General
-
Target
e436c98b942060001529fce1dea7223a32a12aa7fdb9e922ee76f09b5385b1cc.sh
-
Size
4KB
-
Sample
241018-dfwx1sshrg
-
MD5
116d70f4b523f785c686a98eb3c0c695
-
SHA1
b7cb4727ae93027cb20009e1a300a517b90346d9
-
SHA256
e436c98b942060001529fce1dea7223a32a12aa7fdb9e922ee76f09b5385b1cc
-
SHA512
9dc00fc6f1f84dea893d41165cc9bc684dc1c6250cafae997cb5ebb3a54f33e8de0ad463305440c7e760a18e826f1f30681ffaeccaabfbe5b88e54e84c74060a
-
SSDEEP
96:vNVjINw4JNx/0NN7ANdMdEpF3Nn9GNUs1N2mbNRfEN3tONueLNySPNGWTNPlZ:OO4FE
Static task
static1
Behavioral task
behavioral1
Sample
e436c98b942060001529fce1dea7223a32a12aa7fdb9e922ee76f09b5385b1cc.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
e436c98b942060001529fce1dea7223a32a12aa7fdb9e922ee76f09b5385b1cc.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
e436c98b942060001529fce1dea7223a32a12aa7fdb9e922ee76f09b5385b1cc.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
Targets
-
-
Target
e436c98b942060001529fce1dea7223a32a12aa7fdb9e922ee76f09b5385b1cc.sh
-
Size
4KB
-
MD5
116d70f4b523f785c686a98eb3c0c695
-
SHA1
b7cb4727ae93027cb20009e1a300a517b90346d9
-
SHA256
e436c98b942060001529fce1dea7223a32a12aa7fdb9e922ee76f09b5385b1cc
-
SHA512
9dc00fc6f1f84dea893d41165cc9bc684dc1c6250cafae997cb5ebb3a54f33e8de0ad463305440c7e760a18e826f1f30681ffaeccaabfbe5b88e54e84c74060a
-
SSDEEP
96:vNVjINw4JNx/0NN7ANdMdEpF3Nn9GNUs1N2mbNRfEN3tONueLNySPNGWTNPlZ:OO4FE
-
Contacts a large (214004) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1