General
-
Target
sensi.sh
-
Size
1KB
-
Sample
241226-epmw5swqfk
-
MD5
f610810764eec4dd2eed9f4e0e66121b
-
SHA1
98af7417d18cf6bf49a61104a4aebbaac59a0f39
-
SHA256
7e6ff187d2f1740e90596f19c2bd843495849a3c38dbdae69658bca46bf92705
-
SHA512
189710551b60f60dfd94fa21333c58e0d0f0e230d8ca60f33fc8f2fd9f1df2d58b56e969e0639f3ae6d4ed4e27f16fa84239628b86122f434f3baadf6af3826c
Static task
static1
Behavioral task
behavioral1
Sample
sensi.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sensi.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
sensi.sh
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
sensi.sh
-
Size
1KB
-
MD5
f610810764eec4dd2eed9f4e0e66121b
-
SHA1
98af7417d18cf6bf49a61104a4aebbaac59a0f39
-
SHA256
7e6ff187d2f1740e90596f19c2bd843495849a3c38dbdae69658bca46bf92705
-
SHA512
189710551b60f60dfd94fa21333c58e0d0f0e230d8ca60f33fc8f2fd9f1df2d58b56e969e0639f3ae6d4ed4e27f16fa84239628b86122f434f3baadf6af3826c
-
Mirai family
-
Contacts a large (196691) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1