General
-
Target
ohshit.sh
-
Size
2KB
-
Sample
241214-erctystlgz
-
MD5
49f7303a16d7e14d54856f32a64edf18
-
SHA1
78bf70845cf273e963f91e0a373e581e03ecb965
-
SHA256
54ef205416581348885f545c913d0325c89e72c40cfc1f423e319855f0c40b6a
-
SHA512
b4ff38959a17b997d9e6789f697962cf8ec56c4623d8cd357b025a58f653fe1f4732bd40607e3c20e12b6c0513714e7322143c133b845ef757db8131eb7c7be1
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
ohshit.sh
-
Size
2KB
-
MD5
49f7303a16d7e14d54856f32a64edf18
-
SHA1
78bf70845cf273e963f91e0a373e581e03ecb965
-
SHA256
54ef205416581348885f545c913d0325c89e72c40cfc1f423e319855f0c40b6a
-
SHA512
b4ff38959a17b997d9e6789f697962cf8ec56c4623d8cd357b025a58f653fe1f4732bd40607e3c20e12b6c0513714e7322143c133b845ef757db8131eb7c7be1
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1