General
-
Target
realtek.sh
-
Size
2KB
-
Sample
241217-skkg4stjen
-
MD5
8510078f168c53967e4740ca6b0f0069
-
SHA1
73f906878752309ede2fcb06ab342489d3786d68
-
SHA256
bddd65175184f846b04b4f069c58f49fba2bc2271c6db1f554dbc6422f3a83e7
-
SHA512
e62d533be7be9156ff42548fa8634675d4829f6529699fd1a78674603d475b95e611d32aa2e4a11f73c3850796ab5fecab1dbba357b75732098af2a2af699a25
Static task
static1
Behavioral task
behavioral1
Sample
realtek.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
realtek.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
realtek.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
realtek.sh
Resource
debian9-mipsel-20240729-en
Malware Config
Extracted
mirai
UNSTABLE
servers.vlrt-gap.com
Extracted
mirai
UNSTABLE
Extracted
mirai
UNSTABLE
servers.vlrt-gap.com
Targets
-
-
Target
realtek.sh
-
Size
2KB
-
MD5
8510078f168c53967e4740ca6b0f0069
-
SHA1
73f906878752309ede2fcb06ab342489d3786d68
-
SHA256
bddd65175184f846b04b4f069c58f49fba2bc2271c6db1f554dbc6422f3a83e7
-
SHA512
e62d533be7be9156ff42548fa8634675d4829f6529699fd1a78674603d475b95e611d32aa2e4a11f73c3850796ab5fecab1dbba357b75732098af2a2af699a25
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Deletes itself
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1