General
-
Target
ohshit.sh
-
Size
3KB
-
Sample
241226-zx2eqazpcs
-
MD5
7c5ed3803ed430d1f19ad74fda51642f
-
SHA1
43d7c9d2e6065acbc7b1440a6e9a60bee8db353b
-
SHA256
5bac9d684357a86485310dc0f98b63f0f9c0f08e7879c7812a0949ff882fe7c4
-
SHA512
ff126662eb0097a5554f95a4b91c71481213e45f3f5a98a426ce49c7f15f32b422b2864cd97588d6360014e01e971003cfe1c63e58bc1bfadc38a4d150561565
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
ohshit.sh
-
Size
3KB
-
MD5
7c5ed3803ed430d1f19ad74fda51642f
-
SHA1
43d7c9d2e6065acbc7b1440a6e9a60bee8db353b
-
SHA256
5bac9d684357a86485310dc0f98b63f0f9c0f08e7879c7812a0949ff882fe7c4
-
SHA512
ff126662eb0097a5554f95a4b91c71481213e45f3f5a98a426ce49c7f15f32b422b2864cd97588d6360014e01e971003cfe1c63e58bc1bfadc38a4d150561565
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1