General
-
Target
hnap.sh
-
Size
2KB
-
Sample
250220-txq14aylgw
-
MD5
76c625416800cf3073f832c6fdb90dfe
-
SHA1
1d9e582097338454f484559f64b639795e0aa51e
-
SHA256
73e4a86bb7a5969fc3ee995b34dec87af69f4083efac0828a9d4b89f25ffed6e
-
SHA512
9a8edf9a9d1ca1b67dd72b3e304a30bf585b450ec1386b5bd84438f7c22adecfd1e095d3d9b7dfa800cbf783fe8589047e0d6a7ea19d1f65cbdd03e20824766d
Static task
static1
Behavioral task
behavioral1
Sample
hnap.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
hnap.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
hnap.sh
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Extracted
mirai
SORA
Targets
-
-
Target
hnap.sh
-
Size
2KB
-
MD5
76c625416800cf3073f832c6fdb90dfe
-
SHA1
1d9e582097338454f484559f64b639795e0aa51e
-
SHA256
73e4a86bb7a5969fc3ee995b34dec87af69f4083efac0828a9d4b89f25ffed6e
-
SHA512
9a8edf9a9d1ca1b67dd72b3e304a30bf585b450ec1386b5bd84438f7c22adecfd1e095d3d9b7dfa800cbf783fe8589047e0d6a7ea19d1f65cbdd03e20824766d
-
Mirai family
-
Contacts a large (33784) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1