General
-
Target
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
-
Size
2KB
-
Sample
241214-dj6lmatjcs
-
MD5
624b68623e669355734d1149ffd5d430
-
SHA1
ce07fb83638c8fa2865aa2b3d007c35902f7d96a
-
SHA256
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc
-
SHA512
143e96f06f585f9b6702e9e33497936b5c7b2675a8e0f9aaa3b93289926491ad7e6e204b114a7ca5c09d4bbd44cf2b2b005801ca31338b10d8cbbe9301c4bb23
Static task
static1
Behavioral task
behavioral1
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
UNST
Extracted
mirai
UNST
Extracted
mirai
UNST
Targets
-
-
Target
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
-
Size
2KB
-
MD5
624b68623e669355734d1149ffd5d430
-
SHA1
ce07fb83638c8fa2865aa2b3d007c35902f7d96a
-
SHA256
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc
-
SHA512
143e96f06f585f9b6702e9e33497936b5c7b2675a8e0f9aaa3b93289926491ad7e6e204b114a7ca5c09d4bbd44cf2b2b005801ca31338b10d8cbbe9301c4bb23
-
Mirai family
-
Contacts a large (69742) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1