General
-
Target
huh.sh
-
Size
3KB
-
Sample
241230-h2mnpa1mfn
-
MD5
05f3e94487bf02c65f08cbed72943ce0
-
SHA1
db0a369df0887febacb3800f4c6f0b81a1f68351
-
SHA256
ec46f105b049d6674acbf45639883623f2f1cb3eed50eedb4b0e25a27a7b67e2
-
SHA512
bff1d19601df17262771b83212db7a2955bf0882637fc2482e26625a09d294e3f46198049307f4fd2c9f46079b5c4eead5ed0ed0d2db2e33dfb14164ef1f6ac3
Static task
static1
Behavioral task
behavioral1
Sample
huh.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
huh.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
huh.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Targets
-
-
Target
huh.sh
-
Size
3KB
-
MD5
05f3e94487bf02c65f08cbed72943ce0
-
SHA1
db0a369df0887febacb3800f4c6f0b81a1f68351
-
SHA256
ec46f105b049d6674acbf45639883623f2f1cb3eed50eedb4b0e25a27a7b67e2
-
SHA512
bff1d19601df17262771b83212db7a2955bf0882637fc2482e26625a09d294e3f46198049307f4fd2c9f46079b5c4eead5ed0ed0d2db2e33dfb14164ef1f6ac3
-
Detected Echobot
-
Echobot family
-
Mirai family
-
Contacts a large (247893) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1