General
-
Target
e13311c4e46e7f92064daad35eae24e625bf4693d6f8f39c33ac8dedd43313fb.sh
-
Size
4KB
-
Sample
241018-de3deashmg
-
MD5
6eed6e42161627503c101767962a9a41
-
SHA1
6d2598af3e21da19caed4ca3cf0f57dcb07e3b64
-
SHA256
e13311c4e46e7f92064daad35eae24e625bf4693d6f8f39c33ac8dedd43313fb
-
SHA512
2725372677426f8a346fbf1e14e792b0098fc3e3da6e661fc2003f55065f6e7c039be6789bffe7aed10ffd03bf6bace21ecc77584e2389997b118b9266787eb8
-
SSDEEP
96:vNVjUNw4/Nx/QNN7sNdMdEpFNNn9KNUsbN2mhNRfAN3tSNuexNySlNGWZNPl9:oO4FC
Static task
static1
Behavioral task
behavioral1
Sample
e13311c4e46e7f92064daad35eae24e625bf4693d6f8f39c33ac8dedd43313fb.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
e13311c4e46e7f92064daad35eae24e625bf4693d6f8f39c33ac8dedd43313fb.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
e13311c4e46e7f92064daad35eae24e625bf4693d6f8f39c33ac8dedd43313fb.sh
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
Targets
-
-
Target
e13311c4e46e7f92064daad35eae24e625bf4693d6f8f39c33ac8dedd43313fb.sh
-
Size
4KB
-
MD5
6eed6e42161627503c101767962a9a41
-
SHA1
6d2598af3e21da19caed4ca3cf0f57dcb07e3b64
-
SHA256
e13311c4e46e7f92064daad35eae24e625bf4693d6f8f39c33ac8dedd43313fb
-
SHA512
2725372677426f8a346fbf1e14e792b0098fc3e3da6e661fc2003f55065f6e7c039be6789bffe7aed10ffd03bf6bace21ecc77584e2389997b118b9266787eb8
-
SSDEEP
96:vNVjUNw4/Nx/QNN7sNdMdEpFNNn9KNUsbN2mhNRfAN3tSNuexNySlNGWZNPl9:oO4FC
-
Contacts a large (207979) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1