General
-
Target
pulse.sh
-
Size
2KB
-
Sample
241211-1qgmeazkd1
-
MD5
2d3c16a2a4a95fbea8e3701f1a87f196
-
SHA1
3f58b26babc849466241b5370aa6550967075c78
-
SHA256
ef3eaa8e117b7d554783cc7ec3e87b9000b253514c68d2af01b9228136eda3ca
-
SHA512
499835274884d0063f666b2b5e708de9428d5ce5c6682a7847bba97c6058eafb6168e10ba896d53f76ebba4d16515d262ca8a9ef7ad81bdfbca145247793e102
Static task
static1
Behavioral task
behavioral1
Sample
pulse.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
pulse.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
pulse.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Targets
-
-
Target
pulse.sh
-
Size
2KB
-
MD5
2d3c16a2a4a95fbea8e3701f1a87f196
-
SHA1
3f58b26babc849466241b5370aa6550967075c78
-
SHA256
ef3eaa8e117b7d554783cc7ec3e87b9000b253514c68d2af01b9228136eda3ca
-
SHA512
499835274884d0063f666b2b5e708de9428d5ce5c6682a7847bba97c6058eafb6168e10ba896d53f76ebba4d16515d262ca8a9ef7ad81bdfbca145247793e102
-
Mirai family
-
Contacts a large (102462) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1