General
-
Target
c75f373ac98a4360a0a0d059d75737d1850f3928b247ceb4ead1946dbc54f672.sh
-
Size
4KB
-
Sample
241018-c7jw4avfrr
-
MD5
c885d2a5cc2f6b3f6887add42fe6b22a
-
SHA1
d479bc74cc9f65e4b973f38ee39abcc7e824f353
-
SHA256
c75f373ac98a4360a0a0d059d75737d1850f3928b247ceb4ead1946dbc54f672
-
SHA512
463de202d0f31248330e7f4838febc69f7c0a379de7e921ce000ea96fab035c7c5a3aeb9962e42604291b0de16ad5fc26b5bea33d868cb1fe962c439c1f9a3b1
-
SSDEEP
96:vNVjGNw4DNx/KNN7+NdMdEpFpNn9ENUsnN2mVNRfaN3tMNueFNySBNGWNNPln:OO4F8
Static task
static1
Behavioral task
behavioral1
Sample
c75f373ac98a4360a0a0d059d75737d1850f3928b247ceb4ead1946dbc54f672.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
c75f373ac98a4360a0a0d059d75737d1850f3928b247ceb4ead1946dbc54f672.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
c75f373ac98a4360a0a0d059d75737d1850f3928b247ceb4ead1946dbc54f672.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
Targets
-
-
Target
c75f373ac98a4360a0a0d059d75737d1850f3928b247ceb4ead1946dbc54f672.sh
-
Size
4KB
-
MD5
c885d2a5cc2f6b3f6887add42fe6b22a
-
SHA1
d479bc74cc9f65e4b973f38ee39abcc7e824f353
-
SHA256
c75f373ac98a4360a0a0d059d75737d1850f3928b247ceb4ead1946dbc54f672
-
SHA512
463de202d0f31248330e7f4838febc69f7c0a379de7e921ce000ea96fab035c7c5a3aeb9962e42604291b0de16ad5fc26b5bea33d868cb1fe962c439c1f9a3b1
-
SSDEEP
96:vNVjGNw4DNx/KNN7+NdMdEpFpNn9ENUsnN2mVNRfaN3tMNueFNySBNGWNNPln:OO4F8
-
Contacts a large (210246) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1