General
-
Target
yarn.sh
-
Size
2KB
-
Sample
241217-shbgestjbq
-
MD5
156f8033151bacfe7fbd2b38e8ed8230
-
SHA1
8e2424caff27c90c3792ebc7a3d3312f9ad31474
-
SHA256
504bc166321b9ccec043667881ef760fd04bb85c1ea8fa0e9fcfb44f356ea60f
-
SHA512
dd1623dd530087ea2b2f3d554807d1a8e5d3914a8ecdd61433d9f64a4f585afcc7fd8a3ffcb7237363842b722cced8c5d34f60b631349cd73cfbd674c99cb534
Static task
static1
Behavioral task
behavioral1
Sample
yarn.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
yarn.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
yarn.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
yarn.sh
Resource
debian9-mipsel-20240226-en
Malware Config
Extracted
mirai
UNSTABLE
servers.vlrt-gap.com
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
servers.vlrt-gap.com
Extracted
mirai
UNSTABLE
servers.vlrt-gap.com
Targets
-
-
Target
yarn.sh
-
Size
2KB
-
MD5
156f8033151bacfe7fbd2b38e8ed8230
-
SHA1
8e2424caff27c90c3792ebc7a3d3312f9ad31474
-
SHA256
504bc166321b9ccec043667881ef760fd04bb85c1ea8fa0e9fcfb44f356ea60f
-
SHA512
dd1623dd530087ea2b2f3d554807d1a8e5d3914a8ecdd61433d9f64a4f585afcc7fd8a3ffcb7237363842b722cced8c5d34f60b631349cd73cfbd674c99cb534
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Deletes itself
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1