General
-
Target
yarn.sh
-
Size
2KB
-
Sample
241211-1qh58szkew
-
MD5
07d7d7c0736b6263410acf9e34d5c9b0
-
SHA1
4edd87528465f7b81a507b80f7fdfdad4c88feba
-
SHA256
e8f8b9515b22842595732ec89d3a6daa851dfddd233bfa76a7540da68c2b2b11
-
SHA512
1711af3727859adc74cadb660767065d351613b2aa842f0732f26d25b1407b159f1b42108f9f8f846789532d2ad62a9d0b530202ea2b30eb08ef503f5a525d5b
Static task
static1
Behavioral task
behavioral1
Sample
yarn.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
yarn.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
yarn.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Targets
-
-
Target
yarn.sh
-
Size
2KB
-
MD5
07d7d7c0736b6263410acf9e34d5c9b0
-
SHA1
4edd87528465f7b81a507b80f7fdfdad4c88feba
-
SHA256
e8f8b9515b22842595732ec89d3a6daa851dfddd233bfa76a7540da68c2b2b11
-
SHA512
1711af3727859adc74cadb660767065d351613b2aa842f0732f26d25b1407b159f1b42108f9f8f846789532d2ad62a9d0b530202ea2b30eb08ef503f5a525d5b
-
Mirai family
-
Contacts a large (102359) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1