General
-
Target
GODLYBINSNIGGAYOUCANTCRACKTHESEBITCH11111222268.sh
-
Size
4KB
-
Sample
250118-eqx4hasrep
-
MD5
c458138484ec7b830d632fd383d3d321
-
SHA1
0e7c076b71401207c7568f50f897110ea98f9d73
-
SHA256
9724ec0ed2f79f63d1e62dbf2da4a1ffe5b81d8446230f33795427bba5a57e3a
-
SHA512
e0a9fb2dcae645581a9f57372d93c30b6b4c906fc888582e91c4ef0de4b6dce961bcca0440f56164ad5354de41e91aab0fcb38dbee4fd0b7db2249fe75cd01fd
-
SSDEEP
48:vXkTv3X9CTXiFLXF6vX/4vXL02th3Xri5lXodNL3X7E2aLX877JX9CTXJ+LX2ZTS:v6aiqGtDis3kL2K+WriR
Static task
static1
Behavioral task
behavioral1
Sample
GODLYBINSNIGGAYOUCANTCRACKTHESEBITCH11111222268.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
GODLYBINSNIGGAYOUCANTCRACKTHESEBITCH11111222268.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
GODLYBINSNIGGAYOUCANTCRACKTHESEBITCH11111222268.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Targets
-
-
Target
GODLYBINSNIGGAYOUCANTCRACKTHESEBITCH11111222268.sh
-
Size
4KB
-
MD5
c458138484ec7b830d632fd383d3d321
-
SHA1
0e7c076b71401207c7568f50f897110ea98f9d73
-
SHA256
9724ec0ed2f79f63d1e62dbf2da4a1ffe5b81d8446230f33795427bba5a57e3a
-
SHA512
e0a9fb2dcae645581a9f57372d93c30b6b4c906fc888582e91c4ef0de4b6dce961bcca0440f56164ad5354de41e91aab0fcb38dbee4fd0b7db2249fe75cd01fd
-
SSDEEP
48:vXkTv3X9CTXiFLXF6vX/4vXL02th3Xri5lXodNL3X7E2aLX877JX9CTXJ+LX2ZTS:v6aiqGtDis3kL2K+WriR
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1