General
-
Target
pulse.sh
-
Size
2KB
-
Sample
250220-trjptsyjcx
-
MD5
e95da5a40eca3a95854e587310e5c523
-
SHA1
785acbfb4fec6d3efbf3554126206a62bacfc16b
-
SHA256
cc77e49dd7b2419e3152f7ecfc5b718fa713a0300080a101048bb46a01966975
-
SHA512
74acfc8651a7ae5fc764d26019a4c38339a4f8feadcfc46c39d104fbf3349088075f764486e575c98c833713c2104a391f179f8c4e0f3b20dc5487bf6af7b9e0
Static task
static1
Behavioral task
behavioral1
Sample
pulse.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
pulse.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
pulse.sh
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Targets
-
-
Target
pulse.sh
-
Size
2KB
-
MD5
e95da5a40eca3a95854e587310e5c523
-
SHA1
785acbfb4fec6d3efbf3554126206a62bacfc16b
-
SHA256
cc77e49dd7b2419e3152f7ecfc5b718fa713a0300080a101048bb46a01966975
-
SHA512
74acfc8651a7ae5fc764d26019a4c38339a4f8feadcfc46c39d104fbf3349088075f764486e575c98c833713c2104a391f179f8c4e0f3b20dc5487bf6af7b9e0
-
Mirai family
-
Contacts a large (36850) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1