ma.../ELF/m
ubuntu-18.04-amd64
6Malware-ma...ELF/m1
ubuntu-18.04-amd64
6Malware-ma...F/m68k
ubuntu-18.04-amd64
Malware-ma...F/m68k
debian-9-armhf
Malware-ma...F/m68k
debian-9-mips
Malware-ma...F/m68k
debian-9-mipsel
Malware-ma...F/mips
debian-9-mips
9Malware-ma...LF/ppc
ubuntu-18.04-amd64
Malware-ma...LF/ppc
debian-9-armhf
Malware-ma...LF/ppc
debian-9-mips
Malware-ma...LF/ppc
debian-9-mipsel
Malware-ma...LF/sh4
ubuntu-18.04-amd64
Malware-ma...LF/sh4
debian-9-armhf
Malware-ma...LF/sh4
debian-9-mips
Malware-ma...LF/sh4
debian-9-mipsel
Malware-ma...LF/x86
ubuntu-18.04-amd64
10Malware-ma...oad.js
windows7-x64
1Malware-ma...oad.js
windows10-2004-x64
1Malware-ma...e64.js
windows7-x64
1Analysis
-
max time kernel
153s -
max time network
164s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
26-12-2023 07:03
Behavioral task
behavioral1
Sample
Malware-master/HTML,HTM, HTA Exploit/New Order.hta
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Malware-master/HTML,HTM, HTA Exploit/New Order.hta
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Malware-master/HTML,HTM, HTA Exploit/html-trojan-agent-37075.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Malware-master/HTML,HTM, HTA Exploit/html-trojan-agent-37075.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Malware-master/HTML,HTM, HTA Exploit/trojan.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Malware-master/HTML,HTM, HTA Exploit/trojan.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Malware-master/Linux/ELF/2021.04.20-Mozi.m
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral8
Sample
Malware-master/Linux/ELF/2021.04.26-Mozi.a
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral9
Sample
Malware-master/Linux/ELF/Mozi.m
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral10
Sample
Malware-master/Linux/ELF/Zeus.arm
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral11
Sample
Malware-master/Linux/ELF/e
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral12
Sample
Malware-master/Linux/ELF/f
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral13
Sample
Malware-master/Linux/ELF/frmfile
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral14
Sample
Malware-master/Linux/ELF/m
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral15
Sample
Malware-master/Linux/ELF/m1
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral16
Sample
Malware-master/Linux/ELF/m68k
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral17
Sample
Malware-master/Linux/ELF/m68k
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral18
Sample
Malware-master/Linux/ELF/m68k
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral19
Sample
Malware-master/Linux/ELF/m68k
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral20
Sample
Malware-master/Linux/ELF/mips
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral21
Sample
Malware-master/Linux/ELF/ppc
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral22
Sample
Malware-master/Linux/ELF/ppc
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral23
Sample
Malware-master/Linux/ELF/ppc
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral24
Sample
Malware-master/Linux/ELF/ppc
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral25
Sample
Malware-master/Linux/ELF/sh4
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral26
Sample
Malware-master/Linux/ELF/sh4
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral27
Sample
Malware-master/Linux/ELF/sh4
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral28
Sample
Malware-master/Linux/ELF/sh4
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral29
Sample
Malware-master/Linux/ELF/x86
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral30
Sample
Malware-master/PHP/async-upload.js
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
Malware-master/PHP/async-upload.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral32
Sample
Malware-master/PHP/class-IXR-base64.js
Resource
win7-20231129-en
General
-
Target
Malware-master/Linux/ELF/x86
-
Size
32KB
-
MD5
aa8f5bf5bc4b7b4fa9914b126d835059
-
SHA1
256984af68ae69890167fbb3d57ef2feace5fb83
-
SHA256
da3c0bb3531cecb87b644bddc9eb1d87a7a5bd59cb849ddec0acdbf0f1a13263
-
SHA512
1895740ebc29d639175e59d7224bec1362970b6e7afbcb7b0d75d9754d1f7620996bdb8a68bf009e8feecdbe12284804654edd37b5dd378cdc4731dc96a37b98
-
SSDEEP
768:IK4lJwqvPf+3ZUIVCpwctsvtjZqhkQZqlmXqvVyf284jUFDnbcuyD7UHQRj13:IK4ZX+OFZsVlqhVslmsIf2Lw9nouy8Hq
Malware Config
Extracted
mirai
KYTON
Signatures
-
Contacts a large (182622) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
x86description pid process Changes the process name, possibly in an attempt to hide itself 1536 x86 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 1 TTPs 1 IoCs
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/521/exe File opened for reading /proc/1780/exe File opened for reading /proc/1803/exe File opened for reading /proc/481/exe File opened for reading /proc/1069/exe File opened for reading /proc/1467/exe File opened for reading /proc/1783/exe File opened for reading /proc/444/exe File opened for reading /proc/1088/exe File opened for reading /proc/1134/exe File opened for reading /proc/1532/exe File opened for reading /proc/1601/exe File opened for reading /proc/1711/exe File opened for reading /proc/1773/exe File opened for reading /proc/2426/exe File opened for reading /proc/966/exe File opened for reading /proc/1046/exe File opened for reading /proc/1074/exe File opened for reading /proc/1121/exe File opened for reading /proc/1138/exe File opened for reading /proc/560/exe File opened for reading /proc/484/exe File opened for reading /proc/604/exe File opened for reading /proc/651/exe File opened for reading /proc/722/exe File opened for reading /proc/2311/exe File opened for reading /proc/2408/exe File opened for reading /proc/427/exe File opened for reading /proc/1596/exe File opened for reading /proc/2316/exe File opened for reading /proc/2462/exe File opened for reading /proc/1130/exe File opened for reading /proc/2446/exe File opened for reading /proc/2451/exe File opened for reading /proc/2179/exe File opened for reading /proc/1152/exe File opened for reading /proc/1551/exe File opened for reading /proc/1833/exe File opened for reading /proc/2319/exe File opened for reading /proc/2431/exe File opened for reading /proc/447/exe File opened for reading /proc/581/exe File opened for reading /proc/1777/exe File opened for reading /proc/2189/exe File opened for reading /proc/456/exe File opened for reading /proc/1534/exe File opened for reading /proc/1556/exe File opened for reading /proc/1714/exe File opened for reading /proc/2198/exe File opened for reading /proc/453/exe File opened for reading /proc/1586/exe File opened for reading /proc/2204/exe File opened for reading /proc/2346/exe File opened for reading /proc/1582/exe File opened for reading /proc/956/exe File opened for reading /proc/1101/exe File opened for reading /proc/1598/exe File opened for reading /proc/1719/exe File opened for reading /proc/2195/exe File opened for reading /proc/2417/exe File opened for reading /proc/2460/exe File opened for reading /proc/430/exe File opened for reading /proc/713/exe File opened for reading /proc/1111/exe