Overview
overview
10Static
static
10Malware-ma...er.hta
windows7-x64
3Malware-ma...er.hta
windows10-2004-x64
8Malware-ma...075.js
windows7-x64
1Malware-ma...075.js
windows10-2004-x64
1Malware-ma...jan.js
windows7-x64
1Malware-ma...jan.js
windows10-2004-x64
1Malware-ma...Mozi.m
debian-9-armhf
9Malware-ma...Mozi.a
debian-9-mips
8Malware-ma...Mozi.m
debian-9-mipsel
1Malware-ma...us.arm
debian-9-armhf
9Malware-ma.../ELF/e
ubuntu-18.04-amd64
Malware-ma.../ELF/f
ubuntu-18.04-amd64
1Malware-ma...rmfile
ubuntu-18.04-amd64
10Malware-ma.../ELF/m
ubuntu-18.04-amd64
6Malware-ma...ELF/m1
ubuntu-18.04-amd64
6Malware-ma...F/m68k
ubuntu-18.04-amd64
Malware-ma...F/m68k
debian-9-armhf
Malware-ma...F/m68k
debian-9-mips
Malware-ma...F/m68k
debian-9-mipsel
Malware-ma...F/mips
debian-9-mips
9Malware-ma...LF/ppc
ubuntu-18.04-amd64
Malware-ma...LF/ppc
debian-9-armhf
Malware-ma...LF/ppc
debian-9-mips
Malware-ma...LF/ppc
debian-9-mipsel
Malware-ma...LF/sh4
ubuntu-18.04-amd64
Malware-ma...LF/sh4
debian-9-armhf
Malware-ma...LF/sh4
debian-9-mips
Malware-ma...LF/sh4
debian-9-mipsel
Malware-ma...LF/x86
ubuntu-18.04-amd64
10Malware-ma...oad.js
windows7-x64
1Malware-ma...oad.js
windows10-2004-x64
1Malware-ma...e64.js
windows7-x64
1Analysis
-
max time kernel
26s -
max time network
40s -
platform
debian-9_mips -
resource
debian9-mipsbe-20231215-en -
resource tags
arch:mipsimage:debian9-mipsbe-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
26-12-2023 07:03
Behavioral task
behavioral1
Sample
Malware-master/HTML,HTM, HTA Exploit/New Order.hta
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Malware-master/HTML,HTM, HTA Exploit/New Order.hta
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Malware-master/HTML,HTM, HTA Exploit/html-trojan-agent-37075.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Malware-master/HTML,HTM, HTA Exploit/html-trojan-agent-37075.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Malware-master/HTML,HTM, HTA Exploit/trojan.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Malware-master/HTML,HTM, HTA Exploit/trojan.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Malware-master/Linux/ELF/2021.04.20-Mozi.m
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral8
Sample
Malware-master/Linux/ELF/2021.04.26-Mozi.a
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral9
Sample
Malware-master/Linux/ELF/Mozi.m
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral10
Sample
Malware-master/Linux/ELF/Zeus.arm
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral11
Sample
Malware-master/Linux/ELF/e
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral12
Sample
Malware-master/Linux/ELF/f
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral13
Sample
Malware-master/Linux/ELF/frmfile
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral14
Sample
Malware-master/Linux/ELF/m
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral15
Sample
Malware-master/Linux/ELF/m1
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral16
Sample
Malware-master/Linux/ELF/m68k
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral17
Sample
Malware-master/Linux/ELF/m68k
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral18
Sample
Malware-master/Linux/ELF/m68k
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral19
Sample
Malware-master/Linux/ELF/m68k
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral20
Sample
Malware-master/Linux/ELF/mips
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral21
Sample
Malware-master/Linux/ELF/ppc
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral22
Sample
Malware-master/Linux/ELF/ppc
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral23
Sample
Malware-master/Linux/ELF/ppc
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral24
Sample
Malware-master/Linux/ELF/ppc
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral25
Sample
Malware-master/Linux/ELF/sh4
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral26
Sample
Malware-master/Linux/ELF/sh4
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral27
Sample
Malware-master/Linux/ELF/sh4
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral28
Sample
Malware-master/Linux/ELF/sh4
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral29
Sample
Malware-master/Linux/ELF/x86
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral30
Sample
Malware-master/PHP/async-upload.js
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
Malware-master/PHP/async-upload.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral32
Sample
Malware-master/PHP/class-IXR-base64.js
Resource
win7-20231129-en
General
-
Target
Malware-master/Linux/ELF/2021.04.26-Mozi.a
-
Size
129KB
-
MD5
fbe51695e97a45dc61967dc3241a37dc
-
SHA1
1ed14334b5b71783cd6ec14b8a704fe48e600cf0
-
SHA256
2e4506802aedea2e6d53910dfb296323be6620ac08c4b799a879eace5923a7b6
-
SHA512
c35eab56ba59beb2ec2b362e4d1aae734fadc2d9db1d720439337dcade13ec9c7b68da9d03821efc7277abaf9bace342ff35593373e04c67327d5f7db460ad8a
-
SSDEEP
3072:/TNVO/QJHZcfFj4rwLQGTNO5VZLwHm7vuQTpZUyY6cot:7O/QJHZweEL/NOjCHm7FZZncI
Malware Config
Signatures
-
Contacts a large (1082) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Changes the process name, possibly in an attempt to hide itself sshd 711 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp 2021.04.26-Mozi.a -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/raw 2021.04.26-Mozi.a File opened for reading /proc/net/route Process not Found File opened for reading /proc/net/tcp 2021.04.26-Mozi.a -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/122/stat killall File opened for reading /proc/151/stat killall File opened for reading /proc/151/cmdline killall File opened for reading /proc/350/stat killall File opened for reading /proc/380/stat killall File opened for reading /proc/77/stat killall File opened for reading /proc/81/stat killall File opened for reading /proc/70/stat killall File opened for reading /proc/326/stat killall File opened for reading /proc/356/stat killall File opened for reading /proc/702/cmdline killall File opened for reading /proc/714/stat killall File opened for reading /proc/23/stat killall File opened for reading /proc/69/stat killall File opened for reading /proc/703/stat killall File opened for reading /proc/2/stat killall File opened for reading /proc/11/stat killall File opened for reading /proc/78/stat killall File opened for reading /proc/571/stat killall File opened for reading /proc/572/stat killall File opened for reading /proc/18/stat killall File opened for reading /proc/20/stat killall File opened for reading /proc/16/stat killall File opened for reading /proc/711/stat killall File opened for reading /proc/3/stat killall File opened for reading /proc/6/stat killall File opened for reading /proc/37/stat killall File opened for reading /proc/381/stat killall File opened for reading /proc/19/stat killall File opened for reading /proc/22/stat killall File opened for reading /proc/112/stat killall File opened for reading /proc/405/stat killall File opened for reading /proc/688/stat killall File opened for reading /proc/702/stat killall File opened for reading /proc/self/exe 2021.04.26-Mozi.a File opened for reading /proc/8/stat killall File opened for reading /proc/10/stat killall File opened for reading /proc/75/stat killall File opened for reading /proc/84/stat killall File opened for reading /proc/123/stat killall File opened for reading /proc/536/stat killall File opened for reading /proc/703/cmdline killall File opened for reading /proc/5/stat killall File opened for reading /proc/7/stat killall File opened for reading /proc/15/stat killall File opened for reading /proc/82/stat killall File opened for reading /proc/712/stat killall File opened for reading /proc/1/stat killall File opened for reading /proc/9/stat killall File opened for reading /proc/74/stat killall File opened for reading /proc/76/stat killall File opened for reading /proc/236/stat killall File opened for reading /proc/352/stat killall File opened for reading /proc/353/stat killall File opened for reading /proc/393/stat killall File opened for reading /proc/14/stat killall File opened for reading /proc/71/stat killall File opened for reading /proc/704/stat killall File opened for reading /proc/718/stat killall File opened for reading /proc/158/stat killall File opened for reading /proc/708/stat killall File opened for reading /proc/21/stat killall File opened for reading /proc/72/stat killall File opened for reading /proc/175/stat killall -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Malware-master/Linux/ELF/.ips 2021.04.26-Mozi.a
Processes
-
/tmp/Malware-master/Linux/ELF/2021.04.26-Mozi.a/tmp/Malware-master/Linux/ELF/2021.04.26-Mozi.a1⤵
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:709
-
/bin/shsh -c "killall -9 telnetd utelnetd scfgmgr"1⤵PID:712
-
/usr/bin/killallkillall -9 telnetd utelnetd scfgmgr2⤵
- Reads runtime system information
PID:713
-
-
/bin/shsh -c "iptables -I INPUT -p tcp --destination-port 53573 -j ACCEPT"1⤵PID:773
-
/sbin/iptablesiptables -I INPUT -p tcp --destination-port 53573 -j ACCEPT2⤵PID:774
-
-
/bin/shsh -c "iptables -I OUTPUT -p tcp --source-port 53573 -j ACCEPT"1⤵PID:779
-
/sbin/iptablesiptables -I OUTPUT -p tcp --source-port 53573 -j ACCEPT2⤵PID:781
-
-
/bin/shsh -c "iptables -I PREROUTING -t nat -p tcp --destination-port 53573 -j ACCEPT"1⤵PID:782
-
/sbin/iptablesiptables -I PREROUTING -t nat -p tcp --destination-port 53573 -j ACCEPT2⤵PID:784
-