General
-
Target
ohshit.sh
-
Size
2KB
-
Sample
241226-pxbtyswldj
-
MD5
6aff3f3662291b471ab7ad4cbdd57c29
-
SHA1
04c570fcebd808ce12793fc191ee5cd886bbcc73
-
SHA256
51a77320da977deac7fb703c6333820bae779ad712f3216fe4d407500d889a8d
-
SHA512
d08ebda17bc94d8c89fcbb16f42c4be409ec96222e0c49b5a69b044b2e725a63caf03d803a225b76c764d86bba42a5b303bff539a90092e432aa861a7d6f4cc4
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
ohshit.sh
-
Size
2KB
-
MD5
6aff3f3662291b471ab7ad4cbdd57c29
-
SHA1
04c570fcebd808ce12793fc191ee5cd886bbcc73
-
SHA256
51a77320da977deac7fb703c6333820bae779ad712f3216fe4d407500d889a8d
-
SHA512
d08ebda17bc94d8c89fcbb16f42c4be409ec96222e0c49b5a69b044b2e725a63caf03d803a225b76c764d86bba42a5b303bff539a90092e432aa861a7d6f4cc4
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1